Scan to download
BTC $68,946.88 +3.20%
ETH $2,124.04 +4.18%
BNB $600.67 +1.77%
XRP $1.34 +2.98%
SOL $81.29 +1.96%
TRX $0.3175 -0.06%
DOGE $0.0921 +2.00%
ADA $0.2562 +5.42%
BCH $433.81 -0.51%
LINK $8.92 +4.12%
HYPE $36.88 +3.30%
AAVE $95.22 +2.51%
SUI $0.8813 +3.08%
XLM $0.1608 +0.61%
ZEC $252.35 +2.77%
BTC $68,946.88 +3.20%
ETH $2,124.04 +4.18%
BNB $600.67 +1.77%
XRP $1.34 +2.98%
SOL $81.29 +1.96%
TRX $0.3175 -0.06%
DOGE $0.0921 +2.00%
ADA $0.2562 +5.42%
BCH $433.81 -0.51%
LINK $8.92 +4.12%
HYPE $36.88 +3.30%
AAVE $95.22 +2.51%
SUI $0.8813 +3.08%
XLM $0.1608 +0.61%
ZEC $252.35 +2.77%

Security Community: Bybit attackers use "social engineering" techniques to mislead reviewers into mistaking contract changes for transfers

2025-02-22 12:46:10
Collection

ChainCatcher message, according to a post by the security community Dilation Effect on platform X: "Compared to previous similar incidents, in the Bybit incident, only one signer needed to be compromised to complete the attack, as the attacker used a 'social engineering' technique.

Analyzing on-chain transactions reveals that the attacker executed a malicious contract's transfer function through delegatecall. The transfer code modifies the value of slot 0 using the SSTORE instruction, thereby changing the implementation address of Bybit's cold wallet multi-signature contract to the attacker's address. The transfer here is very clever; it only requires dealing with the person/device initiating this multi-signature transaction, and the subsequent reviewers will significantly lower their guard when they see this transfer. Because a normal person seeing a transfer would think it's just a transfer, who would know it's actually changing the contract? The attacker's methods have evolved again."

app_icon
ChainCatcher Building the Web3 world with innovations.