Certik Exec explains how to keep the encryption safe after $ 1.4 billion in BYBIT
February penetration against Bitbet Tamuliz through the industry was sent after the Lazarus Collective Group in North Korea was stolen of $ 1.4 billion from the central stock exchange, which was received by the North Korean Lazarus Group, in what was the most expensive encryption theft ever.
The repercussions of hacking have left many people wondering about the error, whether their money is safe, and what to do to prevent such an event again.
According to Blockchain Security Center, the huge theft represented nearly 92 % of all the losses for February, which witnessed an increase of approximately 1500 % in the total incompatible from January as a result of the accident.
In episode 57 of the Contilligive Agenda Podcast speaks, Jonathan Dyong and Ray Salmond hosts with Certik’s chief business official, Jason Jiang, to break up how to penetrate BYBIT, the repercussions of exploitation, and what users and exchange can do to maintain Crypto Archence, and more.
Simply put, the Lazarus group managed to get rid of the massive penetration against Bybit because it managed to waive the devices from all the three positions who were controlling Safewallet bybit, according to Giang. Then the group deceived them to sign a malicious treatment that they thought was legitimate. Does this mean that Safewallet can no longer be trusted? Well, it’s not very simple, Jiang said. “It is likely that when a safe developer is penetrated, more information was leaked from this computer. But I think for individuals, the probability of this occurring is somewhat low.” He said that there are many things that the average user can do to significantly increase encryption security, including storing assets on cold wallets and awareness of potential hunting attacks on social media. source: certificate When asked if Hodlers could see the portfolio of the professor’s notebooks or Trezor used in a similar way, Jiang once again said it is not a great danger to the average user – as long as they do due care and carefully handling. He said: “One of the reasons behind this is that the two positions were similar to the blind arrangement, just because their devices did not display the full title,” adding, “Make sure that the title you send is what you intend to, and want to verify the three checks, especially for large transactions.” “I think after this incident, this is likely to be one of the things that the industry will try to correct, to make the signature more transparent and easier to get to know it. There are many other lessons that are learned, but this is definitely one of them.” Jiang pointed to the lack of comprehensive regulations and guarantee as a potential element that contributes to the ongoing consequences of penetration, which fueled discussions on the limits of decentralization after several health from the Crossshen Bridge, Thorchin refused to retreat or prohibit any of the efforts of the Lazaros group to use the protocol to convert it into Bitcoin (BTC). “Welcome to the Wild West,” said Jiang. “This is where we are now.” “From our point of view, we believe that the encryption, if it can flourish, it needs to hug the list,” he said. “To make it easy to adopt by the general group here, we need to hug the list, and we need to know ways to make this space safer.” Related to: Financial freedom means stopping MEV encryption attacks Jiang praised the CEO of bybit Ben Zhou for his response to the accident, but he also indicated that the Bug Bounty exchange before the penetration was only $ 4000. He said that although most people in cybersecurity are not driven by money alone, the presence of larger insect rewards can help stay safer. When asked about the ways in which stock exchanges and protocols can stimulate and maintain first -class talents to help protect their systems, Jiang suggested that security engineers do not always get the credit they deserve. He said: “Many people say that the first -class talent goes to the developers because this is the place where they will get a reward.” “But it is also about paying adequate attention to the security engineers. They bear a great responsibility.” “Some stagnation cut them and try to give them more credit. Whether it is cash or whether this is confession, giving them what we can bear, and making it reasonable.” To hear more Jiang conversation with Agenda Including how Certik carries out audit operations, how quantum computing and AI will affect Apple podcast or Spotify. And don’t forget to check for the complete Cointegraph collection from other offers! magazine: Bitcoin versus a quantum computer threat – timeline and solutions (2025-2035) This article is intended for general information purposes and does not aim to be and should not be considered legal or investment advice. The opinions, ideas and opinions expressed here are alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.Are the encryption portfolios still safe after a breastfeed?
How to prevent the next penetration with millions of dollars