zkLend loses $9.5M in crypto heist, asks hacker to return 90%
by lulagain - Monday February 17, 2025 at 10:08 PM
#1
[Image: zklend-message-to-hacker.jpg]
Decentralized money lender zkLend suffered a breach where threat actors exploited a smart contract flaw to steal 3,600 Ethereum, worth $9.5 million at the time.
zkLend is a decentralized money-market protocol built on Starknet, a Layer 2 scaling solution for Ethereum. It enables users to deposit, borrow, and lend various assets.
The attack took place yesterday afternoon, with zkLend warning on X they were suffering a cybersecurity incident.
According to the EthSecurity Telegram channel, the threat actors exploited a rounding error bug in zkLend's smart contract mint() function.
"The attacker manipulated the "lending_accumulator" to be very large at 4.069297906051644020, then took advantage of the rounding error during ztoken mint() and withdraw() to repeatedly deposit 4.069297906051644021 wstETH getting 2 wei then withdraw 4.069297906051644020*1.5 -1 = 6.103946859077466029 wstETH to expend just 1 wei," reads a post to the EthSecurity channel.
Starkware, who developed the Starknet network, confirmed that the vulnerability was not part of Starknet technology but rather an application-specific bug.
According to Cyvers, the threat actors attempted to launder the crypto through the RailGun privacy protocol but was blocked due to protocol policies.
zkLend has now issued a message to the hacker stating that if they return 90% of the stolen Ethereum, which is 3,300 ETH, they can keep the other 10% and will not face any liability for the attack.
"We understand that you are responsible for today's attack on zkLend. You may keep 10% of the funds as a whitehat bounty, and send back the remaining 90%, or 3,300 ETH to be exact, to this Ethereum address: 0xCf31e1b97790afD681723fA1398c5eAd9f69B98C," reads an on-chain message to the hacker.
"Upon receiving the transfer, we agree to release from any and all liability regarding the attack."
"We are working with security firms and law enforcement at this stage. If we do not hear from you by 00:00 UTC, 14th Feb 2025, we will proceed with the next steps to track and prosecute you."

The crypto thieves have until February 13, at 7:00 PM EST, to return 90% of the stolen funds, after which zkLend will pursue legal action.

There has not been any response from the hacker, which is usually the case in these situations. No threat actors have been attributed to the attack.
[Image: 128.gif]
@Ater  @antisocial My Nigga's
Reply
#2
Why would they return 90%? I don't think anybody would do that Angel
[Image: 1589a29a.gif]
I do not have Session.
Reply
#3
I like these kinds of posts, always nice to see stealing stuff.
If you like me, you can buy me as a friend by making a donation in monero, if there is something wrong in what I am writing you can go and ask the administration of this forum for information.
82XwaXMushuSTHwNqkHVaAYPDxrJJ9YAMDGeYZp2afpYh4vYv8c5X24eG6XPPiy3pwfn7zWyBuQ7SeTkVxZeJVHZ3kL99FK
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  epsilon hacker "Chat Noir" arrested for FREE SAS breach Angel_Batista 17 1,965 04-15-2025, 01:34 AM
Last Post: Mamadou123
  Cybersecurity firm buying hacker forum accounts to spy on cybercriminals lulagain 1 213 04-14-2025, 08:50 PM
Last Post: Sythe
  Oracle say no cloud breach, but hacker steal data from old servers – people not buy i baraka75 1 342 04-13-2025, 12:55 PM
Last Post: music
  ? Massive WooCommerce Leak: Hacker “Satanic” Exposes Over 4.4 Million Records ? Zfrussia 3 261 04-12-2025, 03:14 PM
Last Post: pegasys
  Hacker Claims WooCommerce Data Breach, Selling 4m User Records lulagain 0 217 04-12-2025, 01:01 PM
Last Post: lulagain

Forum Jump:


 Users browsing this thread: