The threat actor manipulated the platform by using Thena tokens to bypass the maximum supply cap and borrow several different digital assets.
The threat actor manipulated the platform by using Thena tokens to bypass the maximum supply cap and borrow several different digital assets.