From 7fdf6024678e1cc8ffb6caa2b4ab4bf26ad7b037 Mon Sep 17 00:00:00 2001 From: Ksenia Lesko Date: Tue, 1 Apr 2025 23:27:43 -0400 Subject: [PATCH] blog edits --- _posts/2025-03-20-bitby-report.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/_posts/2025-03-20-bitby-report.md b/_posts/2025-03-20-bitby-report.md index a19366e..eba53f2 100644 --- a/_posts/2025-03-20-bitby-report.md +++ b/_posts/2025-03-20-bitby-report.md @@ -1,7 +1,7 @@ --- layout: post -title: The Safe{Wallet}/Bybit incident report: Root cause ananlysis and mitigation strategies -date: 2025-03-20 +title: The Safe{Wallet}/Bybit incident report and mitigation strategies +date: 2025-04-02 --- The Safe{Wallet}/Bybit incident is an example of a nation-state actor executing a series of sophisticated, multi-layered attacks on high-value targets. In cases where the potential gain is significant, it may be justified for attackers to invest in multiple 0-day vulnerabilities and chain them into elaborate exploit sequences. These campaigns often span multiple layers of tech stack, involve precision-targeted social engineering, insider compromise, or even physical infiltration. @@ -34,7 +34,7 @@ Traditional infrustructure has historically lacked mechanisms to distribute trus --- -## Root aause analysis and mitigation strategies +## Root cause analysis and mitigation strategies In our opinion, the primary causes of this incident stem from two key issues identified in the [Sygnia report](https://www.sygnia.co/blog/sygnia-investigation-bybit-hack/):