On February 21, 2025, when copyright staff members went to approve and indication a program transfer, the UI showed what seemed to be a authentic transaction While using the intended desired destination. Only following the transfer of resources for the concealed addresses established via the destructive code did copyright workforce understand some