Crossover: The security breach in the crypto protocol CrossCurve stole an estimated $3 million in cross-chain bridge funds
ContentsBridge exploit causes emergency responseSmart contract flaw exposes message validation risksThe CEO puts out a bounty to get the stolen goods backThe project proved the incident and advised users to stop using it as investigations progress.
Bridge exploit causes emergency response
Certain software protocol Crypto CrossCurve posted the attack on late Sunday in a publicly posted update to X
The group claimed that its bridge was being actively exploited because of a smart contract vulnerability. It was recommended that users lock out all interactions for further notice.
The hack affected several blockchain networks that were associated with the bridge
It pointed to chronic risks associated with cross-chain systems
These systems have been attacked several times in the crypto field.
Technical information was soon being provided by security researchers
Defimon Alerts, which was owned by the blockchain security company Decurity, indicated that attackers had exploited faulty message verification
The bug enabled spoofer cross-chain messages to be considered authentic.
The report reported that a contract was not used to verify the authenticity of the messages
The attackers were allowed to invoke a receiver contract function called expressExecute
This bypassed gateway verifications and deactivated tokens without authorization.
Bankruptcy was disbursed, but there was no exchange of money on the source chain
The loophole allowed unauthorized printing or decryption of assets. It was estimated that the losses amounted to around $3 million.
The incident focused on lax validation code within the bridge contracts
Any party may create a forged message, which seems to be legitimate
The message was believed, and money was given out by the receiving contract.
These are typical of cross-chain exploits. Bridges are dependent on the transmission of messages across networks
In case of failure of checks, attackers can empty resources within a short period.
CrossCurve indicated that it was examining all the affected contracts
The team has not verified the extent to which the users have been affected. At this point, there is uncertainty regarding compensation.
The protocol also cautioned users who are affiliated with governance activity. Curve recommended reassessment of positions to those who delegated the voting power to CrossCurve pools. The people were encouraged to be careful when utilizing third parties.
The CEO puts out a bounty to get the stolen goods back
CrossCurve CEO Boris Povar made calls to wallets tied to the exploit in a recovery effort.
He issued ten addresses, which were thought to contain stolen tokens. He demanded voluntary returns.
According to Povar, the money was stolen in a contract exploit. He said that there was no evidence of a wicked intention. Returns within seventy-two hours were bountied up to ten percent.
He threatened to intensify the issue in case of non-cooperation. CrossCurve would entail law enforcement and take civil action. The team also said that it can collaborate with partners to freeze assets.
These bounty rewards have become the norm following DeFi exploits. Other assailants give money back as a bribe
Others retain assets even when they are pressured to do so by people.
Cross-chain bridge attacks are still stealing billions of dollars in the industry. The previous experiences are Ronin, Wormhole, and Nomad setbacks
The issues of message verification are still a significant threat. The breach of CrossCurve supports the need to have more rigorous audits and to simplify the design of bridges.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Crypto protocol suffers $3M across the cross-chain bridge
Crossover: The security breach in the crypto protocol CrossCurve stole an estimated $3 million in cross-chain bridge funds
ContentsBridge exploit causes emergency responseSmart contract flaw exposes message validation risksThe CEO puts out a bounty to get the stolen goods backThe project proved the incident and advised users to stop using it as investigations progress.
Bridge exploit causes emergency response
Certain software protocol Crypto CrossCurve posted the attack on late Sunday in a publicly posted update to X
The group claimed that its bridge was being actively exploited because of a smart contract vulnerability. It was recommended that users lock out all interactions for further notice.
The hack affected several blockchain networks that were associated with the bridge
It pointed to chronic risks associated with cross-chain systems
These systems have been attacked several times in the crypto field.
Technical information was soon being provided by security researchers
Defimon Alerts, which was owned by the blockchain security company Decurity, indicated that attackers had exploited faulty message verification
The bug enabled spoofer cross-chain messages to be considered authentic.
The report reported that a contract was not used to verify the authenticity of the messages
The attackers were allowed to invoke a receiver contract function called expressExecute
This bypassed gateway verifications and deactivated tokens without authorization.
Bankruptcy was disbursed, but there was no exchange of money on the source chain
The loophole allowed unauthorized printing or decryption of assets. It was estimated that the losses amounted to around $3 million.
Smart contract flaw exposes message validation risks
The incident focused on lax validation code within the bridge contracts
Any party may create a forged message, which seems to be legitimate
The message was believed, and money was given out by the receiving contract.
These are typical of cross-chain exploits. Bridges are dependent on the transmission of messages across networks
In case of failure of checks, attackers can empty resources within a short period.
CrossCurve indicated that it was examining all the affected contracts
The team has not verified the extent to which the users have been affected. At this point, there is uncertainty regarding compensation.
The protocol also cautioned users who are affiliated with governance activity. Curve recommended reassessment of positions to those who delegated the voting power to CrossCurve pools. The people were encouraged to be careful when utilizing third parties.
The CEO puts out a bounty to get the stolen goods back
CrossCurve CEO Boris Povar made calls to wallets tied to the exploit in a recovery effort.
He issued ten addresses, which were thought to contain stolen tokens. He demanded voluntary returns.
According to Povar, the money was stolen in a contract exploit. He said that there was no evidence of a wicked intention. Returns within seventy-two hours were bountied up to ten percent.
He threatened to intensify the issue in case of non-cooperation. CrossCurve would entail law enforcement and take civil action. The team also said that it can collaborate with partners to freeze assets.
These bounty rewards have become the norm following DeFi exploits. Other assailants give money back as a bribe
Others retain assets even when they are pressured to do so by people.
Cross-chain bridge attacks are still stealing billions of dollars in the industry. The previous experiences are Ronin, Wormhole, and Nomad setbacks
The issues of message verification are still a significant threat. The breach of CrossCurve supports the need to have more rigorous audits and to simplify the design of bridges.