https://cointelegraph.com/news/radiant-capital-attacker-compromised-multiple-developers-devices-post-mortem

The type of hack we often hear about, but actually in the wild. Wild.

Reply to this note

Please Login to reply.

Discussion

These things are very common.

Two things to bear in mind are: most of the sophisticated L2/defi stuff happening has ultimate control/backdoor on supposedly decentralized smart contracts, through a multisig key. As in this case. Which means a central point of failure that can be attacked, albeit it takes considerable effort on the attacker's part.

Two: absent external attackers, there's still a lot of danger in this model: like an ecash mint, the multisig quorum members can walk off with the funds *or fake an external attack*. And they can also lose the system's funds just because of an error.

rekt.news was reporting like 4 or 5 events of this type per week in the 22-23 period.

The most concerning part of this story is malware fooling a hardware wallet. Trusting an ETH L2 is pretty reckless on its own.

I wonder the security practices for HWW manufacturing now, especially ones with an STM32 handling keys or whatever.

I don't think it speaks directly to an issue with malware and hardware wallets generally; they had some kind of custom procedure for authorising transactions which got sent to a HW in the background, from what it says there (the medium link 404s so I'm just going on what's reported in cointelegraph). It sounds like the transactions did actually trigger warnings but in the software layer above the HW? Anyway details, basically this was not an attack on HW unless the article is completely wrong?