March 9, 2023, 9:32 a.m. | EclecticIQ Threat Research Team

Security Boulevard securityboulevard.com


Tactics, Techniques, And Procedures Executed in Collaboration Between Jump Crypto and Oasis Networks to Hack Their Own Protocol


The series of tactics, techniques, and procedures involved relies on the fact that a threat actor with access to assets from the Wormhole Bridge cyberattack in February 2022 recently transferred them into Oasis wallets in a possible consolidation or mixing move. The threat actor additionally gave permissions to an automated smart contract, which appears as normal behavior enabling additional functionality. ( …

access actor assets automated blacklotus boot bridge collaboration consolidation contract crypto cyberattack de-fi defi fact february funds hack intelligence research jump crypto malware networks oasis own permissions procedures protocol secure boot series smart smart contract stolen stolen funds tactics techniques threat threat actor wallets windows wormhole

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

SITEC- Systems Security Administrator- Camp HM Smith

@ Peraton | Camp H.M. Smith, HI, United States

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

General Manager, Cybersecurity, Google Public Sector

@ Google | Virginia, USA; United States

Cyber Security Advisor

@ H&M Group | Stockholm, Sweden

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden