
I've answered this so many times so feel free to ask more questions but I'm just gunna hurl it at you so I dont have to answer again. Note: All times Pyongyang time. Wed April 15: Holiday, OOO Thu April 16: Pre exploit testing ramps up rapidly Fri April 17: Pre exploit testing done Sat April 18: Tornado ins and outs, prep up gas on addresses to be used on both Ethereum and Arbitrum. Take brief nap? Sun Apr 19 02:35: First hack txn (116.5k rsETH on Ethereum) Next hour: bridges to Arbitrum to "refill" the bridge, so to speak Sun Apr 19 04:30: Kelp manages to freeze before nonce 309 pops, basically rugs DPRK of the additional 40k ETH they were literally about to pull. Sun Apr 19 04:35: Last onchain transaction. All funds sat in 0x5d3919f12bcc35c26eee5f8226a9bee90c257ccc on Ethereum and Arbitrum. Sun Apr 19, all day: no activity on or offchain Mon Apr 20, all day: no activity onchain, brief activity offchain, laundering plans initiated Tue Apr 21, noon: Txn on Arbitrum rugs them Tue Apr 21, 4pm: Laundry begins Wed Apr 22, 5am (rn): Laundry still going So, some unusual things: Super fast on the hack. VERY fast. A bit of prep ~Apr 9 but basically speedran the hack starting from Apr 16. They were working 16+ hour days the 16, 17, 18, right up until the moment of the hack. It was nonstop. TRTR can get on other devices. This should have been a billion dollar hack. They could have got a 2/2, no problem. One theory is they got spooked and thought they might have their access rugged. One theory is they havent hacked anything in 9 months and decided ~$380m (the planned amount) was good enough. The very odd thing though is abandoning any funds in the hack address is something they don't actually do. See: x.com/tayvano_/statu… They always tranche it up. This isn't necessarily bc they are scared of getting frozen. It's bc it's these guys jobs to execute the onchain side of the hack and then HAND OFF to the next team. That is their literal job. Remember, this is an army. Teams of teams. There are social engineers, there are hackers, there are launderers, there are managers. They have to coordinate and hand off. In every other instance when the hack is "done" it's always is chunks (we call them tranches) of the native asset on ETH, BTC, TRON. Multiple addresses. Not the direct theft addresses. 10k ETH. 20k ETH. Etc. Any L2s or other shitchains go to BTC/ETH. They sit in these "tranches" for days, weeks, months. Until they are read for prime time. So, what the fuck happened? I think they worked basically non-stop, in the same way SEAL folks and ZeroShadow folks and KelpDAO folks and LayerZero folks have been working *since* the moment the exploit happened. Nights, weekends, no holding back. I think at 4:30am local time when Kelp preveted them from getting the second round from the bridge (the additional $100m) they were basically like "FFFFFFUUUUUUUUUUUUUUUUUUUU" and table flipped and went home and went to bed. Bc they hadn't slept in a long ass while. I think they got Sunday off (very typical) and maybe Monday as an extra reward. Plus, they haven't hacked in a while. The actual laundering operation has to be organized. I think the second they got word that the laundering was ready they realized they needed to send over the funds. Which is when they did so. Unfortunately for them, that was <4 hours after an insane operation on the DeFi side had been completed to rug them of all their ETH on Arbitrum. Obvs ~all of this is speculative. I don't KNOW shit. But I do know a lot of things. DYOR, or something.

















