[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fIpSs9GiZcN_66t9JXBaaq9PxJirdoUk1uZZjcoQWgFI":3},{"article":4,"iocs":36},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":10,"url":11,"image_url":10,"published_at":12,"ingested_at":13,"relevance_score":14,"entities":15,"category_id":16,"category":17,"article_tags":20},"a505b1c9-27b1-4325-a437-a3b79cabf35d","Attackers don’t just target wallets. They exploit every weak point in the architecture:\n• Front-e...","attackers-don-t-just-target-wallets-they-exploit-every-weak-point-in-the-archite","Attackers don’t just target wallets. They exploit every weak point in the architecture:\n• Front-end Apps \n• Code repositories \n• Developer machines \n• Software supply chains\n\nModern crypto heists, like the $1.5B Bybit theft, often start with a simple malware infection on a","Modern cryptocurrency heists exploit multiple attack vectors beyond direct wallet targeting, including front-end applications, code repositories, developer machines, and software supply chains. The $1.5B Bybit theft exemplifies how attackers initiate campaigns through malware infections on developer infrastructure, highlighting the need for defense-in-depth strategies across the entire development ecosystem.",null,"https:\u002F\u002Fx.com\u002FSentinelOne\u002Fstatus\u002F2033933465645945338","2026-03-17T15:48:21+00:00","2026-03-17T16:00:12.183776+00:00",7,[],"26b0b636-0e31-4db1-bffb-61bdf9f20a58",{"id":16,"icon":10,"name":18,"slug":19},"Supply Chain","supply-chain",[21,26,31],{"category":22},{"id":23,"icon":10,"name":24,"slug":25},"0493c7e9-989a-4692-b4e6-136f5ec09675","Cryptography","cryptography",{"category":27},{"id":28,"icon":10,"name":29,"slug":30},"89f78b1c-3503-45a1-9fc7-e23d2ce1c6d5","Malware","malware",{"category":32},{"id":33,"icon":10,"name":34,"slug":35},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[37],{"type":30,"value":38,"context":39},"Bybit theft malware","Malware strain used in $1.5B Bybit cryptocurrency exchange theft, initiates via developer machine infection"]