CrossCurve Bridge Drained of $3M in Smart Contract Exploit
Attackers exploited a validation flaw to send spoofed cross-chain messages and unlock tokens across Ethereum, Arbitrum, and six other networks.
The CrossCurve cross-chain bridge suffered a smart contract exploit that drained approximately $3 million in cryptocurrency across multiple blockchain networks. Attackers found a way to bypass validation checks and send spoofed messages that tricked the bridge into releasing locked tokens.
CrossCurve, formerly known as EYWA Protocol, provides infrastructure for moving assets between blockchains. It operates in partnership with Curve Finance, one of the largest decentralized exchanges. On Sunday, attackers demonstrated that partnership doesn't guarantee security. The cryptocurrency sector has faced mounting security challenges recently, including the Ledger data breach that exposed customer order information.
How the Attack Unfolded
The vulnerability resided in CrossCurve's expressExecute function, which handles cross-chain token transfers. Properly formatted messages should only come from verified sources on connected blockchains. The attackers found they could craft spoofed messages that bypassed these validation checks entirely.
By sending malicious cross-chain messages to the PortalV2 contract, attackers triggered the expressExecute function and unlocked tokens they had no right to access. The function treated the spoofed messages as legitimate transfer requests and dutifully released funds.
BlockSec, a blockchain security firm, estimated total losses at $2.76 million spread across multiple networks:
- Ethereum: ~$1.3 million
- Arbitrum: ~$1.28 million
- Additional chains: Optimism, Base, Mantle, Kava, Frax, Celo, and Blast also saw fund drainage
The attackers consolidated stolen assets into ten Ethereum addresses. CrossCurve identified these wallets within hours of the attack.
CrossCurve's Response
The protocol's team posted to X (formerly Twitter) late Sunday acknowledging the attack: "Our bridge is under attack, involving the exploitation of a vulnerability in one of the smart contracts used. Please pause all interactions with CrossCurve while the investigation is ongoing."
CrossCurve CEO Boris Povar took a harder line hours later, directly addressing the attacker. He warned that if funds aren't returned within 72 hours and no contact is established, the team would "assume malicious intent and treat the matter as a judicial issue."
Povar offered a 10% bounty—approximately $300,000—for the return of stolen funds under a white-hat framework. This is standard practice in DeFi incident response. Some attackers take the deal; others don't.
Curve Finance Distances Itself
Curve Finance moved quickly to clarify its exposure. The protocol advised users with positions in CrossCurve-linked liquidity pools to "reassess their positions and consider withdrawing governance support tied to those allocations."
Curve emphasized that its core smart contracts remain unaffected by the CrossCurve breach. But the statement highlights an uncomfortable reality in DeFi: protocols are interconnected, and a vulnerability in one system can ripple through partnerships and integrations.
CrossCurve's integration with Curve gave it credibility in the ecosystem. That credibility just took a hit.
The Persistent Bridge Problem
Cross-chain bridges remain one of the most attractive targets in cryptocurrency. They hold large amounts of locked assets, their security models are complex, and they've been exploited repeatedly.
The Ronin bridge hack cost $625 million. Wormhole lost $320 million. Nomad Bridge hemorrhaged $190 million. These incidents keep happening because bridges face a fundamentally difficult security challenge: they must verify that events on one blockchain actually occurred without being able to directly observe that blockchain.
Different bridges solve this problem in different ways—some use trusted validators, others rely on optimistic verification or cryptographic proofs. Each approach carries tradeoffs between decentralization, speed, and security. And each approach has eventually been exploited.
CrossCurve's validation bypass fits the pattern. Attackers find the gap between what the bridge assumes about incoming messages and what it actually verifies. Then they craft messages that satisfy the verification while violating the assumptions.
Implications for Users
Anyone who provided liquidity to CrossCurve or used the bridge for token transfers should check their positions. If the bridge lost funds, liquidity providers may face losses depending on how the protocol handles the shortfall.
The 72-hour ultimatum creates uncertainty. If the attacker returns funds (minus the bounty), users might see full recovery. If not, the protocol will need to decide how to handle the deficit—whether through insurance funds, protocol revenue, or socialized losses across liquidity providers.
DeFi users should treat bridge interactions as high-risk operations. The potential for catastrophic loss exists every time assets are locked in a bridge contract. This doesn't mean avoiding bridges entirely—cross-chain functionality is genuinely useful—but it does mean understanding what you're risking. For practical tips on protecting yourself online, see our online safety guide.
What Happens Next
CrossCurve's investigation is ongoing. The protocol will likely publish a post-mortem detailing exactly how the validation bypass worked and what code changes will prevent similar exploits.
If the attacker doesn't return funds, CrossCurve faces a choice about whether to pursue legal action. Some protocols have successfully worked with law enforcement to identify and prosecute attackers—just last month, we saw incident responders plead guilty to ALPHV/BlackCat ransomware charges, showing that prosecution is possible. Others have found that cryptocurrency's pseudonymity makes attribution difficult.
The 10% bounty offer suggests CrossCurve would prefer a negotiated resolution. In DeFi's strange world, paying your attacker to return stolen funds often makes more financial sense than the alternatives.
Frequently Asked Questions
Are my funds at risk if I used CrossCurve in the past? Historical transactions that completed successfully aren't affected—your tokens reached their destination. The risk is to assets currently locked in CrossCurve's contracts or to liquidity providers who may face losses depending on how the protocol handles the shortfall.
Should I withdraw from Curve pools connected to CrossCurve? Curve Finance suggested users reassess their positions. If you're providing liquidity to pools that integrate with CrossCurve, understand that third-party risk exists even when the main protocol's contracts are secure.
Related Articles
WhatsApp Bug Lets Malicious Media Spread via Group Chats
Researchers disclose zero-click attack vector on Android where adding a user to a group can trigger malware execution through manipulated media files.
Feb 3, 2026CISA KEV Deadline Hits Today for Unpatched Gogs Zero-Day
CVE-2025-8110 allows authenticated attackers to achieve RCE on self-hosted Git servers via path traversal. Over 700 instances already compromised.
Feb 2, 2026Redis RCE Exploit More Severe Than Initially Rated
JFrog researchers develop working remote code execution exploit for CVE-2025-62507, a stack buffer overflow in Redis discovered by Google's AI security agent.
Feb 1, 2026Iconics SCADA Flaw Allows System File Corruption
CVE-2025-0921 enables privileged file system operations that can disrupt industrial control systems in automotive, energy, and manufacturing environments.
Feb 1, 2026