Some initially interpreted the hack as an exploit of the Uniswap v3 protocol, but it was quickly clarified as the result of a phishing campaign.

Some initially interpreted the hack as an exploit of the Uniswap v3 protocol, but it was quickly clarified as the result of a phishing campaign.