Researchers noticed that attackers of Wormhole protocol started injecting stolen funds into staking mechanisms