Cypher Protocol Exploited, Will the Hacker Return the Funds? Details