Zcash Fixes Critical Node Bug That Could Have Put Millions in ZEC at Risk

CryptoNewsFlash
ZEC0,21%

  • Zcash has fixed a critical vulnerability in its node software that could have exposed millions of dollars worth of ZEC.
  • The flaw affected proof verification for transactions tied to the deprecated Sprout shielded pool, though no exploit was reported.

Zcash has patched a serious software flaw that, under the wrong circumstances, could have allowed attackers to drain a meaningful amount of ZEC from an older part of the network. The issue sat inside zcashd, the node software, and centered on transactions involving the legacy Sprout shielded pool. According to the disclosure, nodes were skipping proof verification in those cases. That is the kind of bug that gets attention quickly in privacy-focused systems, because proof checks are not a side detail. They are part of the core machinery that keeps invalid transfers from being accepted in the first place. A bug in an old pool, but still a real risk The vulnerability was disclosed by Alex “Scalar” Sol on March 23, with the public report released on Tuesday. The affected area was not the main current privacy path most users think about today, but the older Sprout pool, which has already been deprecated. Even so, deprecated does not mean harmless. If funds still sit there, the attack surface remains relevant. What made the flaw especially sensitive was the possibility that invalid transactions could slip past a critical validation step. In practical terms, that could have opened the door to draining funds from the pool without the network catching the problem where it should have. Zcash says funds remain safe So far, the important part is this. The bug was fixed before any known exploitation, and the disclosure says all user funds remain safe. That should calm immediate panic, though it does not erase the broader lesson. Legacy components in crypto systems have a habit of staying economically relevant long after the ecosystem has mentally moved on from them. Old pools, retired logic, deprecated code paths, these things still matter when real assets remain attached. For Zcash, the episode is less about visible damage and more about the value of catching a serious validation failure before it turns into one. In blockchain security, sometimes the most important story is the exploit that never got the chance.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Cowswap Frontend Under Attack, Users Urged to Revoke Permissions

Blockaid's security system detected a frontend attack on Cowswap, flagging the website COW.FI as malicious. Users are urged to revoke wallet permissions and refrain from interacting with the DApp.

GateNews2h ago

Polymarket reviews and weeds out early-stage projects in its ecosystem, targeting insider trading and market manipulation behaviors

Polymarket announced an audit of some of the onboarded startup projects that have been accused of using allegedly insider trading account information to steer users into making trades. The move is intended to strengthen compliance management and address external concerns about the risks of insider trading.

GateNews5h ago

In Q1 2026, Web3 projects suffered losses of over $460 million from hacks and scams, with phishing attacks leading the way.

Hacken’s report shows that in the first quarter of 2026, Web3 projects lost $464.5 million due to hacker attacks and scams, with phishing and social engineering attacks accounting for $306 million in losses. In addition, hardware wallet scams accounted for the bulk of the losses. Moreover, losses were also significant due to smart contract vulnerabilities and access control failures. In terms of regulation, the European legal framework has increased security monitoring requirements.

GateNews9h ago

RAVE’s hype surge triggers a flood of copycat coin mania, as FF and INX expose the “pump-and-dump” scheme

Recently, altcoins represented by RAVE have sparked a fierce investment craze, but some old star projects like FF and INX have used this wave of hype to carry out “pump-and-dump” operations—rapidly driving up coin prices to lure retail investors to buy, and then dumping them heavily, causing the price to plunge rapidly. Such behavior not only exposes the project team’s funding difficulties, but also damages investors’ trust. Investors need to stay alert to signals like abnormal short-term surges in order to avoid the risk of being manipulated by the market.

MarketWhisper12h ago

FBI teams up with Indonesia to dismantle W3LL phishing network, with more than $20 million involved

The U.S. FBI and Indonesian police successfully cooperated to dismantle a W3LL phishing network, seizing related equipment and detaining suspects. The W3LL phishing toolkit offers low-priced fake login pages that use man-in-the-middle attacks to easily bypass multi-factor authentication, forming an organized cybercrime ecosystem. This operation marks cooperation between the U.S. and Indonesia in law enforcement against cybercrime; however, the security threats to cryptocurrency users remain severe.

MarketWhisper16h ago

Squads Emergency Alert: Address poisoning and forged multisig accounts; a whitelist mechanism will go live

Solana ecosystem multi-signature agreement Squads issued a warning, pointing out that attackers launched an address poisoning attack against users by using fake accounts to trick users into making unauthorized transfers. Squads confirmed that there was no loss of funds and emphasized that this is a social engineering attack rather than a protocol vulnerability. To respond, Squads has implemented protective measures such as a warning system, non-interactive account prompts, and a whitelist mechanism. This incident reflects the growing social engineering threats in the Solana ecosystem and has prompted ongoing security reviews.

MarketWhisper16h ago
Comment
0/400
No comments