Scan to download
BTC $77,232.78 +0.47%
ETH $2,325.30 +1.65%
BNB $627.38 +0.40%
XRP $1.39 +0.07%
SOL $84.83 +0.71%
TRX $0.3224 -0.56%
DOGE $0.1018 +1.88%
ADA $0.2492 +0.63%
BCH $453.94 +1.33%
LINK $9.36 +0.80%
HYPE $40.61 -1.41%
AAVE $97.71 +0.16%
SUI $0.9335 -0.02%
XLM $0.1631 -1.08%
ZEC $338.42 -0.48%
BTC $77,232.78 +0.47%
ETH $2,325.30 +1.65%
BNB $627.38 +0.40%
XRP $1.39 +0.07%
SOL $84.83 +0.71%
TRX $0.3224 -0.56%
DOGE $0.1018 +1.88%
ADA $0.2492 +0.63%
BCH $453.94 +1.33%
LINK $9.36 +0.80%
HYPE $40.61 -1.41%
AAVE $97.71 +0.16%
SUI $0.9335 -0.02%
XLM $0.1631 -1.08%
ZEC $338.42 -0.48%

Security Community: Bybit attackers use "social engineering" techniques to mislead reviewers into mistaking contract changes for transfers

2025-02-22 12:46:10
Collection

ChainCatcher message, according to a post by the security community Dilation Effect on platform X: "Compared to previous similar incidents, in the Bybit incident, only one signer needed to be compromised to complete the attack, as the attacker used a 'social engineering' technique.

Analyzing on-chain transactions reveals that the attacker executed a malicious contract's transfer function through delegatecall. The transfer code modifies the value of slot 0 using the SSTORE instruction, thereby changing the implementation address of Bybit's cold wallet multi-signature contract to the attacker's address. The transfer here is very clever; it only requires dealing with the person/device initiating this multi-signature transaction, and the subsequent reviewers will significantly lower their guard when they see this transfer. Because a normal person seeing a transfer would think it's just a transfer, who would know it's actually changing the contract? The attacker's methods have evolved again."

app_icon
ChainCatcher Building the Web3 world with innovations.