Some initially interpreted the hack as an exploit of the Uniswap V3 protocol, but it was quickly clarified as the result of a phishing campaign.
* First published on ccn.com
Some initially interpreted the hack as an exploit of the Uniswap V3 protocol, but it was quickly clarified as the result of a phishing campaign.
* First published on ccn.com