Event JSON
{
"id": "69a736c398fe98df447f3b8fc9fbbf9de71781dc19dd82990f20686a80dd896e",
"pubkey": "01606ee2129a65b13bacab793a337bee523cad12d3a98eba1252a3fc29f63e2b",
"created_at": 1740613711,
"kind": 1,
"tags": [
[
"r",
"https://www.coindesk.com/business/2025/02/26/bybit-and-safe-custody-blame-each-other-over-usd1-5b-hack"
],
[
"subject",
"Bybit and Safe Custody Are at Odds on Who's to Blame for $1.5B Hack"
],
[
"published_at",
"1740613599"
],
[
"image",
"https://cdn.sanity.io/images/s3y3vcno/production/03e2d9be0c65442154bdff629a58c6496d145707-1280x717.jpg?auto=format"
],
[
"p",
"01606ee2129a65b13bacab793a337bee523cad12d3a98eba1252a3fc29f63e2b",
"wss://relay-testnet.k8s.layer3.news"
],
[
"imeta",
"url https://cdn.sanity.io/images/s3y3vcno/production/03e2d9be0c65442154bdff629a58c6496d145707-1280x717.jpg?auto=format"
],
[
"t",
"crypto:perspective"
],
[
"summary",
"Bybit's review concluded that the hack was caused by a compromised Safe developer's credentials, which allowed the Lazarus hacking group to gain unauthorized access to the Safe wallet and deceive Bybit staff into signing a malicious transaction. A person familiar with the matter stated that the hack would not have been possible if Bybit had not 'blind signed' the transaction. Safe, the wallet infrastructure provider, also issued a statement denying any vulnerabilities in their smart contracts or source code."
]
],
"content": "nostr:nprofile1qy3hwumn8ghj7un9d3shjtt5v4ehgmn9wshxkwrn9ekxz7t9wgejumn9waesqgqpvphwyy56vkcnht9t0yarx7lw2g726ykn4x8t5yjj507zna379v7dtgq5\nhttps://cdn.sanity.io/images/s3y3vcno/production/03e2d9be0c65442154bdff629a58c6496d145707-1280x717.jpg?auto=format\nThe apparent stand-off mirrors that of WazirX and Liminal Custody, which blamed each other following a $230 million exploit last July.\nhttps://www.coindesk.com/business/2025/02/26/bybit-and-safe-custody-blame-each-other-over-usd1-5b-hack",
"sig": "1154f208a35f64d55788096fe706bb9fd3cba7896019bad40af8a81fba28d93a9f67b1f33b33323b2a00bb1721768b52d99e81bd117c152562683fc1f62ff66e"
}