CrossCurve Reports Cross-Chain Bridge Exploit via Smart Contract Vulnerability

CrossCurve Reports Cross-Chain Bridge Exploit via Smart Contract Vulnerability

CrossCurve confirmed a February 2 exploit draining $3 million across multiple networks, warning users to halt interactions amid ongoing asset recovery efforts.

Fact Check
The statement is strongly supported by multiple credible and relevant primary sources. The core event, an exploit of the CrossCurve bridge, is confirmed by high-authority sources like The Block and CoinTelegraph. Both of these sources also confirm that CrossCurve itself reported the incident, satisfying that part of the claim.The specific cause, a 'smart contract vulnerability', is also well-supported. The Bitget news report explicitly states the attack exploited a 'smart contract vulnerability'. CoinTelegraph, another high-authority source, links the event to 'smart contract hacks'. Furthermore, the description from The Block, which specifies the attack vector as 'spoofed messages', is entirely consistent with a smart contract vulnerability, as such a flaw would allow the contract to incorrectly process fraudulent messages. There is no conflicting evidence among the relevant sources; they corroborate each other on all key points of the statement.
    Reference12
Summary

On February 2, CrossCurve disclosed via X a smart contract exploit that drained roughly $3 million across multiple blockchain networks. The cross-chain liquidity protocol urged all users to immediately pause interactions with affected contracts. The attack bypassed gateway verification, allowing unauthorized unlocking of assets. CrossCurve has identified ten blockchain addresses holding the stolen funds and is invoking its SafeHarbor bounty program, offering 10% for voluntary returns within 72 hours. Failure to comply will lead to civil and criminal actions.

Terms & Concepts
  • Cross-chain bridge: A blockchain tool that enables asset transfers between different blockchain networks.
  • Smart contract: Self-executing blockchain code that enforces agreement terms without intermediaries.
  • Safe Harbor policy: A protocol rule offering legal leniency or incentives, such as bounties, for returning misappropriated assets within a specified timeframe.