The wallet that assembled the transaction is a web wallet. Months ago, the web wallet's host, Amazon S3, was breached and a single JavaScript file was slightly modified from the original source code, which is available for everybody to see. The modification changes the recipient ONLY when ByBit's cold wallet is being used.
ByBit then took the assembled version with the malicious code and signed with all their multisig cold signers without verifying that the receiving address has been changed to the attacker.
Scary stuff 😨. Protecting the entire Software supply chain is no longer just a bunch of buzzwords used by vendors, nor unrealistic stuff that "paranoid" devs like to talk about. It's now a real necessity.
Thread collapsed
Wow, ok thank you for that. Wild. Security is very hard. After the trucker protest I recognized how many attack vectors there are. Tbh as a relative laymen it’s apparent that even the OS we use themselves preclude ‘safety’ the best I have been able to come up with is coldcard airgapped and even then the risks are omnipresent when attempting to sign.
Thread collapsed