Optimism is a Layer 2 option and its doing quite well before the exploit was hatched. I think and know it would be fine as long as they do what they know properly
The hacker is able to deploy the multisig to L2 with different initialization parameters. I guess he is one of an insider development and tries to get all fund without residue. or maybe dump the price to buyback again.
This is what I am thinking upon reading the article. It is mind-boggling how the hacker got a hold of that transaction, and how it is able to "intercept" the token if it isn't an insider. Probably this is just a strategic planned disaster to crash the price of the token and buy back at its dip. Not that clever IMHO. These "tactics" had already scared away lots of potential investors.
I was planning to purchased this token when it was first announced because of its good Ethereum solution function yet the team mistakenly sent the OP to the wrong address is very sketchy IMHO. The article provided above shows how the team commit mistake and the hacker just received it. There still chance for this to recover by doing hard fork and block all the deposit of OP tokens on all exchange by the time the mistake done. OP team only shows how incompetent they are for allowing this terrible loss.
Lucky you, you failed to purchase the token, or else you would have been another victim of this possible self-inflicted hacking.