Crime ❯ Cybercrime ❯ Hacking ❯ Theft
Investigators attribute the breach to a rogue contract upgrade enabled by an unauthorized multisig takeover, not to any failure of Story Protocol.