CoinInsight360.com logo CoinInsight360.com logo
A company that is changing the way the world mines bitcoin

WallStreet Forex Robot 3.0
Cryptopolitan 2025-02-21 18:34:45

Ben Zhou, CEO: Bybit is solvent, will cover all claims despite a growing withdrawal queue

In light of the $1.5B hack, which drained the exchange’s Ethereum (ETH) cold wallet, Bybit claims it remains solvent. However, the exchange is working through a bank run, with a long queue of withdrawal claims. Bybit is covering the damage of its recent hack for $1.5B, working through a queue of thousands of withdrawal claims. Bybit is facing 100 times the usual claims for withdrawals, at one point having a 3,500-4,000 claims queue, which was being processed by the entire team. ‘ We have no plans to cancel withdrawals at this stage ’, said Ben Zhou in a live stream. Zhou stated up to 70% of claims were processed, but some users may have to wait a few hours. The exchange’s P2P services remain open. Network congestion may still cause delays in withdrawal claims. Zhou estimated a loss of around 401,000 ETH, valued at around $1B. Zhou did not provide a full breakdown of other wrapped assets to estimate the exact hack. To reassure all depositors, Zhou stated that Bybit will have ETH on hand to repay in kind. Bybit has reached out to its partners and has secured a bridge loan. The exchange will not buy ETH on the open market, as this amount would be impossible to source immediately. Instead. Bybit has partnered with Binance, KuCoin, and all other major players to secure a line of credit and provide ETH for all claimants. According to Zhou, in the immediate aftermath of the attack, Bybit secured up to 80% of the potential ETH claims. Following the hack, Ethereum’s chain went through a congestion episode, with gas fees rising five times from their recent lows. The congestion is further delaying some of the withdrawal claims. The Bybit team warned seeking ETH right now may be difficult. ETH/USDT has fallen rapidly on Bybit, as traders may want to move to other assets that are easier to take off the exchange. Bybit will also work with law enforcement and regulators to track down and recover as much of the funds as possible. If all else fails, Bybit has prepared to use its treasury as compensation. Safe wallet discontinued functions to prevent new hacks The exact moment and technique by which the hacker compromised Bybit’s wallet remains uncertain. Zhou said he was the last signer of the transaction, checking the correct URL through Safe wallet. The exchange team also verified the destination address before sending it. Then, Zhou connected a Ledger device, which did not display a clear destination address. After sending 30,000 ETH, the team did not notice anything amiss. However, 30 minutes later, the entire wallet was compromised and drained. The Safe security team said they are investigating the breach to discover where the logic was changed and how the hacker could take over a multi-sig wallet. Safe’s security team is working closely with @Bybit_Official on an ongoing investigation. We have not found evidence that the official Safe frontend was compromised. However, out of caution, Safe{Wallet} is temporarily pausing certain functionalities. User security is our top… — Safe.eth (@safe) February 21, 2025 Zhou also suggested the hacker may have compromised the computers of all multi-sig wallet signers, or staged the entire transaction interface. SlowMist already discovered the malicious smart contracts, which replaced the legitimate call for a transaction between two wallets. The Ethereum security service also did not clarify when the swap happened. According to SafeMist, the hacker prepared the malicious contract on February 19. On the day of the attack, three of the Bybit multisig owners approved the connection to the malicious contract. Here are some details of the exploit: 1) A malicious implementation contract was deployed at UTC 2025-02-19 7:15:23: https://t.co/IvWIcyghW0 2) At UTC 2025-02-21 14:13:35, the attacker used three owners to sign a transaction replacing the Safe’s implementation contract with… pic.twitter.com/MbaUOOw2L2 — SlowMist (@SlowMist_Team) February 21, 2025 The SlowMist investigation still did not pinpoint the exact moment of switching the code to the malicious functions, which directly called for draining the Ethereum cold wallet. The Bybit hack surpassed the single biggest crypto heist, where $600M was taken from the Ronin bridge. This time, a single large-scale wallet held all funds in one spot, becoming vulnerable to draining. Cryptopolitan Academy: Are You Making These Web3 Resume Mistakes? - Find Out Here

면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.