Shortly after the attack, Avraham Eisenberg came forward as the perpetrator, asserting that the exploit was merely a “highly profitable trading strategy” and claiming it was conducted within the bounds of legality and the protocol’s intended design.