Skip to content

CrossCurve Exploit: $3 Million Hack Traced Back to 10 Wallets

Digital wallets with warning symbol. CrossCurve Exploit: Team Traces $3 Million Hack to 10 Wallets

Cross-chain related ecosystems have recently suffered a large hack. Approximately USD 3 million has been stolen in a CrossCurve exploit using a major flaw in the bridge protocol’s smart contract code. The CrossCurve team has already responded to the incident by fixing the vulnerabilities involved, restricting the hackers from any access, and publicly identifying 10 Ethereum wallets linked to the hackers.

How the CrossCurve Exploit Unfolded

The CrossCurve exploit targeted a base flaw or missing security protocol in the bridge’s message validation system. The findings of the security code audit reveal that hackers were able to “fake” cross-chain messages and trick the protocol’s ReceiverAxellar contract into releasing funds from the bridge, without the required authentication (i.e., no collateral was left in the bridge). The hackers then drained the assets out of the bridge across multiple chains, including Ethereum and Arbitrum, at different times.

CrossCurve Exploit: Team Traces $3 Million Hack to 10 Wallets: The cross-chain bridge protocol offers a 10% bounty for the return of funds within 72 hours.
CrossCurve Exploit: Team Traces $3 Million Hack to 10 Wallets: Authorization bypass in the ReceiverAxelar contract (Source: EtherScan)

The vulnerability of the code exploits and the sophistication of the hackers are very similar to other attacks from the previous Bridge hacks. The complexity of securing messages across chains continues to be a difficult and persistent challenge. Sadly, this is just one more web3 incident, and it’s just starting the second month of 2026.

The Race to Recover Funds and Restore Trust

Boris Povar, CEO of CrossCurve, made a personal appeal for assistance from the wallets that received the funds. He requested that funds be returned within 72-hours at 10% of the value of the funds drained as a reward. The message indicates that no malicious intent was evident by the recipients of the funds; thus, suggesting they may be incidental “white hats” or users who copied a public transaction. Failure to comply with this request, the project intends to escalate the situation with law enforcement and provide evidence to exchanges to assist in freezing the assets.

In addition to taking these steps against the exploiter/ers, the CrossCurve team has actively worked with centralized exchanges (CEX) to freeze the stolen EYWA tokens and minimize the hackers’ ability to liquidate the tokens.

Disclaimer: All content provided on Times Crypto is for informational purposes only and does not constitute financial or trading advice. Trading and investing involve risk and may result in financial loss. We strongly recommend consulting a licensed financial advisor before making any investment decisions.

A Web3 Journalist at TimesCrypto with a knack for turning complex ideas into engaging stories. With a solid Tech background, Alan has led teams to create and refine impactful projects across industries, working in firms such as IBM, Cisco Systems, and Telecom. He’s passionate about Blockchain, Finance, Science, bringing a unique blend of technical expertise and creative flair to every piece he writes. When he’s not crafting content, you’ll find him diving deep into research or just having some fun!

Zoomable Image