menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Blockchain News

>

Welcome to...
source image

Medium

1M

read

4

img
dot

Welcome to Cyber with Zik!

  • 1. Social Engineering and Initial Access: Attackers used targeted phishing to trick Bybit personnel responsible for cold wallet security and gained control over the exchange's cold wallet.
  • 2. Exploiting Smart Contract Vulnerabilities: Attackers deployed a malicious contract upgrade, overriding security measures and moving funds undetected.
  • 3. Timing the Attack: Attackers may have had insider knowledge or utilized behavioral analysis to strike at the right moment and complete the transfer before detection.
  • 4. Laundering the Stolen Funds: Attackers split the stolen funds, used various anonymity tools and converted some into Bitcoin and stablecoins to obscure their tracks.

Read Full Article

like

Like

For uninterrupted reading, download the app