Key Takeaways
- Flow Foundation has advanced to Phase 2 of its recovery plan following a significant $3.9 million hack on its blockchain.
- Full Ethereum Virtual Machine (EVM) compatibility is expected to be reached within 24 hours, bolstering network security.
- Over 99.9% of user accounts are projected to regain full access once the dual environment restoration is completed.
What Happened
The Flow Foundation has officially moved into Phase 2 of its remediation plan after a debilitating exploit that resulted in a $3.9 million theft from its blockchain. Developers have reportedly made substantial progress in fixing the vulnerabilities that allowed this breach, transitioning their focus towards restoring full Ethereum Virtual Machine (EVM) compatibility within the next 24 hours, as reported by Crypto News. Initially considering a full-chain rollback to address the hack, the Foundation opted for a multi-phase approach in response to community pushback regarding centralization risks and potential transaction finality issues.
Why It Matters
The decision to not proceed with a full-chain rollback underscores a growing emphasis within the blockchain community on decentralization and user governance. The backlash against centralized recovery methods speaks volumes about prevalent sentiment favoring governance models that prioritize stakeholder involvement. As the market increasingly values decentralized protocols, more actions akin to those taken by the Flow Foundation may emerge. For similar perspectives on market practices, see our piece on the impact of decentralization in crypto—[related: cryptocurrency governance trends](https://cryptechtoday.com/blog/).
What’s Next / Market Impact
As Phase 2 progresses with a “Cadence cleanup” alongside the EVM layer restoration, users are eager for news on the recovery timeline. The Flow Foundation anticipates that over 99.9% of user accounts will regain full access following the completion of these upgrades, a critical step towards rebuilding investor confidence. Accounts considered suspicious will face temporary restrictions to curtail further illicit operations during the recovery process. Once stability is verified and both environments are back online, the next step will involve reopening cross-chain bridges and resuming exchange activities to reinstate normal operations, as outlined by Crypto News, along with insights from sources tracking previous exploits such as the unauthorized creation of 150 million FLOW tokens highlighted by Blooming Bit.









