Zcash fixes a critical security vulnerability that once threatened the safety of over 25,000 ZEC

ZEC-1,37%

Gate News message, April 1, privacy coin Zcash disclosed and fixed a critical security vulnerability. Security researcher Alex “Scalar” Sol disclosed on March 23 that the flaw stemmed from zcashd nodes skipping proof verification when processing transactions involving the Sprout privacy pool, which could be exploited by malicious miners to transfer more than 25,000 ZEC (about $6.5 million) from the deprecated Sprout pool.

Official statements said the vulnerability had been present since July 2020, but it was not actually exploited, and users’ funds were always safe. The development team released version v6.12.0 to complete the fix, and major mining pools completed the upgrade rollout within days. In addition, unaffected Zebra full-node implementations have the ability to trigger chain forks, providing extra protection if the vulnerability were exploited.

As disclosed, while the Sprout pool was shut down for new deposits in November 2020, there were still about 25,424 ZEC not yet migrated. Even if the vulnerability were exploited, Zcash’s turnstile mechanism could prevent inflationary issuance, ensuring the total supply could not be breached. The flaw was discovered with AI assistance, and the researcher will receive a total bounty of 200 ZEC (about $51,000). Notably, Zcash previously fixed a serious defect in 2019 that could lead to unlimited inflation.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Crypto’s most ridiculous robbery? A hacker minted $1 billion in DOT tokens, but only stole $230k

Hackers exploited the Hyperbridge cross-chain bridge vulnerability to mint 1 billion Polkadot (DOT) tokens. The nominal value was over $1.19 billion, but due to insufficient liquidity, they ultimately cashed out only about $237k. The attack was successful because the smart contract did not properly verify messages, allowing the hackers to steal administrative control and mint coins. The incident highlights the key role of market liquidity in the success of arbitrage.

CryptoCity9h ago

Fake Ledger Live App Steals $9.5M From 50+ Users Across Multiple Blockchains

A fraudulent Ledger Live app on Apple's App Store stole $9.5 million from over 50 users by compromising wallet information. The incident, involving significant losses for major investors, raises concerns about App Store security, prompting discussions of a possible lawsuit against Apple.

GateNews11h ago

Criticized for freezing USDC too slowly! Circle CEO: We will definitely wait for the court’s order before freezing—refusing to freeze privately/by ourselves without authorization

Circle CEO Jeremy Allaire said the company will not proactively freeze wallet addresses unless it receives a court order or a request from law enforcement. Even amid hacker money-laundering disputes and community backlash, Circle still insists on operating in accordance with the rule of law. Jeremy Allaire sets Circle’s law-enforcement bottom line ----------------------------- As the global cryptocurrency market roils, Circle’s CEO Jeremy Allaire, the stablecoin issuer, delivered a clear stance on the most sensitive issue in the market at a press conference in Seoul, South Korea. He pointed out that although Circle has the technical means to freeze specific wallet addresses, unless it receives a court order or a formal instruction from law-enforcement authorities, the company will not take such action on its own.

CryptoCity12h ago

Attacker Exploiting Bridged Polkadot Vulnerability Transfers $269K to Tornado Cash

On April 15, Arkham reported that the attacker who exploited a Bridged Polkadot vulnerability transferred around $269,000 in stolen funds to Tornado Cash, complicating asset tracking.

GateNews13h ago

Bitcoin Developers Propose BIP 361 to Protect Against Quantum Computing Threats

Bitcoin developers have proposed BIP 361 to safeguard the network against quantum computer risks by freezing vulnerable addresses. The proposal includes a phased plan to transition users to quantum-safe wallets, but it has sparked debate on user control and security.

GateNews13h ago

Hackers Exploit Obsidian Plugin to Spread PHANTOMPULSE Trojan with Blockchain C2

Elastic Security Labs revealed that threat actors impersonated venture capital firms on LinkedIn and Telegram to deploy a Windows RAT named PHANTOMPULSE, using Obsidian note vaults for attacks, which Elastic Defend successfully blocked.

GateNews14h ago
Comment
0/400
大元亨通vip
· 04-02 14:38
Buy the dip 😎
View OriginalReply0