CrossCurve Protocol Exploited for $3M via Forged Cross-Chain Messages
CrossCurve Protocol (formerly EYWA) suffered a $3 million exploit due to a critical vulnerability in its cross-chain messaging validation. The attack drained funds from its PortalV2 contract across multiple blockchain networks.
The exploit Leveraged a flaw in the ReceiverAxelar contract, allowing attackers to bypass gateway validation by forging cross-chain messages. This mirrors previous bridge attacks like the 2022 Nomad hack, underscoring persistent vulnerabilities in cross-chain infrastructure.
CrossCurve has initiated damage control measures, including tracing funds to 10 addresses and offering bounties for recovery assistance. The incident highlights ongoing security challenges as protocols scale interoperability solutions.