Scan to download
BTC $69,213.13 +4.28%
ETH $2,059.67 +7.47%
BNB $617.16 +2.02%
XRP $1.42 +4.54%
SOL $84.45 +7.55%
TRX $0.2792 +0.87%
DOGE $0.0965 +5.58%
ADA $0.2735 +5.23%
BCH $547.60 +10.14%
LINK $8.86 +7.44%
HYPE $32.02 +5.81%
AAVE $118.07 +11.23%
SUI $0.9769 +8.25%
XLM $0.1652 +4.59%
ZEC $255.05 +9.87%
BTC $69,213.13 +4.28%
ETH $2,059.67 +7.47%
BNB $617.16 +2.02%
XRP $1.42 +4.54%
SOL $84.45 +7.55%
TRX $0.2792 +0.87%
DOGE $0.0965 +5.58%
ADA $0.2735 +5.23%
BCH $547.60 +10.14%
LINK $8.86 +7.44%
HYPE $32.02 +5.81%
AAVE $118.07 +11.23%
SUI $0.9769 +8.25%
XLM $0.1652 +4.59%
ZEC $255.05 +9.87%

Security Community: Bybit attackers use "social engineering" techniques to mislead reviewers into mistaking contract changes for transfers

2025-02-22 12:46:10
Collection

ChainCatcher message, according to a post by the security community Dilation Effect on platform X: "Compared to previous similar incidents, in the Bybit incident, only one signer needed to be compromised to complete the attack, as the attacker used a 'social engineering' technique.

Analyzing on-chain transactions reveals that the attacker executed a malicious contract's transfer function through delegatecall. The transfer code modifies the value of slot 0 using the SSTORE instruction, thereby changing the implementation address of Bybit's cold wallet multi-signature contract to the attacker's address. The transfer here is very clever; it only requires dealing with the person/device initiating this multi-signature transaction, and the subsequent reviewers will significantly lower their guard when they see this transfer. Because a normal person seeing a transfer would think it's just a transfer, who would know it's actually changing the contract? The attacker's methods have evolved again."

app_icon
ChainCatcher Building the Web3 world with innovations.