A Business Insider Threat Attack? – Cryptokoin.com

Metaguard CEO Savaş Yodem, cryptocoin.com discussed the Binance hack event that shook the market for its readers. Binance Hacked/BNB Hacked took place on 07 October 2022. An attacker stole 2M BNB (~566M USD) from Binance Bridge. When I wanted to analyze the event in terms of Cyber ​​Security, the results I found led me to a very familiar type of attack, Enterprise Internal Threat Attacks.

BNB Hacked truth: A Business Insider Threat Attack?

The cyber attacker convinced Binance Bridge to send 1,000,000 BNB with the Smart Contract vulnerability, which he found, twice. Binance, as I just learned, has a special Smart Contract that is used to validate “IAVL Trees” transactions. If you don’t know anything about “IAVL Trees” operations, don’t worry. Few people know about this contract anyway.

Basically, when an “IAVL Trees” transaction is validated, a list of “operations” is specified, and then Binance Bridge typically waits for a response from either, one an “iavl : v” transaction and the other a “multistore” transaction. Both transactions had to be successful for a proof to be established. At this point, the cyber attacker seems to have succeeded with the manipulated values ​​that he posted to the right spot twice, without making any prior attempts.

Metaguard CEO Savaş Yonem

In summary, there was a software bug in the way Binance Bridge validated evidence that could allow attackers to create manipulated posts. Fortunately, the hacker only struck twice here, but the damage could have been much worse if you inspected the target wallet. So the cyber attacker seems to have acted with some mercy.

Another interesting situation in this cyber attack is that the wallet address that made the first transfer from Avalanche (AVAX) Blockchain to the wallet address to which the attacker transferred is highly likely to be Binance’s own cold wallet. If this is Binance’s own cold wallet used in the first transfer, the situation becomes even more interesting. Because there are two options left about the cyber attacker. Namely; Either the cyber attacker has a KYC on Binance and Binance knows who he is, or the cyber attacker is someone with trusted authority among themselves.

Adding the cyber attacker’s expert knowledge of “IAVL Trees” operations, the probability of the attack on Binance being an Enterprise Internal Threat Attack is very, very high.

Contact us to be instantly informed about the last minute developments. twitterin, Facebookin and InstagramFollow and Telegram and YouTube join our channel!

Risk Disclosure: The articles and articles on Kriptokoin.com do not constitute investment advice. Bitcoin and cryptocurrencies are high-risk assets, and you should do your due diligence and do your own research before investing in these currencies. You can lose some or all of your money by investing in Bitcoin and cryptocurrencies. Remember that your transfers and transactions are at your own risk and any losses that may occur are your responsibility. Cryptokoin.com does not recommend buying or selling any cryptocurrencies or digital assets, nor is Kriptokoin.com an investment advisor. For this reason, Kriptokoin.com and the authors of the articles on the site cannot be held responsible for your investment decisions. Readers should do their own research before taking any action regarding the company, assets or services in this article.

Disclaimer: Advertisements on Kriptokoin.com are carried out through third-party advertising channels. In addition, Kriptokoin.com also includes sponsored articles and press releases on its site. For this reason, advertising links directed from Kriptokoin.com are on the site completely independent of Kriptokoin.com’s approval, and visits and pop-ups directed by advertising links are the responsibility of the user. The advertisements on Kriptokoin.com and the pages directed by the links in the sponsored articles do not bind Kriptokoin.com in any way.

Warning: Citing the news content of Kriptokoin.com and quoting by giving a link is subject to the permission of Kriptokoin.com. No content on the site can be copied, reproduced or published on any platform without permission. Legal action will be taken against those who use the code, design, text, graphics and all other content of Kriptokoin.com in violation of intellectual property law and relevant legislation.

Show Disclaimer


source site-3