The exploit involved unauthorized protocol activity during Zoth's mainnet expansion and token launch preparations. The team's response was swift and composed; issues were contained, users were kept ...