Jack Recider
👤 PersonAppearances Over Time
Podcast Appearances
And if you hang out in the Counter-Strike forums or Roblox forums or Fortnite forums, you see people begging for help every day, saying their account got hacked or their stuff got stolen. There's a lot of money in stealing video game assets. It's crazy.
And if you hang out in the Counter-Strike forums or Roblox forums or Fortnite forums, you see people begging for help every day, saying their account got hacked or their stuff got stolen. There's a lot of money in stealing video game assets. It's crazy.
So we don't know how they made contact. My first thought was Discord. A ton of scammers are on Discord trying desperately to hack into people's accounts. But in this case, I'm willing to bet the initial contact was made on LinkedIn. It's kind of easy to find developers for Axie Infinity on there to begin with. Then it's only a few clicks away before you can message one of them.
So we don't know how they made contact. My first thought was Discord. A ton of scammers are on Discord trying desperately to hack into people's accounts. But in this case, I'm willing to bet the initial contact was made on LinkedIn. It's kind of easy to find developers for Axie Infinity on there to begin with. Then it's only a few clicks away before you can message one of them.
And it sounds like they messaged a developer offering them a job. So if that's the case, it's not so hard to create a fake persona on LinkedIn to look like you work for some prestigious company.
And it sounds like they messaged a developer offering them a job. So if that's the case, it's not so hard to create a fake persona on LinkedIn to look like you work for some prestigious company.
Yeah, I mean, if you get malware onto a developer's computer and then take control of their computer, then you can assume the role of that developer in that company. You have their access keys, their logins, their privileged access to the network.
Yeah, I mean, if you get malware onto a developer's computer and then take control of their computer, then you can assume the role of that developer in that company. You have their access keys, their logins, their privileged access to the network.
But they were looking for a central wallet like cold storage or something where SkyMavis stores all the keys and has access to millions of dollars in crypto. But they couldn't find that. So the second thing was, with all this money flowing through the system, was there a way to grab it somehow?
But they were looking for a central wallet like cold storage or something where SkyMavis stores all the keys and has access to millions of dollars in crypto. But they couldn't find that. So the second thing was, with all this money flowing through the system, was there a way to grab it somehow?
Wow, I think the level of knowledge needed to pull this off is quite remarkable. This is not so simple as opening up a wallet and transferring the funds out. To take over five of the nine nodes of this side chain and to know how to operate them in a way that will allow them to steal money takes a specific skill set. Whoever did this must have had to prepare quite a bit for an attack like this.
Wow, I think the level of knowledge needed to pull this off is quite remarkable. This is not so simple as opening up a wallet and transferring the funds out. To take over five of the nine nodes of this side chain and to know how to operate them in a way that will allow them to steal money takes a specific skill set. Whoever did this must have had to prepare quite a bit for an attack like this.
It kind of reminds me of that one time my friend went and bought an antique for, I don't know, $1,000 or something. And on his way home, he stopped for lunch somewhere and his car got broken into and the thieves stole the loose change in his cup holder. They looked at that old antique and didn't think it was worth anything and left it.
It kind of reminds me of that one time my friend went and bought an antique for, I don't know, $1,000 or something. And on his way home, he stopped for lunch somewhere and his car got broken into and the thieves stole the loose change in his cup holder. They looked at that old antique and didn't think it was worth anything and left it.
Whoever was targeting Axie Infinity knew exactly where to look to extract the most amount of value they could from the system. They knew exactly where the value was. And I don't think many of us would know how to work these controlling nodes, even if we could take them over.
Whoever was targeting Axie Infinity knew exactly where to look to extract the most amount of value they could from the system. They knew exactly where the value was. And I don't think many of us would know how to work these controlling nodes, even if we could take them over.
But when they took over these nodes, they got immediately to work, setting up an attack which would allow them to transfer as much out of the Ronin network as they could and as fast as they could, directly into the Ethereum wallets that were ready and waiting. They set up everything and using their control of the bridge, deployed a command to transfer the money.
But when they took over these nodes, they got immediately to work, setting up an attack which would allow them to transfer as much out of the Ronin network as they could and as fast as they could, directly into the Ethereum wallets that were ready and waiting. They set up everything and using their control of the bridge, deployed a command to transfer the money.
Is there a single cyber heist that is more than $650 million? I can't think of one.
Is there a single cyber heist that is more than $650 million? I can't think of one.