The hackers achieved this by buying highly liquid tokens like Tether (USDT) and placing artificially high limit sell orders in low-liquidity trading pairs like Bitcoin (BTC) and USD Coin (USDC). They would then open leveraged trades and purchase large amounts of assets. They completed the cross trades and profited from the price manipulation.