BitNZ MailJet Hack: Revision history

Jump to navigation Jump to search

Diff selection: Mark the radio buttons of the revisions to compare and hit enter or the button at the bottom.
Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.

25 September 2024

20 September 2024

  • curprev 13:0613:06, 20 September 2024Azoundria talk contribs 8,725 bytes +1,780 COMPLETE 30 minutes. Prepared information on the reality section. Fixed typo Reddit versus Twitter in the post. Applied the Reddit post source throughout the article. Filled in a basic prevention section in the wiki. Found and incorporated information which MailJet published prior to the exploit. Working on filling in transaction information about the donation wallet address. Added some additional sources for later review. Tag: Visual edit

13 September 2024

12 April 2023

15 February 2023

22 January 2023

  • curprev 11:3711:37, 22 January 2023Azoundria talk contribs 6,156 bytes +6,156 Created page with "{{Imported Case Study|source=https://www.quadrigainitiative.com/casestudy/bitnzmailjethack.php}} An interesting case, where the breach affected accounts directly, by the exploit of a third party mail provider. 2FA was supported but not enabled on many accounts. The exploit suggests that all the coins taken were stored in a hot wallet, so smaller reserves or any sort of time delay would have reduced the losses. Any platform protecting the funds in cold storage would have..."