Details of the Exploit
Can you describe in detail the exploit in the code and how you were able to fix it?
You can find a technical overview of the exploits in our report here:
Following the illegal mint of coins, can we ever be sure of supply figures?
Once the initial threat was neutralized, almost all of the work from the hack has been to assess the impact. This requires us to understand how the exploit worked, and to be able to identify the result of those transactions. The details of this can be found in the report above.
Law enforcement was contacted but at which stage?
We cannot discuss this, other than it is a requirement of the exchanges that law enforcement is involved.