# The Phases of Hacking

In the decentralized finance realm, hacks are an unfortunate reality. But by understanding the typical stages of a hack, platforms like LazyOtter can step in and shield user assets. Let's dive into the details:

### **Four Distinct Phases of a Typical Hack**

1. **Funding** \
   Before launching an attack, hackers need resources. They often source their funds discreetly using platforms like tornado cash.
2. **Preparation and Testing**\
   Once equipped, hackers prepare for the attack. This phase involves creating malicious contracts and testing them to ensure effectiveness.
3. **Exploitation**\
   This is the main event. In this phase, hackers attempt to drain funds from the target contract, capitalizing on vulnerabilities.
4. **Money Laundry**\
   After obtaining the funds, hackers aim to make them untraceable. This is done by sending the stolen assets to mixers like tornado cash or other platforms that obscure transaction trails.

<figure><img src="https://4242537937-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FhTNc6p6Wfj81cQ0iaPuA%2Fuploads%2F3hBv6EJ1LtLimpFhfUIA%2FSafety%20vault%20chart%20(70).png?alt=media&#x26;token=42f35bcf-ddba-46a5-8451-db29849b2d70" alt=""><figcaption></figcaption></figure>

### **The Stark Reality in Numbers**

Hackers have become increasingly adept at their craft. Studies show the pattern of hacks often have the following characteristics:

* **Testing the Waters**: 70% of hacks involve multiple transactions, indicating preliminary smaller attacks before the full-blown assault.
* **Swift Strikes**: Half of the attacks wrap up in under an hour.
* **Late Realizations**: A staggering 98% of victims only become aware of the breach post-execution.

### **LazyOtter's Timely Counter - The 'Golden Windows':**

While hackers have their process, LazyOtter has developed a countermeasure. Leveraging the persistent [on-chain data](https://lazyotter.gitbook.io/lazyotter/products/risk-monitoring-and-alerts/types-of-alerts/on-chain-transactions) surveillance of our [Risk Monitoring](https://lazyotter.gitbook.io/lazyotter/products/risk-monitoring-and-alerts) feature, LazyOtter seeks out anomalies that suggest a potential hack. These critical intervention points, referred to as the 'Golden Windows', represent the stages before the completion of the hack.

Once suspicious activity is detected during these windows:

* LazyOtter's Emergency Withdrawal system springs into action automatically.
* It ensures the immediate withdrawal of funds, safeguarding user assets before the hack concludes.

In essence, by seamlessly integrating Risk Monitoring with the Emergency Withdrawal system, LazyOtter's goal is straightforward but powerful: withdraw user funds before a hack is completed, or at the very least, act faster than other users, ensuring maximum asset protection.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://lazyotter.gitbook.io/lazyotter/products/emergency-withdrawal/the-phases-of-hacking.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
