Close Menu
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Categories
  • Altcoins (1,147)
  • Analysis (1,349)
  • Bitcoin (1,923)
  • Blockchain (1,113)
  • DeFi (1,320)
  • Ethereum (1,315)
  • Event (48)
  • Exclusive Deep Dive (1)
  • Landscape Ads (2)
  • Market (1,361)
  • Reddit (574)
  • Regulation (1,266)
  • Security (1,817)
  • Thought Leadership (1)
  • Uncategorized (3)
  • Videos (39)
Hand picked
  • Ethereum Pectra upgrade: what’s coming
  • Banks have just received the green light: WOI erases the role of cryptographic trading
  • New EU regulation to follow crypto transfers and prohibit confidentiality
  • XRP for health care: Welgistics secures $ 50 million in credit for pioneer blockchain payments
  • Dow decreases 119 points, nasdaq inches higher, Bitcoin settles at $ 103,000 in the middle of rumors in China in China
We are social
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Facebook X (Twitter) Instagram
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
Facebook X (Twitter) Instagram YouTube LinkedIn
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Events
Altcoin ObserverAltcoin Observer
Home»Blockchain»Violation of the appeal: How the hackers stole $ 1.5 billion without breaking the blockchain security
Blockchain

Violation of the appeal: How the hackers stole $ 1.5 billion without breaking the blockchain security

February 25, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Bkxkz1k5kx 1 313 1023 576 0 Large.jpg
Share
Facebook Twitter LinkedIn Pinterest Email


In one of the most important cryptocurrency flights to date, the hackers have infiltrated an offline Ethereum portfolio and have stolen about 1.5 billion dollars in digital assets, mainly Ethereum tokens. The attack, which targeted bybit in the cryptocurrency exchange, has raised new concerns concerning the vulnerability of the most secure storage methods. While cold portfolios and Multisignature (multisig) authentication has long been considered gold standards in the safety of digital assets, the last violation demonstrates that human error and interface manipulation can make these defenses ineffective .

The violation was detected on February 21 by the intelligence system on Check Point’s blockchain, which reported an anomaly in a transaction journal on the Ethereum network. Check Point researchers quickly determined that hacking was the result of a sophisticated attack that exploited vulnerabilities beyond the logic of intelligent contract. Instead of directly raping blockchain protocols, the attackers handled user interfaces and executed an advanced form of social engineering, deceiving key signatories to approve fraudulent transactions.

According to Check Point’s analysis, the attack led from a documented technique for the first time in July 2024, when its researchers identified an exploits model using the example function of the Safe protocol. This function, designed to allow secure multisig transactions, was armed by attackers who subtly modified legitimate transaction requests. By manipulating the interface on which the signatories relied to verify the transactions, they managed to encourage the key guards by involuntarily authorizing the massive transfer of funds.

“Bybit’s attack is not surprising – in July, we discovered the exact handling technique that the attackers exploited in this record robbery,” said Oded Vanunu, chief technology and chief of research on vulnerability products at Check Point Research. “The point to remember the most alarming is that even cold wallets – once considered the safest option – are now vulnerable. This attack proves that an approach before prevention, securing each stage of a transaction, is The only way to prevent cybercriminals from achieving a similar high -Impact attacks in the future.

This incident marks a turning point in cyber players against digital assets. Previous major hacks have generally exploited vulnerabilities in the intelligent contract code or the weaknesses of private keys management. On the other hand, the appeal attack underlines the growing sophistication of social engineering tactics, which bypass technical measures by targeting human surveillance. Check Point’s analysis stresses that no level of cryptographic security can completely protect against deception if the signatories are misleading on the transactions they approve.

The implications of this attack extend far beyond Parbit. Researchers on the control point warn that the growing trend in supply chain attacks and the user interface represents an existential threat to the safety of digital assets. While attackers refine their methods, companies with significant cryptographic assets must rethink their safety strategies. Traditional cybersecurity measures such as detection of termination threats, e-mail safety and real-time transactions verification must be integrated into the protection of cryptographic assets.

Check Point’s results suggest that a fundamental change is necessary in the way security is approached in web3 environments. Instead of based solely on smart contracts and cold storage, companies must implement the principles of zero frustrating, requiring an independent verification of transactions and air signature devices. Without these guarantees, even the most protected wallets remain sensitive to handling.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTrump prices trigger Bitcoin nosedive below $ 91,000 as altcoin crater
Next Article Why this Crypto Defi is the fastest growth of 2025

Related Posts

Blockchain

Truf.network ai Toolkit: unlock the power of AI in the blockchain

May 9, 2025
Blockchain

Sol Strategies Exploration of pathway to tokenize shares on Solana Blockchain

May 9, 2025
Blockchain

Robinhood Eyes Blockchain Twist to bring us actions to EU merchants

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Single Page Post
Share
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Featured Content
Videos

Tokenomics : The Mechanics and Magic of Decentralized Funding | Jason Fernandes | TEDxSDMIMD Mysuru

May 9, 2025

The Mechanics and Magic of Decentralized Funding explores the powerful intersection of blockchain technology, economic…

Event

Altcoin Observer – Official Media Partner for Dutch Blockchain Week 2025

May 9, 2025

30% off DBW Summit! Use code OBSERVER30 at dutchblockchainweek.com. Only for A.O and AdLunam Community …

1 2 3 … 44 Next
  • Facebook
  • Twitter
  • Instagram
  • YouTube

XRP for health care: Welgistics secures $ 50 million in credit for pioneer blockchain payments

May 10, 2025

Trader says that the market has prepared a strong reversal after a bull movement – here is its target for Ethereum and Altcoins

May 9, 2025

The commissioner of the dry criticizes the Ripple agreement, warns of the weakening of the legal authority

May 9, 2025
Facebook X (Twitter) Instagram LinkedIn
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
© 2025 Altcoin Observer. all rights reserved by Tech Team.

Type above and press Enter to search. Press Esc to cancel.

bitcoin
Bitcoin (BTC) $ 103,228.66
ethereum
Ethereum (ETH) $ 2,339.32
tether
Tether (USDT) $ 1.00
xrp
XRP (XRP) $ 2.37
bnb
BNB (BNB) $ 661.42
solana
Solana (SOL) $ 171.68
usd-coin
USDC (USDC) $ 1.00
dogecoin
Dogecoin (DOGE) $ 0.209463
cardano
Cardano (ADA) $ 0.78096
tron
TRON (TRX) $ 0.263531