May 15, 2025
11 11 11 AM
Latest Post
0x Acquires Competitor Flood in Push to Boost Share of $2.3B DEX Aggregator Market Crypto for Advisors: Stablecoins Explained Shiba Inu (SHIB) Price Drops 7% in 24 Hours but Remains Up 25% Over the Past Month Coinbase Canada CEO Urges Mark Carney Government to Move Fast on National Crypto Strategy Movement Labs Secretly Promised Advisers Millions in Tokens, Leaked Documents Show Bitcoin, Strategy Confirm Concurrent Bull Cross, Strengthening Uptrend Signal: Technical Analysis CoinDesk 20 Performance Update: NEAR Drops 5.7% as Index Trades Lower From Wednesday MoonPay Users Can Now Make Stablecoins to Make Payments With Mastercard Partnership a16z Crypto Leads $7M Round in KYD Labs That Aims to Transform Ticketing Industry Bitcoin Backed Token YBTC Comes to Sui as Bitlayer Integrates Its BitVM Bridge to Sui Network

Bybit and Safe Custody Are at Odds on Who’s to Blame for $1.5B Hack

Cryptocurrency exchange Bybit has published a forensic review on last week’s $1.5 billion hack, revealing that its systems had not been infiltrated and that the issue seemed to have stemmed from compromised Safe wallet infrastructure.

Bybit concluded from the review that “the credentials of a Safe developer were compromised,” which allowed the Lazarus hacking group to gain unauthorized access to the Safe wallet and subsequently deceive Bybit staff into signing the malicious transaction.

However, a person familiar with the matter told CoinDesk that despite the wallet’s infrastructure being compromised by social engineering, the hack would not have been possible had Bybit not “blind signed” the transaction. The term refers to a mechanism where a smart contract transaction is approved without comprehensive knowledge of its contents.

Safe also issued a statement saying that “Safe smart contracts [were] unaffected, an attack was conducted by compromising a Safe {Wallet} developer machine which affected an account operated by Bybit.” It also pointed out that a “forensic review of external security researchers did NOT indicate any vulnerabilities in the Safe smart contracts or source code of the frontend and services.”

The apparent back and forth between both companies mirrors that of WazirX and Liminal Custody, which blamed each other following a $230 million exploit last July.

On-chain data analyzed by ZachXBT shows that Lazarus is attempting to launder the stolen funds, with 920 wallets currently being tainted with the ill-gotten gains. The funds, perhaps inadvertently, have been commingled with stolen funds from hacks targeting Phemex and Poloniex, linking Lazarus Group to all three.
Read more: Bybit Declares ‘War on Lazarus’ as It Crowdsources Effort to Freeze Stolen Funds

This post was originally published on this site