{"id":127844,"date":"2025-04-24T05:17:58","date_gmt":"2025-04-24T05:17:58","guid":{"rendered":"http:\/\/cryptospotters.net\/?p=127844"},"modified":"2025-04-24T05:17:58","modified_gmt":"2025-04-24T05:17:58","slug":"zksync-recovers-5m-of-stolen-tokens-after-hacker-accepts-bounty-offer","status":"publish","type":"post","link":"http:\/\/cryptospotters.net\/?p=127844","title":{"rendered":"ZKsync recovers $5M of stolen tokens after hacker accepts bounty offer"},"content":{"rendered":"<p>Source: Cointelegraph.com NewsThe ZKsync Association has confirmed the recovery of $5 million worth of stolen tokens from an April 15 ZKsync security incident involving its airdrop distribution contract.<br \/>\nThe hacker agreed to accept a 10% bounty and return 90% of the remaining stolen tokens, transferring the ZKsync Security Council almost $5.7 million across three transfers on April 23.<br \/>\n\u201cWe\u2019re pleased to share that the hacker has cooperated and returned the funds within the safe harbor deadline,\u201d ZKsync Association posted to X on April 23, which was later reposted by ZKsync\u2019s X account.<br \/>\nMatter Labs, the company behind the ZKsync protocol, also reposted the news shared on X.<br \/>\nThe ZKsync X account previously confirmed that no user funds were compromised.<br \/>\nSource: ZKsync AssociationThe hacker sent two transfers on the ZKsync Era blockchain, consisting of $2.47 million worth of ZKsync (ZK) tokens and $1.83 million worth of Ether (ETH) to the ZKsync Security Council\u2019s ZKsync Era address.<br \/>\nAnother 776 ETH worth nearly $1.4 million was also sent to their security council\u2019s Ethereum address, Etherscan data shows.<br \/>\nThe first transfer was made on April 23 at 2:39:57 pm UTC on and the last transfer was made roughly 13 minutes later \u2014 all within the 72-hour window that ZK Sync had initially set.<br \/>\nZKsync Association said the company would publish a final report revealing more details from the security incident.<br \/>\nHow the hack happened<br \/>\nThe hacker breached ZKsync\u2019s admin account, allowing them to exploit the airdrop distribution contract&#8217;s sweepUnclaimed() function to mint 111 million unclaimed ZK tokens, worth approximately $5 million at the time of the April 15 attack.<br \/>\nThe hack occurred while ZKsync was in the process of airdropping 17.5% of ZK\u2019s token supply to ecosystem participants.<br \/>\nThe recovered amount \u2014 almost $5.7 million \u2014 exceeded the $5 million originally stolen due to a rise in the market value of the stolen tokens, with ZK and ETH increasing 16.6% and 8.8% respectively since the April 15 attack, according to CoinGecko data.<br \/>\nDespite the asset recovery, the ZK token failed to rise substantially on the news and is currently down 0.2% over the last 24 hours.<br \/>\nZKsync Era is an Ethereum layer 2 solution that uses zero-knowledge rollups to batch and process transactions offchain. It has nearly $59 million in total value locked on its chain and has over $2 billion in real-world assets onchain, according to DefiLlama and RWA.xyz.<br \/>\nMagazine: Ethereum maxis should become \u2018assholes\u2019 to win TradFi tokenization race<a href=\"https:\/\/cointelegraph.com\/news\/zk-sync-recovers-5-million-stolen-tokens-hacker-accepts-bounty?utm_source=rss_feed&amp;utm_medium=rss&amp;utm_campaign=rss_partner_inbound\" target=\"_blank\" class=\"feedzy-rss-link-icon\" rel=\"noopener\">Read More<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Source: Cointelegraph.com NewsThe ZKsync Association has confirmed the recovery of $5 million worth of stolen tokens from an April 15 ZKsync security incident involving its airdrop distribution contract. The hacker&hellip; <\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"_links":{"self":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts\/127844"}],"collection":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=127844"}],"version-history":[{"count":0,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts\/127844\/revisions"}],"wp:attachment":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=127844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=127844"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=127844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}