ZKsync has confirmed a security incident involving the unauthorized minting of roughly $5 million worth of ZK tokens after an admin account tied to its airdrop distribution contracts was compromised. The breach, which targeted unclaimed tokens from a recent airdrop, has been contained, according to a statement released by the ZKsync security team.
The attacker exploited a privileged function in the airdrop contract to mint approximately 111 million ZK tokens. This inflated the total circulating supply by 0.45%, though the impact is limited to the airdrop mechanism.
ZKsync security team has identified a compromised admin account that took control of ~$5M worth of ZK tokens — the remaining unclaimed tokens from the ZKsync airdrop. Necessary security measures are being taken.
— ZKsync (∎, ∆) (@zksync) April 15, 2025
All user funds are safe and have never been at risk. The ZKsync…
Incident Contained, No Broader Protocol Risk
ZKsync emphasized that no user funds were affected and that the broader protocol remains secure. The unauthorized access was restricted to one admin address overseeing three airdrop distribution contracts. The incident did not compromise the ZK token contract, the core protocol, governance contracts, or active capped minters.
The compromised account initiated the minting transaction now under investigation. The attacker’s wallet currently holds the bulk of the stolen tokens at another address. The organization clarified that no additional ZK tokens can be minted using this method, stating that the vulnerability has been fully exploited and is no longer active.
Recovery Efforts Underway as Investigation Continues
ZKsync is working alongside blockchain security group SEAL 911 and coordinating with cryptocurrency exchanges to freeze or recover assets where possible. The team is also encouraging the attacker to initiate contact to discuss returning the funds and potentially mitigating legal consequences.
A full technical report is expected to be released once the internal investigation concludes. ZKsync has not disclosed how the attacker gained access to the admin account, though they confirmed it stemmed from a compromised key rather than a smart contract flaw.
This event marks a significant reminder of the risks associated with key management in decentralized ecosystems, especially during token distribution phases. No timeline has been shared for potential recovery or further updates.
Related posts:
- FTX and Alameda Ordered to Pay $12.7 Settlement to Creditors
- Binance to Hire 1,000 Employees for Compliance Roles
- $30T in Tokenized RWAs by 2030 is A Wild Overreach, Analyst Suggests
- Visa Launches New Platform to Help Banks Issue Fiat-Backed Tokens on Ethereum
- Binance Rejects Majority of Israeli Military Requests to Freeze Palestinian Crypto Wallets