Zunami Protocol - Rekt II

Emergency functions make excellent getaway vehicles.
Zunami Protocol watched $500K vanish into digital mist when their contract authority fell into the wrong hands on May 14th, transforming a yield aggregator into an express lane for outbound funds.
No flash loans. No price manipulation. No complex smart contract wizardry.
Just someone with god-mode access casually calling withdrawStuckToken() and walking away with the vault's entire contents.
Three weeks of radio silence later, users are left questioning whether Zunami was genuinely compromised - or whether the "compromise" was the plan all along.
When your emergency function becomes someone else's payday, who's really pulling the strings in your protocol?

Zunami broke their own bad news first: "The Zunami protocol has been hacked - the collateral for zunUSD & zunETH has been stolen. We are currently investigating the situation."
Almost an hour later, Vladimir S. spotted the carnage, flagging the admin key compromise while funds vanished into Tornado Cash.
PeckShield confirmed the kill - $500K in zunUSD and zunETH collateral, gone.
Tony Ke asked the question everyone was thinking: admin private key compromised, or insider job?
SuplabsYi wondered how private key leaks somehow made audits useless, calling out the obvious misdirection.
But Michael Egorov cut straight to the bone: "What is worse, admin key existed!"
What kind of protocol leaves the vault wide open and then vanishes when someone walks in?
The Attack
The exploit didn’t require clever code or timing. Just a single call from someone holding the keys to the castle.
Here’s how it went down…
Admin Role granted on May 14th: 0x2697a6f04bb4aff65f9ce2e7a3cac8addeafc52131495ef4d1760316b5aee3b0
Access was granted by the Zunami Protocol Deployer Wallet: 0xe9b2B067eE106A6E518fB0552F3296d22b82b32B
7 minutes later, Zunami was exploited…
Attacker Address: 0x051370419b871f7c05dee8f7134401530832e250
Attack Transaction: 0xd7ce50992b36acbc746a821a74e5600230cfe5b36cfc155841581e376f4c14d2
Dedaub's transaction trace shows the smoking gun - someone called withdrawStuckToken() on Zunami's UsdtCrvUsdStakeDaoCurve strategy.
Turns out the only thing "stuck" was users' money.
296,456 LP tokens (collateral for zunUSD and zunETH) transferred clean to the attacker's address. No complex exploit mechanics.
No flash loan wizardry. Just: "Hey contract, give me all your tokens." → "Okay boss!"
The attacker didn't crack any cryptographic puzzles - they just flashed their admin badge and politely asked for everything inside.
But how does an admin key end up in an attacker's wallet - accident or design?
Red Flags Flying
Zunami's May 2025 collapse didn't happen in a vacuum - the warning signs were flashing neon for months.
No commits to the public GitHub repo for at least three months before the hack. Development appeared abandoned while user funds sat locked in strategies.
TVL bleeding out steadily over months as yield incentives evaporated.
According to a regular member on their Discord, Curve gauge rewards dropped to zero right before the exploit - perfect timing for an exit.
The team's first Discord response to losing half a million? "rekt lmfao"
Three weeks later, radio silence continues while users demand answers that never come.
When a protocol shows every symptom of abandonment, is a "hack" really a surprise - or just the final curtain call?
History repeats
Zunami's 2025 disaster was just the latest in a series of catastrophic failures stretching back years.
2023 started with a triple threat of exploits that should have been warning enough.
January 26th - a routine fund transfer got sandwich-attacked in the mempool. $49K gone on what should have been a simple swap.
A month later, the blood bath continued. Price gaps between Zunami's pools turned into an all-you-can-eat buffet for flashloan attackers.
Mint ZLP tokens at discount prices, cash out at inflated rates. Rinse and repeat across thirteen transactions.
According to Zunami's own Medium post, the team admitted the combined damage: "In total, the attackers stole $260k.
$260K vanished. LP pricing broken. Investment strategies exposed.
But the worst was yet to come.
August 2023 delivered the knockout punch - a $2.1M price manipulation attack that we covered right here on Rekt.
Flash loans drained zETH and UZD liquidity pools on Curve, causing 85% and 99% depegs respectively. The attacker used token swaps to manipulate LP prices, then cashed out 1,184 ETH straight to Tornado Cash.
Three separate attacks. One catastrophic year. $2.36 million in total losses.
The team promised fixes, compensation, better security.
Two years later, here we are again - except this time it's an "admin key compromise".
Now 2025 brings exploit number four - someone with the master keys simply walked in and cleaned the house.
Same protocol. Fourth time's the charm. Each excuse is more creative than the last.
Four exploits, four excuses - coincidence or playbook?
Damage Control Comedy Theater
Two weeks after the exploit, Zunami CEO Kirill Kozlov finally surfaced with corporate ambiguity:
“We’re investigating the exploit and considering both scenarios: a compromised deployer or malicious intent by the key holder.”
Translation: We don’t know if we got hacked - or robbed by our own team.
CTO Mikhail Zelenin, aka MioGreen on Discord, went with a more cinematic explanation:
"My laptop was deeply investigated by Russian police during a border crossing. It was in their possession for many hours. All source codes of the protocol were there without cryptographic security... I still don't have any other hypothesis except the cloning of my hard drive."
He admitted the protocol strategies were never switched over to DAO control as promised, citing developer burnout and a lack of support:
“Because of the absence of investment in the protocol, I was the only developer… I made simple mistakes.”
Then came the Ferrari subplot.
After a Russian article mentioned the CTO owning a Ferrari, Zelenin clapped back:
“I never had any Ferrari. And I don’t have any right now. Cyprus police will easily clarify it, because I am here in the residential permit.”
The community didn’t buy it.
One Discord user fired back: “You’re either a thief or completely incompetent and responsible for the protocol getting hacked three times.”
When your best explanations involve cloned laptops, abandoned strategy updates, and Ferrari denials - maybe the problem isn’t the investigation.
Maybe it's the infrastructure.
When your damage control involves blaming Russian border police and denying Ferrari ownership, maybe the real problem isn't the investigation?
Community Uprising
Zunami’s Discord turned into a war zone as users pieced together a familiar pattern: ghosted devs, dead links, and suspicious timing.
One member highlighted some red flags: “What makes it likely for me: No commits in 3 months, TVL dropping for months, domain expired, rug happened hours after Curve gauge incentives dropped to 0%.”
When users raised questions, the team got defensive instead of transparent:
“You're making direct accusations, and I'd like to ask you to be more careful.”
The reply was blunt: “I'm not making direct accusations, I'm literally saying ‘if it turns out to be’—but yeah, there is a high likelihood here.”
By June, the community's patience had evaporated. Even the team moderator issued an ultimatum:
“I live in Thailand. If the founder doesn’t make progress on this soon, I’m prepared to file a report with the Thai police myself.”
His deadline? June 13th. Which has since passed…
The founder’s update? Crickets.
When even your own moderators are threatening police action, is this still a “technical investigation” - or just a crime scene with better branding?

