Understanding The Harmony Horizon Bridge Attack
Hackers were able to sign two transactions, it is suspected that the hackers somehow had access to the private key of one of the wallets.
Hackers were able to sign two transactions, it is suspected that the hackers somehow had access to the private key of one of the wallets.