Source: Bybit hackers planted malicious code to manipulate transactions by compromising a developer's computer at crypto wallet provider Safe, used by Bybit
On the night of Feb. 21, Ben Zhou, the chief executive of the cryptocurrency exchange Bybit, logged on to his computer to approve what appeared to be a routine transaction.
Source: Bybit hackers planted malicious code to manipulate transactions by compromising a developer's computer at crypto wallet provider Safe, used by Bybit
On the night of Feb. 21, Ben Zhou, the chief executive of the cryptocurrency exchange Bybit, logged on to his computer to approve what appeared to be a routine transaction.
Source: Bybit hackers planted malicious code to manipulate transactions by compromising a developer's computer at crypto wallet provider Safe, used by Bybit
On the night of Feb. 21, Ben Zhou, the chief executive of the cryptocurrency exchange Bybit, logged on to his computer to approve what appeared to be a routine transaction.
Source: Bybit hackers planted malicious code to manipulate transactions by compromising a developer's computer at crypto wallet provider Safe, used by Bybit
On the night of Feb. 21, Ben Zhou, the chief executive of the cryptocurrency exchange Bybit, logged on to his computer to approve what appeared to be a routine transaction.
How the hackers behind the $1.5B Bybit crypto heist used UI manipulation of employee devices and social engineering to gain control of ETH multisig cold wallets
The cryptocurrency industry and those responsible for securing it are still in shock following Friday's heist, likely by North Korea …