According to PANews, Safe{Wallet} has announced significant progress in its joint security investigation with Mandiant, now part of Google Cloud. The investigation confirmed that the February 21 attack was orchestrated by the North Korean hacker group TraderTraitor (UNC4899), known for targeting the cryptocurrency industry. The hackers infiltrated Safe{Wallet} developers' computers and bypassed multi-factor authentication (MFA) by hijacking AWS session tokens to gain critical access.
Safe{Wallet} emphasized that while the attack had some impact, the smart contracts remained intact. The system has been fully reset, and enhanced security measures have been implemented, including:
- **Infrastructure Reset**: All credentials have been regenerated, clusters reset, keys and secret information updated, and container images redeployed.
- **External Access Restriction**: External access to trading services has been temporarily blocked, allowing only internal communication, with strengthened firewall rules.
- **Malicious Transaction Detection Upgrade**: In collaboration with Blockaid, transaction monitoring has been enhanced, adding risk markers for Safe account master control upgrades.
- **Real-Time Monitoring Enhancement**: Logging and threat detection capabilities have been improved for quicker response to security incidents.
- **Pending Transaction Clearance**: All pending transactions in the database have been cleared to prevent potential security risks.
- **UI and Security Verification Tool Optimization**: Safe Utils has been introduced as a third-party transaction verification tool, with plans to offer a fully IPFS-hosted version of Safe{Wallet}.
Safe{Wallet} urges the Web3 ecosystem to collectively address the increasingly complex security threats and enhance transaction verification tools to improve user safety. The company has released detailed transaction verification guidelines and plans to further optimize user experience to mitigate potential risks.