Crime ❯ Cybercrime ❯ Theft
Investigation Hacker Groups Recovery Efforts Hacking Recovery Processes
Investigators cite compromised validator keys enabling a flash-loan governance capture behind the $4.1 million bridge drain.