Analysis of the DAO exploit - Hacking, Distributed