This article was first published on The Bit Journal. Cross-chain crypto protocol CrossCurve has confirmed that its bridge infrastructure was compromised in a smartThis article was first published on The Bit Journal. Cross-chain crypto protocol CrossCurve has confirmed that its bridge infrastructure was compromised in a smart

CrossCurve Bridge Hacked, How $3M Lost in Cross-Chain Attack

2026/02/03 02:00
6 min read
For feedback or concerns regarding this content, please contact us at [email protected]

This article was first published on The Bit Journal. Cross-chain crypto protocol CrossCurve has confirmed that its bridge infrastructure was compromised in a smart contract attack, with the CrossCurve exploit resulting in losses estimated at roughly $3 million across several blockchain networks. The incident, which was revealed late on Sunday, underscores endemic security vulnerabilities in cross-chain systems, which is among the most common attack types in the field of decentralized finance.

CrossCurve Exploit Linked to Messaging Vulnerability

In an announcement posted to X, CrossCurve wrote that its bridge was under attack by hackers who had used a vulnerability in one of the smart contracts that perform cross-chain messaging. The protocol itself recommended users to cease all communications as the group researches and makes an effort to contain the CrossCurve exploit.

CrossCurve Bridge Hacked, How $3M Lost in Cross-Chain Attack

Later on, analysis by blockchain security companies found that the attacker could bypass the important validation checks in the bridge architecture. Defimon Alerts, a service provided by Decurity, claimed that the CrossCurve exploit was the result of a vulnerability that enabled cross-chain messages to be spoofed so that unauthorized unlocks of tokens could be made.

CrossCurve Exploit Caused Multichain Asset Losses

Investigators reported that the vulnerability lay in a smart contract related to a CrossCurve receiver system based on Axelar. The attacker supposedly invoked expressExecute function in the ReceiverAxelar contract with a forged message bypassing gateway checks. This caused the PortalV2 contract to issue assets without adequate support, and the money was pumped out of the various chains during the CrossCurve exploit.

Defimon Alerts approximated the total value of assets lost in CrossCurve exploit to be about 3 million dollars but this number may vary, as on-chain forensics is ongoing. CrossCurve has not yet released a comprehensive list of the tokens or networks that were impacted.

CrossCurve Offers Bounty to Recover Funds

CrossCurve CEO Boris Povar publicly posted 10 wallet addresses suspected of being connected to the CrossCurve exploit in an attempt to recover the stolen money. He provided a bounty of up to 10 percent of the recovered funds in case of the assets being returned within 72 hours, which he described as a possible white hat solution. 

Povar further stated that, failing to receive any form of communication within the timeframe will cause the protocol to consider the CrossCurve exploit malicious and seek legal action, such as with law enforcement, legal action, and liaising with other crypto projects to freeze funds when feasible.

Curve Finance Issues Warning After Exploit

CrossCurve exploit was also followed by a word of caution issued by Curve Finance, which has worked with CrossCurve. The Curve team encouraged users who had placed bets on CrossCurve pools to review their bets and risk awareness in dealing with third-party protocols is essential.

Cross-chain bridges have always been one of the most exploited items of the crypto ecosystem. During the last few years, vulnerabilities in message verification and validation logic have cost billions of dollars; some of the notable examples are the Ronin Bridge hack, the Wormhole exploit, and the Nomad bridge collapse. The CrossCurve exploit has a common theme where the reason behind massive asset losses is due to a small validation error.

Security Researchers Warn About Advanced Threats

Security researchers caution that the greater threat environment is getting more advanced. More recently, in another discovery, the cybersecurity company ReversingLabs found malware embedded in Ethereum smart contracts, and distributed as forged Node Package Manager (NPM) JavaScript packages. 

Malicious commands were also extracted via the technique through on-chain data, which could be used by attackers bypassing the standard security checks, which has evolved in this manner similar to these tactics observed in CrossCurve exploit.

CrossCurve Exploit Warns Users About DeFi

The CrossCurve exploit is another warning to users of the dangers in dealing with DeFi protocols. Researchers still recommend that people should be cautious, stay off untested or recently opened bridges, never sign contracts blind, keep hardware wallets, and have multiple platforms.

Although the CrossCurve exploit is still being investigated, the event reinforces a persistent truth in decentralized finance that innovation can always stay ahead of security, and that users are left as the last line of defense.

Conclusion

The CrossCurve exploit serves as a stark reminder of the persistent risks in DeFi, particularly with cross-chain bridges. With the rate of innovation being higher than security, users need to be more aware, access audited platforms, hardware wallets, and practice carefully, and current investigations seek to restore stolen resources and ensure future security.

Follow us on Twitter and LinkedIn, and join our Telegram channel to be instantly informed about breaking news!

