Behind the convenience of cross-chain finance, security vulnerabilities lurk like ticking time bombs, repeatedly detonating in similar ways and forcing the entire industry into self-reflection.
On February 2, 2026 (UTC), CrossCurve—the cross-chain liquidity protocol formerly known as EYWA and backed by Curve Finance founder Michael Egorov—officially confirmed that its cross-chain bridge was under attack due to a smart contract vulnerability. Attackers forged cross-chain messages, bypassed critical gateway validation, and triggered unauthorized token unlocks, resulting in approximately $3 million stolen across multiple blockchains.
Incident Overview: Why Did the Multi-Layer Validation Architecture Fail?
Around January 31, 2026, blockchain security firm Defimon Alerts detected a sharp drop in CrossCurve’s core contract PortalV2 balance—from roughly $3 million to nearly zero. CrossCurve quickly issued an emergency announcement on X: "Our bridge network is currently under attack. The attacker exploited a vulnerability in one of our smart contracts. Please suspend all interactions with CrossCurve while the investigation is ongoing."
Ironically, CrossCurve had long touted its "Consensus Bridge" multi-layer validation security architecture as a key selling point. This architecture integrates Axelar, LayerZero, and its proprietary EYWA oracle network, aiming to eliminate single points of failure by relying on multiple independent validation sources. The project previously claimed, "The probability of multiple cross-chain protocols being hacked simultaneously is virtually zero."
Vulnerability Analysis: A Fatal Validation Gap
Security analysis revealed the technical essence of the attack. The root of the vulnerability lay in a seemingly simple missing validation—enough to compromise the entire complex multi-layer verification system.
Attack Vector
The core of the attack occurred within CrossCurve’s ReceiverAxelar contract. This contract is responsible for receiving messages from the Axelar cross-chain network and executing corresponding instructions.
Under normal circumstances, any cross-chain message to be executed must pass Axelar network consensus validation. However, a critical flaw existed in one of the contract’s functions. Attackers discovered they could directly call this function, passing in forged cross-chain message parameters, and the contract did not adequately verify the true origin of the messages.
Attack Process
Once the forged instruction was accepted, the contract sent a token unlock command to the asset-custody core contract PortalV2.
Because the PortalV2 contract fully trusted instructions from ReceiverAxelar, it dutifully released all types of locked assets to addresses specified by the attacker. This process could be repeated until the contract’s main assets were completely drained.
History Repeats: Four Years of Unhealed Security Wounds
This incident triggered a strong sense of déjà vu within the crypto security community. Security expert Taylor Monahan expressed her shock: "I simply can’t believe that four years have passed and nothing has changed." She was referring to the August 2022 Nomad cross-chain bridge attack, which stunned the industry. At that time, Nomad lost about $190 million due to a similar initialization validation flaw. Even more astonishing, the exploit was so simple that, after the incident began, it turned into a "money grab frenzy," with over 300 addresses copying the attack method to steal funds.
From Nomad to CrossCurve, the attack methods are fundamentally similar: both stem from insufficient validation of the most basic security element—the source of cross-chain messages. The recurrence of such incidents sharply highlights that, despite rapid industry growth, some fundamental smart contract security development practices and audit standards remain inadequately enforced.
Market Ripple Effects: Confidence Crisis and Price Volatility
The security breach quickly triggered a chain reaction in the market. CrossCurve, the protocol under attack, is closely linked to top DeFi protocol Curve Finance; investment from Curve’s founder was a major credibility boost for CrossCurve.
After the incident, Curve Finance promptly issued a statement on X, advising users to "reassess your positions and consider revoking these votes," and emphasized caution when interacting with "third-party projects." This carefully worded statement was widely interpreted as a swift move to distance itself and protect its own reputation from collateral damage.
Mainstream Market Response
According to Gate market data, as of February 2, 2026, Bitcoin (BTC) price changed -2.51% in the past 24 hours, trading at $76,814.
During the same period, Ethereum (ETH) price fell -7.42%, to $2,271.18. While market volatility is driven by multiple factors, a major security breach in a core DeFi protocol undoubtedly heightened risk aversion across the market.
Industry Reflection: The Cross-Chain Bridge Security Paradox
The CrossCurve incident once again brought the industry consensus—"cross-chain bridges are the weakest link in crypto"—to the forefront. Previous cases like Ronin ($625 million lost), Wormhole ($325 million lost), and now CrossCurve all reinforce this view.
The security paradox of cross-chain bridges lies in their need to enable free asset movement between different blockchains, requiring trust and validation hubs across multiple independent chains with varied security models. If this hub (the smart contract) contains a logic flaw, it becomes a single point of failure for the entire liquidity pool. Even with multi-layer external validation like CrossCurve’s design, implementation flaws in the contract itself can render all external protections useless.
Latest Developments and User Response
Facing ongoing fund outflows and mounting public pressure, the CrossCurve team initiated crisis management measures after the breach became public. According to their latest official statement, the team set a 72-hour deadline for the return of stolen funds. They called on holders of affected addresses to cooperate in returning misappropriated assets and, under their "Safe Harbor Disclosure Policy," offered up to 10% of the funds as a reward for white-hat hackers.
If a settlement is not reached within the specified time, the team stated it would escalate its response, including pursuing legal action and working with exchanges, stablecoin issuers, and others to track and freeze related assets.
Bitcoin price fell 2.51% in the 24 hours following the incident, while Ethereum dropped even further, by 7.42%. The market responded to this trust collapse triggered by a code flaw with cold, hard numbers.
The 72-hour "safe harbor" countdown set by the CrossCurve team is ticking away. Blockchain explorer records show that the stolen funds remain dormant in the attacker’s address, with no large-scale transfers yet. Whether this storm—sparked by a single missing line of validation code—will end in a white-hat settlement or evolve into another protracted cross-border asset recovery battle remains to be seen.


