I wanted to share some updates from our recent discussions on the Bybit hack response and upcoming BGIN workshop preparations.
Bybit Hack Intelligence Update
The response to the Bybit hack has been remarkably swift with impressive industry collaboration. Analytics teams are actively tracking all affected addresses, with Bybit serving as an intermediary proxy between various intelligence sources. The FBI has attributed this to the “Trader Trader” group, there are around 50 OG addresses that received initial hacked funds.
What’s particularly notable:
A public API is being created to track all addresses at risk from the hack, offered as a free public good (potential implications for on-chain credentials!)
This is being characterized as “one of the most technical” major hacks due to its smart contract-based exploit
The transparent nature of blockchain is actually working in our favor - “we should be daring people to use blockchain” as the tracking capability demonstrates its strength - is still an open question
Cashout attempts may occur soon, but the hackers will face significant challenges given the coordinated tracking - but do they even need to cash out if an informal economy using cryptocurrency has just received a 1b injection.
The speed of information sharing and coordinated response represents a significant maturation in the ecosystem’s approach. There’s a GitHub repo from Tay documenting all incidents if we’d like to use a comparison of big hacks vs all the individuals
BGIN Workshop Preparations
We’re making progress on our key focus areas for the upcoming workshop:
Layer 2 governance framework
Wallet key management governance standards
Developing clearer distinctions between forensics methodologies vs. analytics approaches
If anyone has input on these topics or wants to contribute to the preparations for our in person meeting and workshops early next week let me know.