Cross-chain protocol CrossCurve suffers $3 million hack! CEO issues 72-hour ultimatum to return the funds.

This article is machine translated
Show original

Cross- chain bridge protocols have once again become a cash cow for hackers. CrossCurve issued an urgent announcement on its X platform Sunday evening, confirming that its smart contracts had been attacked and approximately $3 million had been stolen across multiple blockchain networks. The protocol has requested all users to immediately suspend all interactions with CrossCurve and is conducting a full investigation.

Attack method: Forging cross-chain messages to bypass gateway verification

According to an analysis by Defimon Alerts, a blockchain security firm under Decurity, the core technique of this attack was to exploit a vulnerability in the CrossCurve ReceiverAxelar contract. The attackers bypassed the Axelar gateway's verification mechanism by forging cross-chain messages to call the expressExecute function, directly triggering the unlock operation on the PortalV2 contract.

In short, attackers don't need to actually complete the cross-chain transfer; they can simply use a forged message to mislead the contract into believing it has received a legitimate cross-chain request, thereby releasing locked funds. This is a typical security flaw in the message verification stage of a cross-chain bridge architecture—once the gate verification is bypassed, the entire fund security system becomes virtually non-existent.

The CEO issued a 72-hour ultimatum.

CrossCurve CEO Boris Povar responded quickly after the incident, publishing the names of 10 wallet addresses that received the stolen tokens and sending a clear message to the attackers: if the funds are returned within 72 hours, 10% will be retained as a bug bounty.

Povar means:

"These tokens were illegally taken from users due to a smart contract vulnerability."

He also warned that if the funds are not returned within the specified period, CrossCurve will treat the matter as a legal case, initiating legal proceedings, freezing assets, and fully cooperating with law enforcement agencies to investigate.

Curve Finance issued a warning advising users to withdraw their votes.

Curve Finance, as a partner, also immediately warned users, suggesting they review and consider withdrawing their votes for CrossCurve's liquidity pools. This means the impact of this event may not be limited to CrossCurve itself; the entire DeFi ecosystem integrated with it needs to reassess its risk exposure.

Cross-chain bridge security: DeFi's Achilles' heel

Cross-chain bridges have consistently been among the most vulnerable infrastructures in the DeFi space. From the $320 million theft from Wormhole in 2022 and the $625 million hack of Ronin Bridge to the recent CrossCurve incident, the security issues of cross-chain bridges have remained unresolved.

The core reason is that cross-chain bridges must transmit and verify messages between different blockchains, a process with a much larger attack surface than single-chain applications. This CrossCurve incident serves as a reminder to users: before using cross-chain services, always verify the protocol's security audit records and avoid storing large sums of money in cross-chain bridge contracts for extended periods.

Source
Disclaimer: The content above is only the author's opinion which does not represent any position of Followin, and is not intended as, and shall not be understood or construed as, investment advice from Followin.
Like
Add to Favorites
Comments