Safe published a preliminary report connected Mar. 6 attributing the breach that led to the Bybit hack to a compromised developer laptop. The vulnerability resulted successful the injection of malware, which allowed the hack.
The perpetrators circumvented multi-factor authentication (MFA) by exploiting progressive Amazon Web Services (AWS) tokens, enabling unauthorized access.
This allowed hackers to modify Bybit’s Safe multi-signature wallet interface, changing the code to which the speech was expected to nonstop astir $1.5 cardinal worthy of Ethereum (ETH), resulting successful the largest hack successful history.
Compromise of developer workstation
The breach originated from a compromised macOS workstation belonging to a Safe developer, referred to successful the study arsenic “Developer1.”
On Feb. 4, a contaminated Docker task communicated with a malicious domain named “getstockprice[.]com,” suggesting societal engineering tactics. Developer 1 added files from the compromised Docker project, compromising their laptop.
The domain was registered via Namecheap connected Feb. 2. SlowMist aboriginal identified getstockprice[.]info, a domain registered connected Jan. 7, arsenic a known indicator of compromise (IOC) attributed to the Democratic People’s Republic of Korea (DPRK).
Attackers accessed Developer 1’s AWS relationship utilizing a User-Agent drawstring titled “distrib#kali.2024.” Cybersecurity steadfast Mandiant, tracking UNC4899, noted that this identifier corresponds to Kali Linux usage, a toolset commonly utilized by violative information practitioners.
Additionally, the study revealed that the attackers utilized ExpressVPN to disguise their origins portion conducting operations. It also highlighted that the onslaught resembles erstwhile incidents involving UNC4899, a menace histrion associated with TraderTraitor, a transgression corporate allegedly tied to DPRK.
In a anterior lawsuit from September 2024, UNC4899 leveraged Telegram to manipulate a crypto speech developer into troubleshooting a Docker project, deploying PLOTTWIST, a second-stage macOS malware that enabled persistent access.
Exploitation of AWS information controls
Safe’s AWS configuration required MFA re-authentication for Security Token Service (STS) sessions each 12 hours. Attackers attempted but failed to registry their ain MFA device.
To bypass this restriction, they hijacked progressive AWS idiosyncratic league tokens done malware planted connected Developer1’s workstation. This allowed unauthorized entree portion AWS sessions remained active.
Mandiant identified 3 further UNC4899-linked domains utilized successful the Safe attack. These domains, besides registered via Namecheap, appeared successful AWS web logs and Developer1’s workstation logs, indicating broader infrastructure exploitation.
Safe said it has implemented important information reinforcements pursuing the breach. The squad has restructured infrastructure and bolstered information acold beyond pre-incident levels. Despite the attack, Safe’s astute contracts stay unaffected.
Safe’s information programme included measures specified arsenic restricting privileged infrastructure entree to a fewer developers, enforcing separation betwixt improvement root codification and infrastructure management, and requiring aggregate adjacent reviews earlier accumulation changes.
Moreover, Safe vowed to support monitoring systems to observe outer threats, behaviour autarkic information audits, and utilize third-party services to place malicious transactions.
The station Safe’s interior probe reveals developer’s laptop breach led to Bybit hack appeared archetypal connected CryptoSlate.