gtag('config', 'G-0PFHD683JR');
Bitcoin

Post -death CZ criticizes a breed

Changing Chau (CZ), former Binance CEO, criticized a post -death update to a BYPIT penetration, describing him “not big” and increased concerns about how the attackers appoint many signers.

His comments follow a audit report stating that the breach resulted in a SAFE’s compromise solution instead of the stock exchange systems.

A safe response

Criminal investigations found that a safe portfolio accreditation data led to the exploitation of Beetb of approximately $ 1.5 billion. In a statement on Wednesday, the Crypto Wallet wallet provider confirmed the results, noting that the penetration stems from a “safe portfolio machine at risk.”

Company High The reports did not specify the weaknesses of its smart contracts or the front source code. It also announced that it had rebuilt its infrastructure, reshaping it and changing all credit papers, ensuring that the attacking head was “completely eliminated.”

However, CZ criticize The statement, saying:

“This SAFE update is not great. It uses a mysterious language to clean the issues. I have more questions than the answers after reading them.”

He wondered what it means to “waive a safe developer {wallet}” and how the attack occurred, and asked whether social engineering or virus is involved. He also inquired about how to access the developer device to an account that is managed by bybit and whether the code was published directly in production.

More concerns have been raised about how the attackers exceeded the professor’s notebook, or whether the signature of the blind was involved, or if the two positions fail to verify properly.

Report and updates

On February 26, bybit Absolute Cegenia and Ferrichin’s forensic review on the attack. The review revealed that Safe Developer’s accreditation data has been at risk, allowing infiltrators to access the portfolio of the wallet, which led to the deception of the two positions to agree to harmful treatment.

According to the report, the exploitation was implemented using the harmful “JavaScript code” that was injected into the Amazon’s Safe two days ago. The text program is activated only when the transactions came from specific contract addresses, including a multi -Sig -for -suspected address to the criminal.

Just two minutes after the hack, the attackers removed the harmful code from the Safe and disappeared. Forensic and company experts also confirmed that the BYBIT infrastructure was not at risk.

Since the accident, he has a bybit Borrow 40,000 ETH from Bitget to meet withdrawal requirements, which have been paid since then. The company also restored its reserves through loans, buying assets and whale deposits, as it received 446,870 ETHs at a value of $ 1.23 billion. CEO Ben Chu certain The stock exchange now has 100 % support for customer assets.

Special offer (sponsored)

Binance Free $ 600 (Full Details).

Limited offer for Cryptopotato readers in Bybit: Use this link to register and open a 500 -dollar free site on any coin!

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button