Close Menu
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
What's Hot

Here is how crypto firms are adapting as AI is increasingly eating into venture capital fundings

April 19, 2026

Your Crypto White Paper Can’t Just Be a Gitbook or PDF

April 19, 2026

Direct Meds GLP-1 2026: Claims Examined, Pricing Verified & What Consumers Should Confirm Before Buying

April 19, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
CryptoPulseDaily.com
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
CryptoPulseDaily.com
Home»Wallets and Exchanges»Safe’s internal investigation reveals developer’s laptop breach led to Bybit hack
Wallets and Exchanges

Safe’s internal investigation reveals developer’s laptop breach led to Bybit hack

March 9, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

Safe published a preliminary report on Mar. 6 attributing the breach that led to the Bybit hack to a compromised developer laptop. The vulnerability resulted in the injection of malware, which allowed the hack.

The perpetrators circumvented multi-factor authentication (MFA) by exploiting active Amazon Web Services (AWS) tokens, enabling unauthorized access.

This allowed hackers to modify Bybit’s Safe multi-signature wallet interface, changing the address to which the exchange was supposed to send roughly $1.5 billion worth of Ethereum (ETH), resulting in the largest hack in history.

Compromise of developer workstation

The breach originated from a compromised macOS workstation belonging to a Safe developer, referred to in the report as “Developer1.”

On Feb. 4, a contaminated Docker project communicated with a malicious domain named “getstockprice[.]com,” suggesting social engineering tactics. Developer 1 added files from the compromised Docker project, compromising their laptop.

The domain was registered via Namecheap on Feb. 2. SlowMist later identified getstockprice[.]info, a domain registered on Jan. 7, as a known indicator of compromise (IOC) attributed to the Democratic People’s Republic of Korea (DPRK). 

Attackers accessed Developer 1’s AWS account using a User-Agent string titled “distrib#kali.2024.” Cybersecurity firm Mandiant, tracking UNC4899, noted that this identifier corresponds to Kali Linux usage, a toolset commonly used by offensive security practitioners. 

Additionally, the report revealed that the attackers used ExpressVPN to mask their origins while conducting operations. It also highlighted that the attack resembles previous incidents involving UNC4899, a threat actor associated with TraderTraitor, a criminal collective allegedly tied to DPRK. 

In a prior case from September 2024, UNC4899 leveraged Telegram to manipulate a crypto exchange developer into troubleshooting a Docker project, deploying PLOTTWIST, a second-stage macOS malware that enabled persistent access.

See also  Former FTX executives Backpack exchange expands to 11 US states

Exploitation of AWS security controls

Safe’s AWS configuration required MFA re-authentication for Security Token Service (STS) sessions every 12 hours. Attackers attempted but failed to register their own MFA device. 

To bypass this restriction, they hijacked active AWS user session tokens through malware planted on Developer1’s workstation. This allowed unauthorized access while AWS sessions remained active.

Mandiant identified three additional UNC4899-linked domains used in the Safe attack. These domains, also registered via Namecheap, appeared in AWS network logs and Developer1’s workstation logs, indicating broader infrastructure exploitation.

Safe said it has implemented significant security reinforcements following the breach. The team has restructured infrastructure and bolstered security far beyond pre-incident levels. Despite the attack, Safe’s smart contracts remain unaffected.

Safe’s security program included measures such as restricting privileged infrastructure access to a few developers, enforcing separation between development source code and infrastructure management, and requiring multiple peer reviews before production changes.

Moreover, Safe vowed to maintain monitoring systems to detect external threats, conduct independent security audits, and utilize third-party services to identify malicious transactions.

Mentioned in this article

Source link

Breach Bybit Developers Hack Internal Investigation Laptop Led Reveals Safes
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Russia-linked Grinex exchange halts operations after $13 million ‘state-backed’ hack

April 17, 2026

Cookeville Hospital Discloses Rhysida Breach Hitting 337,917

April 16, 2026

Kraken is actively being extorted by criminals threatening to release the top crypto exchange’s internal data

April 14, 2026

‘Outlaw code, lose innovation’ – White House defends DeFi developers’ protections in CLARITY Act

April 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

A toxic trend that suggests the IPO window is slamming shut for most crypto companies ignored Circle

December 19, 2025

Cookeville Hospital Discloses Rhysida Breach Hitting 337,917

April 16, 2026

Solana: Why a move past $60 could occur soon

November 24, 2023

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

Our mission is to develop a community of people who try to make financially sound decisions. The website strives to educate individuals in making wise choices about Crypto, ICOs, Web3, Blockchain and more.

We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

Here is how crypto firms are adapting as AI is increasingly eating into venture capital fundings

April 19, 2026

Your Crypto White Paper Can’t Just Be a Gitbook or PDF

April 19, 2026

Direct Meds GLP-1 2026: Claims Examined, Pricing Verified & What Consumers Should Confirm Before Buying

April 19, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 Crypto Pulse Daily - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.

Cleantalk Pixel
  • bitcoinBitcoin(BTC)$75,247.00-1.12%
  • ethereumEthereum(ETH)$2,319.57-1.62%
  • tetherTether(USDT)$1.000.00%
  • rippleXRP(XRP)$1.42-0.92%
  • binancecoinBNB(BNB)$620.62-2.08%
  • usd-coinUSDC(USDC)$1.000.00%
  • solanaSolana(SOL)$84.82-2.41%
  • tronTRON(TRX)$0.3316181.07%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.041.31%
  • dogecoinDogecoin(DOGE)$0.093920-2.56%