$1.4 Billion Embezzled From ByBit in Largest Crypto Heist in History

The Department of Government Efficiency (DOGE) is currently facing significant scrutiny as it implements extensive reductions in the federal workforce across the United States government. Amid ongoing lawsuits alleging that these actions infringe upon the Privacy Act of 1974, there are calls for the group to cease its activities. Recent developments include staff cuts at the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), which has now granted DOGE access to its digital systems. This comes on the heels of CISA’s decision to suspend its election security initiatives.

The implications of these staff reductions extend to the National Institute of Standards and Technology (NIST), which is reportedly preparing to lay off approximately 500 employees. This could severely impact NIST’s critical work on cybersecurity standards and software vulnerability tracking. Additionally, cuts at the U.S. Digital Service have resulted in the loss of the cybersecurity lead for the central Veterans Affairs portal, VA.gov, potentially increasing the vulnerability of essential systems and data.

In light of recent aggressive digital espionage campaigns attributed to China, multiple U.S. government departments are now contemplating a ban on TP-Link routers manufactured in China. Although TP-Link denies any involvement in cyberattacks, concerns over security remain high. Concurrently, a WIRED investigation has revealed that users of Google’s advertising technology can target groups that should be off-limits under the company’s policies, including individuals with chronic ailments or significant debt, as well as those in pivotal roles related to national security and classified defense technology.

In the realm of cybersecurity incidents, Google researchers have alerted that Russian hackers are deceiving Ukrainian soldiers by providing fake QR codes purportedly leading to Signal group invites. These codes exploit vulnerabilities that enable attackers to monitor communications. Signal has responded by introducing updates to safeguard against these exploits. A detailed analysis by WIRED has further highlighted the challenges users face when attempting to remove nonconsensual intimate content from the web.

This past week has also marked a significant milestone in the cryptocurrency realm. ByBit, a cryptocurrency exchange, has reported a staggering theft amounting to approximately $1.4 billion—a record for a single heist in the industry. The exchange’s CEO, Ben Zhou, stated that the attackers utilized a “musked transaction”—likely a typographical error for “masked transaction”—to manipulate the exchange into approving modifications to the code governing a smart contract tied to its Ethereum assets. Zhou assured users that other cold wallets remain secure and that the exchange can cover the losses, suggesting that no users will face financial repercussions.

This theft eclipses previous notable hack incidents, such as those involving Mt. Gox and FTX, both of which resulted in losses amounting to hundreds of millions at the time. In comparison, ByBit’s $1.4 billion loss stands as a stark benchmark in 2024, wherein the total value stolen across all crypto thefts is reported to be $2.2 billion.

On another front, the British government raised privacy concerns globally by pressuring Apple to allow access to user data stored in iCloud, data protected under Apple’s Advanced Data Protection feature, which employs end-to-end encryption. In response to government pressure, Apple has disabled this encryption for users in the UK, contrary to their stance on maintaining high security for personal data. Privacy advocates warn this action could undermine the security and privacy of British citizens and set a concerning precedent for similar demands from other governments.

Finally, the proliferation of stalkerware applications poses another alarming issue. Recent research has uncovered that stalkerware apps, including Cocospy and Spyic, have leaked sensitive data from millions of victims due to poor security practices. These applications—designed to monitor victims without consent—contained vulnerabilities that exposed messages, call logs, and personal photos, jeopardizing the privacy of both victims and the unintended exposure of the stalkerware users’ sensitive information.

As these incidents unfold, they underscore the urgent need for heightened awareness and robust cybersecurity measures among businesses and individuals alike. The landscape of cyber threats continues to evolve, requiring proactive strategies to mitigate risks and protect sensitive data from being compromised.

Source