How an Attacker Drained $50M from a DeFi Protocol Through Role Escalation
By: Dikla Barda, Roaman Zaikin & Oded Vanunu After reviewing the off-chain forensic report, we can now provide additional insights into the Bybit attackmechanism. Security researchers have determined that hackers injected malicious JavaScript directly into Safe’sonline infrastructure hosted on AWS. The code was specifically designed to activate only wheninteracting with Bybit’s contract address, allowing it […]
The post How an Attacker Drained $50M from a DeFi Protocol Through Role Escalation appeared first on Check Point Research.