Lending protocol zkLend acknowledged in a June 25 post on X that it’ll wind down its operations and direct its remaining $200,000 treasury to a fund for customers affected by a February safety breach.
The workforce stated the exploit “deeply eroded person confidence” and ZEND’s delisting from Bybit and KuCoin amplified the unfavorable sentiment inflicting a major decline within the capital and liquidity wanted for brand spanking new merchandise.
Liquidity squeeze and determination to stop
Whereas zkLend assessed restoration choices, Bybit and KuCoin eliminated the ZEND token from their spot markets, sharply decreasing buying and selling depth and reducing off a path to boost recent liquidity.
The workforce stated these constraints made a relaunch unrealistic. As an alternative, zkLend will maintain its DeFi Spring, restoration, and kSTRK portals on-line, permitting customers to unstake property or declare balances.
It additionally retained safety outfit zeroShadow to hint any remaining stolen cash, pledging to route future recoveries to the person fund.
zkLend plans to publish its refreshed, audited codebase as open-source “within the coming weeks” for any developer who desires to construct on the framework. The workforce added that it’ll “stay on-line and dedicated to the restoration of stolen funds by means of any means essential,” however won’t restart its money-market operations.
The choice marks the top of zkLend’s four-year run on Starknet and formalizes the shift from rebuilding the protocol to compensating customers by means of the restoration pool.
Exploit drained 3,300 ETH
On Feb.12, an attacker used a precision rounding flaw in zkLend’s Starknet contracts to empty about 3,300 ETH, worth roughly $9.5 million at the time. The exploiter bridged the property to Ethereum and routed them by means of the privateness software Railgun.
zkLend supplied the exploiter a ten% bounty if 90% of the funds have been returned by February 14, warning that it could pursue authorized motion if the deadline handed. The funds by no means got here again, and the protocol halted withdrawals whereas it labored with safety agency Cyvers, regulation enforcement companies, and on-chain investigators.
The investigation produced an surprising twist on April 1 when zkLend reported that the attacker misplaced 2,930 ETH to a phishing site impersonating Tornado Cash.
Blockchain analytics agency Lookonchain confirmed the loss, and the attacker despatched an on-chain message admitting the error, stating he misplaced all of the funds. He added: “I’m devastated and sorry.”
The breach left customers locked out of their deposits, and the protocol’s popularity suffered because of this.