Summary

  • CrossCurve’s cross-chain bridge was exploited, causing roughly $3 million in losses across multiple networks.
  • Attackers bypassed validation checks using forged cross-chain messages to unlock unbacked tokens.
  • The protocol provided a 10 percent white hat bounty and threatened to take legal action in case of non-payment of money.
  • The attack points out to the long term security vulnerability of cross-chain DeFi bridges.

Glossary of Key Terms

CrossCurve Exploit: Security breach causing ~$3M loss via smart contract flaw.
ReceiverAxelar: CrossCurve contract that receives and validates messages.
expressExecute Function: Contract function exploited to unlock tokens fraudulently.
PortalV2 Contract: Contract issuing assets across chains, used in exploit.
White Hat Bounty: Reward for returning stolen assets ethically.
Defimon Alerts: Blockchain monitoring service reporting the exploit.
Curve Finance: DeFi protocol that issued warnings after the exploit.
Validation Checks: Security steps to confirm transactions or messages.

Frequently Asked Questions about CrossCurve Exploit

1. What happened in the CrossCurve exploit?

CrossCurve’s bridge was hacked, causing an estimated $3M loss by exploiting smart contract vulnerabilities.

2. How was it done?

Attackers spoofed cross-chain messages and triggered token unlocks via the ReceiverAxelar and PortalV2 contracts.

3. What is CrossCurve doing?

CEO offered a white hat bounty of 10% for returned funds; legal action may follow.

4. How can users stay safe?

Use audited bridges, hardware wallets, avoid blind contracts, and diversify assets.

References

Twitter

Twitter

Twitter

Read More: CrossCurve Bridge Hacked, How $3M Lost in Cross-Chain Attack">CrossCurve Bridge Hacked, How $3M Lost in Cross-Chain Attack

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Palmeiras Defeats River Plate In Epic Copa Libertadores Clash

Palmeiras Defeats River Plate In Epic Copa Libertadores Clash

The post Palmeiras Defeats River Plate In Epic Copa Libertadores Clash appeared on BitcoinEthereumNews.com. BUENOS AIRES, ARGENTINA – SEPTEMBER 17: Gustavo Gomez of Palmeiras scores the team’s first goal during the Copa CONMEBOL Libertadores 2025 Quarter-final first-leg match between River Plate and Palmeiras at Estadio Más Monumental Antonio Vespucio Liberti on September 17, 2025 in Buenos Aires, Argentina. (Photo by Marcelo Endelli/Getty Images) Getty Images Palmeiras defeated River Plate 2-1 in Buenos Aires on Wednesday night. The Brazilian side will host the second leg of the Copa Libertadores quarter-final in São Paulo next week. Clash Of South American Giants This is the biggest clash in the Copa Libertadores quarter-finals. Palmeiras has won three Copa Libertadores titles, including back-to-back trophies in 2020 and 2021, and River Plate has won the trophy four times, with the last victory coming against rivals Boca Juniors in the 2018 final. Palmeiras’ forward #09 Vitor Roque (L) and River Plate’s Chilean defender #17 Paulo Diaz (R) fight for the ball during the Copa Libertadores quarterfinal first leg football match between Argentina’s River Plate and Brazil’s Palmeiras at the MAS Monumental Stadium in Buenos Aires on September 17, 2025. (Photo by Juan MABROMATA / AFP) (Photo by JUAN MABROMATA/AFP via Getty Images) AFP via Getty Images Both teams have huge fan bases in their respective nations and both are currently competing for their domestic league as well as the continental title. River Plate hosted the first leg at the incredible Estadio Monumental, which hosted the 1978 World Cup final and is now the biggest stadium in South America. Fast Start Takes Palmeiras To Victory Gustavo Gómez opened the scoring for visitors Palmeiras after just six minutes of play. The team in green silenced a sea of red and white with a sucker-punch of a goal from a set-play. New signing from Fulham Andreas Pereira provided the assist and the defender headed…
Share
BitcoinEthereumNews2025/09/18 23:50
CEO of ‘Textbook Ponzi’ Pleads Guilty in $200M Bitcoin Fraud Case

CEO of ‘Textbook Ponzi’ Pleads Guilty in $200M Bitcoin Fraud Case

Ramil Ventura Palafox admitted to defrauding more than 90,000 investors through a fake Bitcoin trading program.
Share
Coinstats2025/09/18 14:42
XRP, Bitcoin, and USDC users are earning up to $11,600 daily using Confluxcapital

XRP, Bitcoin, and USDC users are earning up to $11,600 daily using Confluxcapital

The post XRP, Bitcoin, and USDC users are earning up to $11,600 daily using Confluxcapital appeared on BitcoinEthereumNews.com. Disclosure: This article does not
Share
BitcoinEthereumNews2026/03/30 18:45