A major security breach has shaken decentralized lending platform zkLend, with hackers siphoning off 3,600 Ethereum (ETH), worth approximately $9.5 million, after exploiting a flaw in its smart contract. The attack, which unfolded on Tuesday afternoon, is yet another reminder of the vulnerabilities lurking within the DeFi ecosystem.
How the Hack Unfolded
zkLend, a decentralized money-market protocol built on Starknet, a Layer 2 Ethereum scaling solution, reported a cybersecurity incident via its official X (formerly Twitter) account. Soon after, security experts began dissecting what had gone wrong.
According to the EthSecurity Telegram channel, the attackers leveraged a rounding error in zkLend’s smart contract mint() function. This seemingly minor flaw allowed them to manipulate the system to generate excess tokens and withdraw significantly more funds than they deposited.
- The attackers exploited the “lending_accumulator” mechanism, inflating it to a precise figure: 4.069297906051644020.
- They deposited 4.069297906051644021 wrapped staked Ethereum (wstETH), received 2 wei in return, then withdrew a manipulated amount—6.103946859077466029 wstETH—essentially expanding a minuscule deposit into a multi-million-dollar theft.
- The entire scheme relied on the contract’s inability to handle fractional computations properly, an all-too-common pitfall in DeFi security.
This is the latest in a long line of smart contract exploits that have plagued the decentralized finance (DeFi) sector, where small miscalculations can be the difference between stability and disaster.
Starkware Distances Itself from the Incident
Starkware, the developer behind the Starknet network on which zkLend operates, was quick to clarify that the exploit was not due to a flaw in Starknet’s underlying technology. Instead, the vulnerability was specific to zkLend’s smart contract, making it an application-level issue.
This distinction is important because Layer 2 networks like Starknet are designed to enhance Ethereum’s scalability, but they don’t necessarily guarantee security at the application level. Projects building on these platforms still need to rigorously test their smart contracts for potential weaknesses.
Failed Money Laundering Attempt
In the aftermath of the hack, the attackers tried to obscure their tracks. Blockchain analytics firm Cyvers revealed that the stolen ETH was funneled into the RailGun privacy protocol, a service often used for laundering illicit funds. However, the transaction was blocked due to RailGun’s protocol policies, preventing the attackers from immediately cashing out their stolen assets.
This raises questions about whether blockchain-based privacy protocols are tightening their controls in response to increased scrutiny from regulators. While DeFi champions the ethos of decentralization, it also presents an ongoing battle between privacy and security.
zkLend’s Offer: 90% Back, No Questions Asked
Rather than immediately pursuing legal action, zkLend has opted for a strategy seen before in crypto hacks: offering the attacker a deal. The company sent an on-chain message to the hacker, urging them to return 90% of the stolen funds (3,300 ETH) in exchange for immunity.
“We understand that you are responsible for today’s attack on zkLend. You may keep 10% of the funds as a whitehat bounty and send back the remaining 90%, or 3,300 ETH to be exact, to this Ethereum address: 0xCf31e1b97790afD681723fA1398c5eAd9f69B98C,” the message reads.
The message makes it clear that if the hacker complies, zkLend will not pursue legal action. However, if the deadline—00:00 UTC on February 14, 2025 (7:00 PM EST on February 13)—passes without a response, the company will escalate the matter, working with law enforcement and security experts to track the attacker down.
Will the Hacker Return the Money?
So far, there has been no public response from the attacker, which is typical in these situations. Most hackers either attempt to launder their stolen funds or disappear entirely. However, some high-profile cases in the past have seen cybercriminals return funds after realizing that tracking stolen crypto is much easier than expected.
The following outcomes are possible:
- The hacker returns the funds. This would signal an admission that tracking methods have improved, and escaping with stolen crypto isn’t as easy as it once was.
- Partial return of funds. Sometimes, attackers negotiate to keep a larger bounty in exchange for returning the majority of the stolen assets.
- No response at all. If the hacker remains silent past the deadline, zkLend will likely work with forensic blockchain firms to follow the money trail and attempt to identify the culprit.
What This Means for DeFi Security
This attack highlights the ongoing risks in decentralized finance. While DeFi platforms promise innovation and financial freedom, they also come with high security stakes. Smart contract vulnerabilities can turn a minor coding oversight into a multi-million-dollar crisis.
Key Takeaways from the zkLend Hack
- Smart contracts remain a critical attack surface. Even well-established DeFi platforms can have hidden vulnerabilities.
- Hackers are getting more sophisticated. This wasn’t a simple brute-force attack; it was a calculated abuse of an arithmetic flaw.
- Privacy protocols are under pressure. RailGun blocking the laundered funds suggests that crypto mixers and privacy networks are tightening their restrictions.
- Bounty deals are becoming common. More projects are opting to offer hackers a percentage of stolen funds rather than fight a lengthy legal battle.
The coming days will reveal whether zkLend’s offer to the hacker will work—or if this is just another unsolved heist in the ever-growing list of DeFi security breaches.