Cross-chain protocol CrossCurve (formerly EYWA) lost approximately $3 million between January 31 and February 1, 2026, after an attacker exploited a validation flaw in its ReceiverAxelar smart contract. The vulnerability allowed anyone to spoof cross-chain messages and trigger unauthorized withdrawals from the protocol’s liquidity pools.

Incident overview

AttributeDetails
ProtocolCrossCurve (formerly EYWA)
Attack typeMessage validation bypass
Total losses~$2.76-3 million
Attack datesJanuary 31 - February 1, 2026
Vulnerable contractReceiverAxelar
Bridge statusPaused
Notable backerCurve Finance founder Michael Egorov
Previous fundraising$7 million from VCs

The vulnerability

The ReceiverAxelar contract was designed to receive and process cross-chain messages routed through the Axelar network.

Root cause

IssueDescription
Missing validationContract didn’t verify messages originated from Axelar gateway
Trusted functionexpressExecute could be called directly with fabricated data
Format vs. originContract checked message format but not message source
Downstream trustPortalV2 trusted ReceiverAxelar’s forwarded messages

“CrossCurve’s custom ReceiverAxelar contract executed cross-chain messages without sufficiently authenticating them first.” — Blockchain security researcher Dadybayo

Gateway validation bypass

Blockchain security account Defimon Alerts identified the specific attack vector:

ComponentFlaw
expressExecute functionCould be called directly by anyone
Message spoofingFabricated cross-chain messages accepted
Gateway checkMissing verification of Axelar gateway origin
Token unlocksTriggered without legitimate cross-chain request

Attack execution

PhaseAction
1Attacker calls expressExecute with fabricated payload
2Payload mimics legitimate cross-chain transfer request
3ReceiverAxelar trusts the message and forwards to PortalV2
4PortalV2 releases tokens to attacker-controlled addresses
5Attacker moves funds through DEXs and mixers

Arkham Intelligence data shows the PortalV2 contract balance collapsed from roughly $3 million to nearly zero on January 31.

Losses by chain

BlockSec estimated total losses at approximately $2.76 million:

ChainEstimated Loss
Ethereum~$1.30 million
Arbitrum~$1.28 million
OptimismPartial losses
BasePartial losses
MantlePartial losses
KavaPartial losses
FraxPartial losses
CeloPartial losses
BlastPartial losses

EYWA token extraction

AttributeDetails
Tokens extracted999,787,453.03 EYWA
NetworkEthereum
StatusEffectively trapped
ReasonCirculating supply migrated to Arbitrum

The team clarified that the extracted EYWA tokens cannot be sold or circulated because the entire circulating supply was migrated to Arbitrum during the token generation event.

CrossCurve’s response

Immediate actions

ActionDetails
Bridge pausedOperations halted immediately
Wallet identification10 Ethereum addresses identified
InvestigationWorking with blockchain analytics firms
Fund freezingCoordinating with exchanges to block assets

CEO statement

CrossCurve CEO Boris Povar announced: “These tokens were wrongfully taken from users due to a smart contract exploit. If the funds are not returned or no contact is established within 72 hours, we will have to assume malicious intent and treat this as a judicial matter.”

White-hat bounty offer

TermDetails
Bounty offered10% of remaining funds
PolicySafeHarbor WhiteHat policy invoked
Deadline72 hours from block 24364392
WarningLegal action if no contact established

Ecosystem warnings

Curve Finance issued a warning to its community: “Users who have allocated votes to Eywa-related pools may wish to review their positions and consider removing those votes.”

Protocol background

AttributeDetails
Previous nameEYWA
Notable investorMichael Egorov (Curve Finance founder)
Investment dateSeptember 2023
VC funding$7 million raised
PurposeCross-chain bridge infrastructure

Historical context

Nomad bridge comparison

Security expert Taylor Monahan drew direct comparisons to the Nomad bridge hack:

IncidentDateLossesRoot cause
Nomad bridgeAugust 2022$190 millionMessage validation failure
CrossCurveFebruary 2026$3 millionMessage validation failure

“I cannot believe nothing has changed in four years.” — Taylor Monahan, analyzing the exploit’s similarities

Bridge exploit statistics

PeriodLosses
2023-2025$2.5+ billion in bridge exploits
January 2026$370.3 million stolen (CertiK data)
January 2025~$95 million
IncreaseNearly 4x year-over-year

January 2026 was the highest monthly figure for crypto exploits in 11 months.

Common bridge vulnerability patterns

PatternDescription
Insufficient message validationThis attack
Signature verification flawsCryptographic bypass
Replay attacks across chainsReusing valid messages
Oracle manipulationPrice feed attacks
Admin key compromisePrivate key theft

Lessons for bridge developers

Architecture requirements

RequirementImplementation
Message authenticationVerify origin, not just format
Gateway validationConfirm messages come through legitimate infrastructure
Defense-in-depthMultiple validation layers
Rate limitingCap withdrawal volumes per time window
Caller verificationCheck msg.sender against trusted gateways

Operational controls

ControlBenefit
Multi-sig on large transfersHuman approval for significant movements
TimelocksWindow to detect and halt exploits
Circuit breakersAutomatic pause on anomalous activity
Security monitoringReal-time alerting on unusual patterns

Audit focus areas

AreaSpecific tests
Message handlersCan they be called directly with spoofed data?
Trust boundariesWhere does the contract trust external input?
Gateway integrationIs the connection to the cross-chain network secure?
Authorization checksWho can trigger fund movements?
Caller validationDoes the contract verify msg.sender?

Technical recommendations

For bridge protocols

PriorityAction
CriticalValidate message origin, not just format
CriticalImplement caller verification on sensitive functions
CriticalImplement rate limiting on withdrawals
HighAdd multi-sig or timelocks for large transfers
HighConduct specialized bridge security audits
OngoingMonitor for exploitation patterns

For DeFi users

PriorityAction
HighLimit exposure to any single bridge
HighMonitor bridge security disclosures
MediumConsider bridge insurance where available
OngoingDiversify cross-chain strategies
MediumCheck protocol audit history before use

Investigation status

ItemStatus
Attacker identification10 wallets identified
Fund tracingOngoing with analytics firms
Exchange coordinationAssets frozen where possible
Bridge operationsPaused
Bounty deadline72 hours from block 24364392

White-hat bounty offers occasionally work in DeFi—the Euler Finance attacker returned $197 million in 2023—but more often the funds disappear into mixers.

Context

The CrossCurve exploit reinforces that cross-chain bridge security remains one of the most challenging problems in DeFi. Bridges are attractive targets because they hold large amounts of liquidity, and their security depends on correctly validating messages across different blockchain environments—a complex problem that’s easy to get wrong.

Risk factorCrossCurve situation
High TVL concentration~$3 million in single contract
Complex validation requirementsCross-chain message authentication
Multiple attack surfacesNine+ chains supported
Audit coverageUnknown for specific vulnerability

The fact that this exploit mirrors the Nomad bridge hack from four years earlier suggests the DeFi ecosystem has not adequately incorporated lessons from past incidents. Until bridge protocols implement rigorous message authentication and defense-in-depth controls, these attacks will continue.

The involvement of prominent backers like Curve Finance founder Michael Egorov doesn’t guarantee security—technical due diligence on smart contract implementations remains essential regardless of investor reputation.