@0xc1pher
The largest supply chain attack was made and only 20$ was stolen.
Here's how the payload works:
- Watches all network requests
- Detects crypto addresses in responses
- Replaces them with attacker-controlled addresses that look nearly the same that’s preconfigured in the malicious payload
This makes it extremely hard for victims to notice the swap.