Cross-Chain Bridge Vulnerability Leads to $3M CrossCurve Loss

CRV3,1%
SAGA3,07%
SOL1,47%

Losses at CrossCurve underline the high risk of cross-chain bridges during periods of rising crypto attacks.

CrossCurve halted user activity after an attack targeted its cross-chain bridge. The incident forced developers to investigate a smart contract flaw. Partner protocols and and security firms issued warnings as funds were traced on-chain.

User Interactions Halted as CrossCurve Examines Contract Weakness

CrossCurve confirmed on Sunday that its cross-chain bridge was targeted by attackers. The team linked the incident to a flaw in one of the bridge’s smart contracts. Users were asked to pause all activity while developers began reviewing the issue.

Because assets are held across multiple smart contracts, moving them between networks increases risk when a single component fails.

⚠️ URGENT Security Notice

Dear users,

Our bridge is currently under attack, involving the exploitation of a vulnerability in one of the smart contracts used.

Please pause all interactions with CrossCurve while the investigation is ongoing.

We appreciate your patience and… pic.twitter.com/yfo1KvWoDd

— CrossCurve (@crosscurvefi) February 1, 2026

Curve Finance addressed its community shortly after the incident. Users with exposure to CrossCurve pools were advised to reassess their positions and decide whether to withdraw voting support. The statement urged careful judgment when interacting with external protocols during unstable conditions.

Early checks found damage limited to the bridge, with no issues detected across other protocol components. Alerts went out quickly, while the team kept access paused and tracked the movement of stolen funds.

Protocol Calls for Asset Returns After On-Chain Review

After tracing on-chain activity, the team found that funds from the exploit had moved into 10 wallet addresses. CrossCurve said it could not confirm whether those wallets belonged to the attackers and saw no clear hostile behavior at that point. Even so, the protocol acknowledged that users lost funds due to the exploit.

In response, project officials appealed directly to recipients to return the assets. The team described the transfers as improper and asked for cooperation. To support recovery efforts, CrossCurve activated its SafeHarbor WhiteHat policy, offering a reward of up to 10% of recovered funds if the rest is returned.

Details included a direct contact email for coordination. An alternative option allows anonymous returns through a designated wallet address. The team said recovered funds would be returned to affected users after review.

Moreover, CrossCurve shared a contact email to help coordinate the return of funds. A separate wallet address was also provided for those who prefer to send assets back without revealing their identity. After verification, the team said it plans to distribute recovered funds to affected users.

Recent Breaches Expose Ongoing Risks in Decentralized Finance

Crypto attacks have increased across the industry, with the CrossCurve incident adding to a growing list of breaches. Security firm CertiK recorded nearly $400 million in losses in January 2026, with more than 40 major incidents reported.

_Image Source: _X/CertiK

Cross-chain systems face a higher risk because they handle large amounts of funds and rely on complex structures. Recent incidents show how fast damage can spread once an exploit begins.

Other victims during the same period included Swapnet, which lost $13 million. Saga and Makina Finance reported losses of $6.2 million and $4.2 million. Step Finance also suffered a breach that drained several treasury and fee wallets, moving more than 261,000 SOL.

Losses across 2025 passed $1 billion, marking the worst year on record for crypto theft. The CrossCurve case adds another reminder of ongoing security gaps within decentralized finance.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Steakhouse Financial: The official website is temporarily offline, but the vault is running normally. The attack originated from social engineering that compromised an OVH account.

Steakhouse Financial releases the latest updates on the security incident. The official website is still offline, but the Steakhouse Vaults site is operating normally, and there are no issues with the deposit and withdrawal functions. The attack originated from a phone-based social engineering assault, which resulted in the theft of domain management permissions, and the website’s DNS now points to a malicious IP. The official team has rolled back all changes, and users’ assets are safe.

GateNews42m ago

Gauntlet: After the Resolv Labs exploitation incident, it still has not published a remediation plan and has removed multiple markets

Gauntlet said that after the vulnerability incident, Resolv Labs did not publish a remediation plan, and it plans to pursue funds and perform removal operations across multiple vault markets. The markets that have already been removed involve approximately $11.9 million in liquidity, and a claims contract will be set up for liquidity providers going forward.

GateNews58m ago

An American man was indicted for attacking Uranium Finance, with $54 million at stake and a maximum of 30 years in prison.

March 30, U.S. prosecutors charged Jonathan Spalletta of Maryland, accusing him of repeatedly attacking the decentralized exchange Uranium Finance since 2021, involving $54 million. Spalletta faces computer fraud and money laundering charges, with a maximum total sentence of up to 30 years in prison. He allegedly profited illegally by manipulating transaction processes and used the proceeds to buy collectible items. Prosecutors emphasized that crypto assets are also protected by law.

GateNews4h ago

Malware Infiniti Stealer targets Mac users’ encrypted wallets by forging verification codes

GoPlus Security reports that a type of malware called Infiniti Stealer carries out attacks against Mac users by impersonating a Cloudflare verification page, stealing crypto wallets and credentials. The malware bypasses security mechanisms by manually executing commands; it can steal browser data and developer keys and has the ability to evade detection.

GateNews15h ago

Pi Network Scam Alert as Fake 2FA Links Target Users

A wave of scams is targeting Pi Network users during the Second Migration phase, with fake 2FA links tricking individuals into sharing wallet passphrases. Scammers exploit user urgency, leading to unauthorized wallet access. Users must prioritize security and only interact through official channels to protect their funds.

Coinfomania18h ago

Michael Saylor once again compared STRC to money market funds, sparking a retail frenzy.

Strategy company founder Michael Saylor compared his stock STRC to a money market fund on CNBC, drawing attention. STRC has a dividend of up to 11.5%, but it is not a true money market fund and carries high risks. Despite the SEC stating that its risks are significant, Saylor still attracts a large number of retail investors, and analysts remind that caution is needed to distinguish between them.

GateNews18h ago
Comment
0/400
No comments