Explanation: the message wraps a function call to initWallet passing in the hacker’s ETH address as the new owner.

Notice how the address passed in as an argument matches the address from where the message originates, i.e. the Black Hat.

This call only cost the attacker 66839 Gwei, i.e. $0.31.

At the moment I took the snapshot, the block that includes this transaction had over 10,000 confirmations.

So it’s pretty irreversible and it gets harder and harder to reverse every ~18–20 seconds (ETH average block mining time), even if a hard fork is organised.

EDIT: As Nick Johnson pointed on Reddit, a hard fork could return the funds without requiring a full reversal of the subsequent chain, albeit being impractical and highly complex due to the fact that funds have been moved further, contracts have committed suicide, etc.

The execute message

Now that the attacker has appointed himself as the new owner of the aeternity wallet, they can use their private key to sign an outgoing transfer for the balance of the account (82,189 ETH).