Emergency functions make excellent getaway vehicles - just ask whoever held Zunami's admin keys.
Three weeks of silence. No post-mortem. No compensation plan. No answers about who exactly had "malicious intent" with those keys.
Zunami’s collapse barely made headlines.
Half a million dollars vanished into Tornado Cash, and the story slipped off the radar, except for a few who stayed vigilant.
Vladimir S. flagged the admin compromise. PeckShield confirmed the loss. Tony Ke asked the hard questions. SuplabsYi pointed out the audit theater.
But after that? The story fell off the radar.
Sometimes these convenient "hacks" get swept under the rug until users find their voice.
We are that voice.
We have been following this citation since the story broke and the suspicions kept piling up.
The red flags were flashing neon - abandoned development, expired domains, perfect timing with incentive drops, and a team that responds to theft with "rekt lmfao."
Whether this was gross negligence or calculated theft, the result is identical: users holding empty bags while someone else counts their stablecoins.
Emergency functions were meant to save protocols in crisis, not provide cover for digital heists.
But when the people holding the keys are the same ones calling the shots, who's really driving the getaway car?

REKT serves as a public platform for anonymous authors, we take no responsibility for the views or content hosted on REKT.
donate (ETH / ERC20): 0x3C5c2F4bCeC51a36494682f91Dbc6cA7c63B514C
disclaimer:
REKT is not responsible or liable in any manner for any Content posted on our Website or in connection with our Services, whether posted or caused by ANON Author of our Website, or by REKT. Although we provide rules for Anon Author conduct and postings, we do not control and are not responsible for what Anon Author post, transmit or share on our Website or Services, and are not responsible for any offensive, inappropriate, obscene, unlawful or otherwise objectionable content you may encounter on our Website or Services. REKT is not responsible for the conduct, whether online or offline, of any user of our Website or Services.
you might also like...
Zunami Protocol - REKT
The Curve ecosystem can't catch a break... Yesterday, Zunami Protocol lost $2.1M to a price manipulation attack. Keeping DeFi safe is a constant game of cat-and-mouse, one that can’t always be won.
AlexLab - Rekt II
Over $16 million drained by a fake that tricked their vaults using their own permissions. AlexLab got rekt - again. Last year it was a leaked key, this time it’s bad logic. Two exploits, two attack vectors - same protocol, still not learning.
Cork Protocol - Rekt
Fake tokens just popped the Cork protocol for $12 million. The protocol built to hedge depeg risk got depegged from reality by trusting counterfeit contracts.