Scan to download
BTC $79,494.36 +1.81%
ETH $2,356.78 +2.46%
BNB $628.92 +2.17%
XRP $1.40 +1.52%
SOL $84.66 +1.26%
TRX $0.3391 +0.44%
DOGE $0.1112 +3.44%
ADA $0.2513 +1.48%
BCH $445.65 +0.52%
LINK $9.27 +2.18%
HYPE $41.76 +2.23%
AAVE $93.57 +1.64%
SUI $0.9368 +2.58%
XLM $0.1598 +0.81%
ZEC $412.13 +7.56%
BTC $79,494.36 +1.81%
ETH $2,356.78 +2.46%
BNB $628.92 +2.17%
XRP $1.40 +1.52%
SOL $84.66 +1.26%
TRX $0.3391 +0.44%
DOGE $0.1112 +3.44%
ADA $0.2513 +1.48%
BCH $445.65 +0.52%
LINK $9.27 +2.18%
HYPE $41.76 +2.23%
AAVE $93.57 +1.64%
SUI $0.9368 +2.58%
XLM $0.1598 +0.81%
ZEC $412.13 +7.56%

Security Community: Bybit attackers use "social engineering" techniques to mislead reviewers into mistaking contract changes for transfers

2025-02-22 12:46:10
Collection

ChainCatcher message, according to a post by the security community Dilation Effect on platform X: "Compared to previous similar incidents, in the Bybit incident, only one signer needed to be compromised to complete the attack, as the attacker used a 'social engineering' technique.

Analyzing on-chain transactions reveals that the attacker executed a malicious contract's transfer function through delegatecall. The transfer code modifies the value of slot 0 using the SSTORE instruction, thereby changing the implementation address of Bybit's cold wallet multi-signature contract to the attacker's address. The transfer here is very clever; it only requires dealing with the person/device initiating this multi-signature transaction, and the subsequent reviewers will significantly lower their guard when they see this transfer. Because a normal person seeing a transfer would think it's just a transfer, who would know it's actually changing the contract? The attacker's methods have evolved again."

app_icon
ChainCatcher Building the Web3 world with innovations.