
North Korea's Unprecedented $1.5 Billion Crypto Heist Exploited Human Element, Not Code (arstechnica.com) 21
North Korean hackers have executed the largest cryptocurrency theft in history, draining $1.5 billion from Dubai-based exchange Bybit by compromising its multisignature cold wallet system. The attackers stole over 400,000 ethereum and staked ethereum coins without exploiting code vulnerabilities or infrastructure.
Security researchers from Elliptic identified North Korean signatures in the subsequent laundering operations, consistent with the nation's ongoing cryptocurrency theft operations that fund its weapons programs. Investigators determined the hackers manipulated the user interfaces on multiple Bybit employees' devices simultaneously, tricking authorized personnel into approving what appeared to be legitimate transactions. This sophisticated attack "altered the smart contract logic and masked the signing interface," according to Bybit's disclosure.
"The Bybit hack has shattered long-held assumptions about crypto security," noted researchers at Check Point. "No matter how strong your smart contract logic or multisig protections are, the human element remains the weakest link."
Security researchers from Elliptic identified North Korean signatures in the subsequent laundering operations, consistent with the nation's ongoing cryptocurrency theft operations that fund its weapons programs. Investigators determined the hackers manipulated the user interfaces on multiple Bybit employees' devices simultaneously, tricking authorized personnel into approving what appeared to be legitimate transactions. This sophisticated attack "altered the smart contract logic and masked the signing interface," according to Bybit's disclosure.
"The Bybit hack has shattered long-held assumptions about crypto security," noted researchers at Check Point. "No matter how strong your smart contract logic or multisig protections are, the human element remains the weakest link."
Weakest link (Score:4)
Re: (Score:1)
This is NOT exploiting human weaknesses. No more than getting a back door into Linux code would be. I mean you could say that humans should review every line of code before running it, but that would be wrong, stupid, and a huge copout.
Theres a difference (Score:2)
Re:Theres a difference (Score:5, Insightful)
Even if it was the north koreans, what can dubai do about it? There is no legal route - no law enforcement cooperation between these countries etc. Doing an off the books operation would be risky, with no guarantee of success, and who would they target?
And that's assuming the north koreans are responsible at all, as you point out it was a highly sophisticated attack so the perpetrators should be more than capable of covering their tracks, perhaps they did by laying a false trail that pointed to north korea?
Re: (Score:3)
All true.
I would also suggest that the DPRK might even be 'just fine' with being caught. Sure it may give away some 'methods and practices' but honestly most of these techniques are open secrets anyway. DPRK has a limited set of levers on the world stage and all of them have been reduced in potential effectiveness or been impaired with serious potential for blow back in one way or another. Like China deciding to cut them off if they do something to 'incompatible' with China's other diplomatic ambitions lik
Re: (Score:2, Insightful)
They didn't leave a signature. A signature was detected when they laundered the money.
That's the thing about cryptocurrency. At some point if they need real cash then that has to go through a system that can be traced just like always.
Originally the idea behind Bitcoin was to trade the coin itself as currency and remove the need for government based monetary systems. For the most part that has not worked out because commercial entities have to play by the old rules.
Re: (Score:2)
Not to mention, NK and Russia are friends as you say, since NK sends troops to Ukraine.
and (Score:4, Funny)
nothing of value was lost.
Bogus headline (Score:5, Insightful)
Re: (Score:2)
> The details in TFA do not support any claims that code wasn't exploited
None of the news stories on this make sense.
I get that "the news is fake" most of the time but this one smacks of half-the-story.
It sure sounds like there's a mole somewhere between Kim and the CEO (who protected customer funds).
Re: (Score:2)
Weasel words (Score:2)
> This sophisticated attack "altered the smart contract logic and masked the signing interface,"
So it wasn't' a very "smart contract" then, if it could be so easily altered. I suspect my old paper contract is probably "smarter", or at least using it would be.
The old saying "a fool and his money..." should be forked to be "a crypto exchange and its money...". Are any of them actually capable of running a service without getting hacked? They're an obvious target, which ups the ante rather a lot, but are an
Re: (Score:2)
> So it wasn't' a very "smart contract" then, if it could be so easily altered.
reportedly:
It was just a fake contract presented by phishing.
They outsourced their security to a third party web service so they had to be Internet connected.
---
For $40B I will fire up a dedicated laptop and plug in a serial cable, but apparently that's just me.
"Why bother with all that when TrustMeBro.com is only $99/mo?"
Whomever sold that idea might be worth looking into more.
I have an idea (Score:2)
Re: (Score:3)
Brilliant!! Let's see millions of people die because you have some cockeyed notion it "get it back".
LOL let's do it again (Score:4, Insightful)
Crypto is a nothing more than a decentralized, crowd-funded Ponzi scheme.
Try that with a real bank (Score:2)
No luck? I wonder why that is ...
A multisig wallet is not a cold wallet (Score:3)
N/T
This good for BitCoin! (Score:2)
It really is bro!
something does not add up (Score:2)
> without exploiting code vulnerabilities or infrastructure ... manipulated the user interfaces on multiple Bybit employees' devices simultaneously, tricking authorized personnel
Bybit is saying that these manipulated user interfaces are normal operation.