pkt on Nostr: This hack reminds me of the audit I did on a Bitcoin custodian a while back. They had ...
This hack reminds me of the audit I did on a Bitcoin custodian a while back.
They had a fancy multisig setup. But the source code for that setup was stored on AWS, and they didn't PGP sign it, let alone verify it.
They had a fancy multisig setup. But the source code for that setup was stored on AWS, and they didn't PGP sign it, let alone verify it.
quoting nevent1q…56fnSo the ByBit attack was able to happen because:
Gnosis Safe front end is a web app whose JavaScript gets served from an Amazon S3 bucket.
A Gnosis Safe developer had production AWS keys saved on their machine.
The Dev's machine was compromised and the AWS key used to deploy a malicious front end that only targeted ByBit's wallet.
JavaScript web apps have no cryptographic integrity checks to ensure the code being delivered was actually written by the expected author.
Signing complex EVM transactions can't be done securely on airgapped hardware because the hardware simply doesn't have all of the contextual information needed to know the outcome of executing the transaction.