ZKsync Confirms Isolated Hack, $5M in Tokens Illegally Minted

Last Updated on April 16, 2025

Efe Headshot
Written by

Key Takeaways:

  • A hacker exploited a ZKsync admin account to mint $5M in unclaimed airdrop tokens, increasing the total supply by 0.45%.
  • ZKsync confirmed the exploit was isolated with no user funds affected and is collaborating with SEAL to recover the stolen tokens.
  • Despite the breach, ZKsync’s governance and token contracts remain secure, and no further vulnerabilities were found in the exploited function.

On April 15, a hacker compromised a ZKsync admin account, minting $5 million worth of unclaimed airdrop tokens.

The attacker accessed three airdrop distribution contracts and used a function called sweepUnclaimed() to mint 111 million ZK tokens, increasing the total supply by 0.45%.

ZKsync confirmed that user funds, governance, and token contracts were not affected and labeled the incident as isolated.

The attacker still retains most of the stolen tokens.

ZKsync, a layer-2 Ethereum scaling solution using zero-knowledge rollups, is collaborating with the Security Alliance (SEAL) to recover the funds.

The exploit did not expose any ongoing vulnerabilities related to the sweepUnclaimed() function.

At the time of the breach, ZKsync’s Era platform held $57.3 million in total value locked and was in the process of distributing 17.5% of its total token supply to the community via an airdrop.

Following the breach, the ZK token experienced significant volatility, dropping 16% to $0.040 before recovering to $0.047, marking a net 7% decline over the past 24 hours.

About The Author

Efe Headshot
Written by

News Reporter

Efe Bravo, a seasoned journalist, delivers compelling insights into the cryptocurrency and blockchain industry.

His articles offer a deep dive into the latest trends, projects, and technological advancements shaping the future of digital finance.

Check Efe out on: