Safe confirms the reset of the full infrastructure after February Beett
SAFE confirmed the fully reinforced infrastructure after the electronic attack on February 21, 2025, which led to BYBIT systems.
The attack, which is attributed to North Korea’s Tradertraitor group, has sparked serious concerns about the exposure of each central and decentralized encryption platforms. The last Cyber-Chacerack prompted Amna {Wallet} to take urgent measures to secure its infrastructure and prevent future violations.
Reset safe infrastructure and enhance security measures
As part of its response to a bybit penetration, he believed Start Comprehensive security reform. The reinforced infrastructure includes recycling all accreditation data, reset groups, design update, and re -publishing container photos. These measures are designed to fortify Safe {Wallet} and restore their services with more powerful protection.
In addition to the resetting of the infrastructure, Safe {Wallet} has strengthened the detection of harmful transactions. The platform has partnered with Blockaid to improve surveillance systems, which now provides more sophisticated discovery capabilities. This cooperation aims to prevent any other non -authorized transactions and protect users’ money from future risks.
Safe {Wallet} has increased the discovery of the actual threat across all layers of her group. By strengthening its monitoring systems, the platform aims to improve the vision of potential security threats and reduce response times. These steps are expected to increase the total flexibility of the platform against electronic attacks.
Cooperation with the continuous and continuous investigation
Spread the BYBIT Hack team, the Safe {Wallet} team is closely with Mandriat, a cyber security company, to investigate the attack. Mandyan was helping to analyze security breach and reveal how the attackers exceeded many security classes.
According to the latest results, the attack was very advanced and participated in kidnapping the distinctive symbols of the AWS session, allowing the attackers to overcome the components of the multi -factor authentication.
The Mandyant’s preliminary report emphasizes the participation of the Tradertraitor group, which is famous for its relationship with piracy activities in North Korea. This group has been linked to the previous prominent stolen stolen. The investigation continues, with efforts to understand the full scope of the attackers’ actions and define any remaining weaknesses in the safe infrastructure {wallet}.
Lazarus has now washed BYBIT
They have mainly transferred 500,000 ETH to the original BTC.
Thorchain has processed more than $ 5.5 billion in size since BYBIT was penetrated on February 21. pic.twitter.com/jmow4akxd2
Archham (Rechham) March 4, 2025
In addition to the results of Mandriat, the Blockchain Arkham research company tracks the activities of the attackers. On March 4, Arkham reported that the Lazarus group, linked to the North Korean system, has succeeded in washing BYBIT Hack Re returns. The money was transferred through various channels, including the original bitcoin transactions, and this washing process was closely monitored.
Action taken to enhance external access and user security
After penetrating byBit, Safe {Wallet} has applied many measures to reduce external access and enhance user safety. The platform has temporarily restricted external access to transactions service and imposed the most striking protection wall rules on external services. These measures aim to prevent further attacks while the investigation continues.
Safe {Wallet} also temporarily disabled the signature of the original devices portfolio due to the potential risks associated with devices. While the support of the original device portfolio has been disabled, users can still access their wallets via Walletconnect. This procedure was taken to protect users with an investigation also at potential weaknesses in the wallet ecosystems.
To increase security enhancement, a safe {wallet} has been wiped all the transactions suspended in the waiting list of its databases. This preventive step was taken to get rid of the possibility of a human error and reduce the risk of any transactions at risk during the recovery process. In addition, the statute provided a third -party verification tool, “UTILS Safe”, which enables users to independently verify the fragmentation of transactions.
Responsibility: Is market research before investing in encrypted currencies? The author or post does not bear any responsibility for your personal financial loss.
partner: