Close Menu
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Categories
  • Altcoins (1,291)
  • Analysis (1,483)
  • Bitcoin (2,063)
  • Blockchain (1,196)
  • DeFi (1,412)
  • Ethereum (1,424)
  • Event (55)
  • Exclusive Deep Dive (1)
  • Landscape Ads (2)
  • Market (1,457)
  • Press Releases (1)
  • Reddit (714)
  • Regulation (1,356)
  • Security (1,955)
  • Thought Leadership (2)
  • Uncategorized (1)
  • Videos (41)
Hand picked
  • BOMBSHELL Network PI: Can furious endless migration users hold?
  • The Taco chattering of Trump pumps the best altcoins: Haussiers hidden signals
  • Zk Omnichain de Litecoin ‘litvm’ ‘unveiled at the Litecoin summit
  • Crypto price today: Bitcoin exceeds $ 105,000 as market -eyed signals and institutional flows
  • Ethereum flashes a model of optimistic morning star candlestick – Eth starts?
We are social
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Facebook X (Twitter) Instagram
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
Facebook X (Twitter) Instagram YouTube LinkedIn
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Events
Altcoin ObserverAltcoin Observer
Home»Blockchain»Violation of the appeal: How the hackers stole $ 1.5 billion without breaking the blockchain security
Blockchain

Violation of the appeal: How the hackers stole $ 1.5 billion without breaking the blockchain security

February 25, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Bkxkz1k5kx 1 313 1023 576 0 Large.jpg
Share
Facebook Twitter LinkedIn Pinterest Email


In one of the most important cryptocurrency flights to date, the hackers have infiltrated an offline Ethereum portfolio and have stolen about 1.5 billion dollars in digital assets, mainly Ethereum tokens. The attack, which targeted bybit in the cryptocurrency exchange, has raised new concerns concerning the vulnerability of the most secure storage methods. While cold portfolios and Multisignature (multisig) authentication has long been considered gold standards in the safety of digital assets, the last violation demonstrates that human error and interface manipulation can make these defenses ineffective .

The violation was detected on February 21 by the intelligence system on Check Point’s blockchain, which reported an anomaly in a transaction journal on the Ethereum network. Check Point researchers quickly determined that hacking was the result of a sophisticated attack that exploited vulnerabilities beyond the logic of intelligent contract. Instead of directly raping blockchain protocols, the attackers handled user interfaces and executed an advanced form of social engineering, deceiving key signatories to approve fraudulent transactions.

According to Check Point’s analysis, the attack led from a documented technique for the first time in July 2024, when its researchers identified an exploits model using the example function of the Safe protocol. This function, designed to allow secure multisig transactions, was armed by attackers who subtly modified legitimate transaction requests. By manipulating the interface on which the signatories relied to verify the transactions, they managed to encourage the key guards by involuntarily authorizing the massive transfer of funds.

“Bybit’s attack is not surprising – in July, we discovered the exact handling technique that the attackers exploited in this record robbery,” said Oded Vanunu, chief technology and chief of research on vulnerability products at Check Point Research. “The point to remember the most alarming is that even cold wallets – once considered the safest option – are now vulnerable. This attack proves that an approach before prevention, securing each stage of a transaction, is The only way to prevent cybercriminals from achieving a similar high -Impact attacks in the future.

This incident marks a turning point in cyber players against digital assets. Previous major hacks have generally exploited vulnerabilities in the intelligent contract code or the weaknesses of private keys management. On the other hand, the appeal attack underlines the growing sophistication of social engineering tactics, which bypass technical measures by targeting human surveillance. Check Point’s analysis stresses that no level of cryptographic security can completely protect against deception if the signatories are misleading on the transactions they approve.

The implications of this attack extend far beyond Parbit. Researchers on the control point warn that the growing trend in supply chain attacks and the user interface represents an existential threat to the safety of digital assets. While attackers refine their methods, companies with significant cryptographic assets must rethink their safety strategies. Traditional cybersecurity measures such as detection of termination threats, e-mail safety and real-time transactions verification must be integrated into the protection of cryptographic assets.

Check Point’s results suggest that a fundamental change is necessary in the way security is approached in web3 environments. Instead of based solely on smart contracts and cold storage, companies must implement the principles of zero frustrating, requiring an independent verification of transactions and air signature devices. Without these guarantees, even the most protected wallets remain sensitive to handling.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTrump prices trigger Bitcoin nosedive below $ 91,000 as altcoin crater
Next Article Why this Crypto Defi is the fastest growth of 2025

Related Posts

Blockchain

Why the intimacy in the blockchain must start with the open source

June 3, 2025
Blockchain

Bergen County launches the blockchain pilot to modernize land files, stimulate security

June 2, 2025
Blockchain

Is Cardano a good investment bet in 2025?

June 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Single Page Post
Share
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Featured Content
Event

Kenya to Host Africa’s Leading Blockchain & Crypto Conference in June 2025 

May 30, 2025

Nairobi, Kenya – May 2025 — Africa’s rapidly evolving blockchain ecosystem will take center stage…

Event

Crypto Vision Conference 2025: A Breakthrough Day for Web3 in the Philippines

May 29, 2025

Makati City, Philippines — April 26, 2025 — The AIM Conference Center was a hub…

1 2 3 … 48 Next
  • Facebook
  • Twitter
  • Instagram
  • YouTube

BOMBSHELL Network PI: Can furious endless migration users hold?

June 3, 2025

Can the Network Pi bulls apply a reversal in the face of regular sales pressure?

June 3, 2025

Hype Price draws 13% in the middle of the cryptocurrency whale trading frenzy

June 2, 2025
Facebook X (Twitter) Instagram LinkedIn
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
© 2025 Altcoin Observer. all rights reserved by Tech Team.

Type above and press Enter to search. Press Esc to cancel.

bitcoin
Bitcoin (BTC) $ 105,297.21
ethereum
Ethereum (ETH) $ 2,614.23
tether
Tether (USDT) $ 1.00
xrp
XRP (XRP) $ 2.20
bnb
BNB (BNB) $ 667.52
solana
Solana (SOL) $ 159.77
usd-coin
USDC (USDC) $ 1.00
dogecoin
Dogecoin (DOGE) $ 0.194921
tron
TRON (TRX) $ 0.270454
cardano
Cardano (ADA) $ 0.695291