
A technical post‑mortem reconstructing how attackers minted unlimited yETH, drained a bespoke stETH/rETH pool, and laundered proceeds via Tornado Cash. Includes on‑chain forensic signals, timeline, vulnerability class, and mitigation checklist for DeFi engineers and risk officers.