CrossCurve Hit by $3 Million Attack, Users Urged to Pause Transactions
By John Nada·Feb 1, 2026·2 min read
CrossCurve has reported a $3 million breach of its protocol, urging users to pause transactions while an investigation is underway.
Crypto bridge CrossCurve has issued a warning to its users to halt all interactions following a significant breach of its smart contracts. Reports indicate that approximately $3 million has been stolen across multiple networks due to a vulnerability exploited within the protocol. CrossCurve announced on X that its bridge was 'under attack,' highlighting the need for immediate user caution while it investigates the incident.
According to blockchain security-focused account Defimon Alerts, the exploit allowed individuals to spoof a message, effectively bypassing essential validation checks and unlocking tokens. The specifics revealed that anyone could invoke the expressExecute function on the ReceiverAxelar contract with a spoofed message, circumventing gateway validations and triggering unlocks on PortalV2.
In light of this incident, Curve Finance, which has partnered with CrossCurve, advised users involved with CrossCurve pools to review their positions and consider withdrawing their votes. This scenario underscores the necessity for users to remain vigilant and make informed decisions when engaging with third-party projects.
As this story develops, further information will be provided. The implications of such breaches extend beyond immediate financial losses, raising questions about the security measures in place within the decentralized finance (DeFi) ecosystem.
The urgency of CrossCurve's warning serves as a stark reminder of the inherent risks in the crypto space. Users must prioritize security and due diligence, especially as vulnerabilities can be exploited with alarming ease. This incident not only impacts the affected users but also reverberates through the broader crypto community, highlighting the ongoing battle against security threats in DeFi.
In this rapidly evolving landscape, the necessity for robust security protocols cannot be overstated. Stakeholders must adapt and reinforce their defenses to safeguard against future attacks, ensuring trust and stability within the ecosystem.
