The attacker appears to have used the protocol’s own private keys to drain liquidity pools. It’s unclear how they got them.
Security News