Published

Flow Foundation Hack: $3.9M Loss and Two-Stage Recovery Plan

4 min read
Flow Foundation Hack: $3.9M Loss and Two-Stage Recovery Plan

Key Takeaways

  • 1 Flow Foundation suffered a $3.9 million loss and unauthorized creation of 150 million FLOW tokens.
  • 2 The recovery plan has two stages: Cadence normalization and EVM restoration.
  • 3 The foundation rejected a chain rollback and opted to burn illicitly created tokens.
  • 4 The hacker exchanged stolen FLOW for Bitcoin via Binance exchange.
  • 5 Major Cadence-based apps, including NBA Top Shot, experienced minimal impact.

Flow Foundation lost $3.9M and 150M illicit FLOW tokens in a hack. The foundation's two-stage plan includes Cadence normalization and EVM recovery with token burn.

Flow Foundation faced a serious security incident: $3.9 million was drained from the network, and an attacker illegally minted 150 million FLOW tokens. In response, the foundation announced a two-stage recovery plan combining technical fixes and economic remediation without rolling back the chain history.

Overview of the Flow Foundation Hack

The attack targeted Flow's modular architecture, resulting in unauthorized token issuance. Consequently, the foundation suffered direct financial damage, while the community debated possible responses, including network rollback and other recovery measures.

Two-Stage Recovery Plan

The foundation outlined a two-step plan, each addressing distinct technical and economic challenges. The first stage focuses on normalizing the native Cadence smart contract runtime environment, while the second aims to restore the functionality of the EVM-compatible layer.

Stage 1 — Cadence Normalization

During the first step, efforts were made to stabilize the network core and Cadence environment, preserving the operation of key applications. As a result, major Cadence projects, including NBA Top Shot, experienced minimal disruptions and remained essentially functional.

Stage 2 — EVM Recovery

The second stage concentrates on fixing the vulnerability and restoring compatibility with the Ethereum Virtual Machine. This is crucial for applications and bridges that rely on the EVM layer to interact with the Ethereum ecosystem.

Decision to Burn Tokens Instead of Rollback

Rather than performing a full transaction rollback, the foundation decided to remove the illicitly minted 150 million tokens from circulation through a token burn mechanism. This compromise eliminates excess issuance without altering past blocks.

Hack Details and Hacker Actions

Investigation revealed the attacker exploited a vulnerability allowing the minting of 150 million FLOW tokens. The stolen tokens were then exchanged for Bitcoin on the centralized Binance exchange, after which the funds were withdrawn from the platform.

The flow of funds through a centralized exchange drew attention to user verification and anti-money laundering procedures. Regulators and market operators are actively discussing the role of exchanges and KYC/AML protocols.

Expert Opinions and Rollback Debate

The idea of rolling back the chain sparked lively debate within the community; ultimately, it was rejected in favor of alternative measures. This decision set an important precedent balancing technical fixes with the will of the decentralized community. More about the reasons for rejecting the rollback can be found in the article rollback plan cancellation.

Public commentary highlighted that choosing token burning over rollback reflects network governance priorities. Dr. Anya Sharma from Stanford noted this decision marked a key moment for Flow’s governance and required flawless execution to avoid side effects on the token economy.

Impact on Flow Architecture and Future Outlook

The incident demonstrated that separating functions between Cadence and EVM limits the attack’s impact on the main chain. However, vulnerabilities in compatibility layers remain a critical risk area needing ongoing monitoring and auditing.

While the foundation implements technical fixes and plans token burns, the recovery outcome will indicate the protocol’s long-term governance resilience and security. Details on potential next steps and associated risks are discussed in related materials, such as the article on network shutdown and transaction rollback.

Why This Matters

If you are involved in mining or operate hardware, it’s important to understand that such incidents primarily affect project trust and token liquidity rather than physical equipment operation. Reduced trust can impact token price and exchange convenience, ultimately influencing profitability and withdrawal options.

Additionally, the use of centralized platforms for laundering funds highlights risks when interacting with exchanges: delays in controls and fund freezes can affect liquidity availability. Therefore, even if your mining is not directly related to Flow, ecosystem events may indirectly alter the financial environment you operate in.

What to Do?

  • Follow official announcements from Flow Foundation and verified sources before conducting any operations with FLOW or related assets.
  • Avoid interacting with suspicious transactions and addresses linked to compromised tokens to reduce risks of losses and inadvertent trading with laundered assets.
  • Check KYC/AML policies on exchanges you use and prefer reputable platforms for fund withdrawals.
  • Keep software updated and monitor patches from developers, especially if you run nodes or services interacting with the EVM layer.

If needed, subscribe to Flow’s official channels and track further instructions from the foundation regarding token burns and vulnerability closures. This will help you make timely and informed asset management decisions.

Frequently Asked Questions

What losses did Flow Foundation suffer?

As a result of the hack, the foundation recorded a $3.9 million loss and the creation of 150 million illicit FLOW tokens.

Why did the foundation reject a network rollback?

Rollback met strong community resistance; ultimately, the foundation chose a solution that does not alter blockchain history — burning the illicit tokens.

What does the two-stage recovery plan include?

Stage one involves normalizing the Cadence environment and stabilizing the network core; stage two focuses on fixing the vulnerability and restoring EVM compatibility.

Where did the attacker send the stolen funds?

Investigations showed the stolen tokens were exchanged for Bitcoin via Binance exchange, after which the funds were withdrawn.

Were Cadence-based applications affected?

Major applications built on Cadence, including NBA Top Shot, experienced minimal disruptions and were not significantly impacted by the incident.