The hacker attempted to launder the funds through Railgun, a privacy protocol. However, Railgun’s internal policies forced the return of the stolen assets to the hacker’s original address.

Name

The hacker attempted to launder the funds through Railgun, a privacy protocol. However, Railgun’s internal policies forced the return of the stolen assets to the hacker’s original address.