Today's data and statistics will be sent out tomorrow. Benefits of registering with the Kongge link: The handling fee can be saved by tens to thousands of U a week, which is quite considerable in a year. 🪂If you need to spend, save what you can. If you watch my content for a long time and are willing to support me, you can share the invitation link below with your friends around you. 😘 Benefit link: https://www.binance.com/join?ref=XBXFHXC1 Kongge exclusive benefit code: XBXFHXC1
#tst The poisonous tongue hunter in the currency circle is here again. Yesterday, he openly called for an IP short position. Then the drop of more than 7% came as expected. Today, the tst is trading. It seems to be at the end of its strength! 1️⃣h has weakened! Brother Hunter hopes to be slapped in the face by the dog dealer this time😃
Level up and fight monsters with Brother Saoge to improve yourself, let's go! We still have infinite possibilities.
独领风骚必暴富
--
速度点此立即进骚哥专属聊天室3000就进不去了马上满名额了 3,000 people will send the password before the end of the month🧧Sprint to 3,000 people! Wake up, come and get the good luck of Brother Sao🧧 Let's cross the bull and bear markets together Self-abandonment will not solve any problems, and frequent all-in will not solve any problems! Officially failed, face losses! Welcome a new beginning!
Brother Sao's 20% discount on handling fees, the latest Binance free registration link: https://www.marketwebb.ac/join?ref=SO0N4UQV (copy the browser to register directly) Brother Sao's exclusive invitation code for Binance: SO0N4UQV If you haven't done rebates, you can recommend your family to do it! $ETH
23 years of structural trading techniques: (quote post) Here is a preview, next week I will combine this article to refine several structural techniques. Trading does not require you to know a lot, but you must understand why you enter the market. If you don’t have this, it is gambling, not trading. I like her, I love her, but if you don’t understand her, your love is a burden, and your winning rate cannot be 50%.
Based on the information available as of February 22, 2025, here’s a detailed breakdown of how approximately 401,347 ETH (valued at over $1.4 billion) was stolen from Bybit, one of the largest cryptocurrency exchanges. The hack occurred on February 21, 2025, targeting Bybit’s Ethereum multisignature (multisig) cold wallet—a secure, offline storage system designed to protect funds. According to Bybit’s CEO, Ben Zhou, and official statements, the attackers used a sophisticated method involving a "masked" transaction. Here’s how it unfolded: - **The Setup**: Bybit was performing a routine transfer of ETH from its cold wallet to a warm wallet (an online wallet used for daily operations). This process required multiple signers to approve the transaction, a standard security feature of multisig wallets. - **The Deception**: The hackers manipulated the transaction by compromising the signing interface. They presented a fake user interface (UI) that appeared legitimate to the signers. This UI displayed the correct recipient address and seemed to originate from Safe.global, the wallet provider Bybit uses for its multisig setup. However, the underlying transaction was altered. - **The Exploit**: Instead of approving a simple transfer, the signers unknowingly signed a message that changed the smart contract logic governing the cold wallet. This alteration handed control of the wallet to the attacker. Essentially, the signers thought they were authorizing a standard move of funds, but they were actually giving the hacker the keys to the wallet. - **The Theft**: Once in control, the attacker drained all the ETH from the compromised cold wallet—totaling 401,347 ETH—along with additional Ethereum-based assets like 90,376 stETH ($253 million), 15,000 cmETH ($44 million), and 8,000 mETH ($23 million). These funds were sent to an unidentified address and later split across multiple wallets (initially 39, then over 40) to obscure the trail. - **The Aftermath**: The stolen ETH was converted from other tokens (like stETH and mETH) into regular ETH and moved systematically, often in batches like 10,000 ETH, as noted in recent X posts and blockchain analyses. Bybit confirmed that only this specific ETH cold wallet was affected, and other wallets (hot, warm, and remaining cold wallets) remained secure. The method relied heavily on social engineering and phishing tactics, tricking human signers rather than exploiting a flaw in the Ethereum blockchain itself. The attackers likely used a counterfeit signing interface—possibly by compromising the Safe wallet provider’s system or mimicking its UI—to execute the heist. Zhou speculated during a livestream that the Safe server might have been hacked, though Safe issued a statement denying evidence of a frontend compromise and paused some functionalities as a precaution. Blockchain investigator ZachXBT and firms like Arkham Intelligence traced the funds and linked the attack to North Korea’s Lazarus Group, a prolific hacking collective. ZachXBT’s analysis, which earned a $50,000 bounty from Arkham, included test transactions and wallet connections tying this hack to a prior Phemex exploit, suggesting a coordinated campaign. The hacker now holds about 0.42% of Ethereum’s total supply, making them one of the largest ETH holders globally. Bybit has emphasized that it remains solvent, with client funds backed 1:1, and has secured bridge loans (e.g., 64,452 ETH from Bitget and 11,800 ETH from a whale via Binance) to cover losses and maintain operations. Withdrawals continued normally, though ETH withdrawals were briefly impacted until liquidity was restored. This hack stands out as the largest in crypto history, surpassing the 2022 Ronin Network theft of $625 million, due to its scale and the sophisticated deception involved.
To ensure the security of virtual assets, multiple protective measures are crucial. I. Basic Protection
- Hardware Wallets: Use offline ones like Ledger and Trezor. Store most assets there to keep them away from long online exposure. - Private Keys: Never screenshot, cloud-store or communicate them via tools. Handwrite on fireproof and waterproof media. - 2FA: Bind it to all accounts. Opt for Google Authenticator over SMS to dodge SIM hijacking. - Passwords: Set unique, strong passwords (12+ chars, mixed case and symbols) and update every 3 months.
II. Operational Security
- Phishing: Check URLs closely. Avoid clicking suspicious links in emails or texts. - Smart Contracts: Audit via platforms like CertiK and SlowMist before interaction. - Cold Storage: Diversify assets across multiple cold wallets to prevent total loss. - Test Transfers: Send a tiny amount first to confirm address and on-chain status.
III. Devices & Environment
- Secure Devices: Use dedicated ones without social apps for encrypted assets to avoid malware. - System Cleanup: Clear cache and cookies. Use virtual machines or sandboxes for high-risk tasks. - Protection Software: Deploy antivirus (e.g., Malwarebytes) and firewall. Scan regularly. - Backup: Store mnemonic shards separately, like in a bank box or with a trusted person.
IV. Platforms & Compliance
- Platforms: Choose regulated and reputable exchanges (e.g., Coinbase, Kraken) and check their security records. - On-Chain Monitoring: Set alerts on blockchain explorers (e.g., Etherscan) for abnormal transfers. - Revoke Permissions: Use tools like Revoke.cash to cancel unused DApp contract rights.
V. Awareness & Emergency
- Social Engineering: Beware of fake services and impostors. Never share private keys or codes. - Drills: Make an asset transfer plan for key leaks and practice it. - Learning: Follow security communities (e.g., r/CryptoCurrency) and vulnerability channels.
Tips
- Legal: Keep records for tax and avoid anonymous coin mixing. - Social: Don't publicize asset scale to avoid attacks. #bybit被盗 $BTC $ETH