JTaNvUoHt
@eicbrddiam
Now that we know who's behind the @Bybit_Official attack. Let's look at how the hack actually worked. At a high level, the hack involved the 4 broad group of events: 1. Attacker deployed a trojan contract and a backdoor contract. 2. Attacker tricked signers of the upgradeable https://t.co/5repcdcsDB
0 reply
0 recast
0 reaction