Some initially interpreted the hack as an exploit of the Uniswap V3 protocol, but it was quickly clarified as the result of a phishing campaign.
Some initially interpreted the hack as an exploit of the Uniswap V3 protocol, but it was quickly clarified as the result of a phishing campaign.