Hackers took over the official X accounts of ZKSync and developer Matter Labs to distribute fake -sec warnings and promote a phishing airdrop.
According to the latest update that was placed on 13 May of the most important ZKSync account, the team said that both accounts “are completely back in the team’s check.”
In particular, the infringement was probably taken by compromised delegated accounts, which have since been broken. ZKSync noted that all malignant tweets have been removed and that an internal investigation is underway.
However, a follow-up post from a ZKSync-Gelioened developer account later warned that the accounts were still compromised, so that users did not encourage not to communicate. This has expressed new concern about whether full recovery was actually achieved at the time of the first explanation.
The attackers initially used the hacked accounts to stir panic. In one now removed, they wrongly claimed that ZKSync was being investigated by the US Securities and Exchange Commission and warned of possible sanctions from the Ministry of Finance.
Market commentators such as G8Keep co-founder Harrison Leggio suggested The move was a deliberate attempt to crash the token price of ZKSync.
“Instead of dropping a token and stealing a few dollars, they decided to scare the living shit from Onchain days,” he wrote in an X post after the attack.
Shortly thereafter, the hackers published a second message in which a fake ZK Token AirDrop was promoted, with a phishing link that is designed to dispose of users’ portfolios. The post was live a few minutes before the team managed to get it down.
Although it is still unclear how many users have clicked on the link, ZKSync still has to confirm whether losses have been reported.
At the time of writing, ZK Token had fallen by more than 5%and, according to Coetecko, around $ 0.07. The drop followed a dip of about 2% immediately after the fake -sec -warning went live.
For ZKSYNC, the attack will be less than a month after another large security course. On April 15, an attacker used admin access to the AirDrop distribution contract of the platform and 111 million did not make it high -class to -Tokens, around $ 5 million worth of approximately $ 5 million.
The attacker later returned 90% of the stolen tokens and kept the remaining 10% as a self -proclaimed premium. That exploit took place during the continuous distribution of 17.5% of the total token stock of ZK to ecosystem participants.
Although most funds were returned, the back-to-back breaches Increased questions About the internal security processes of the platform.