• Trending
  • Comments
  • Latest
The Louvre needed police escorts to move crypto attendees: Decentralised money just decentralised the danger

The Louvre needed police escorts to move crypto attendees: Decentralised money just decentralised the danger

04/18/2026
AI People joins Dubai’s innovation one — Declares war on the forgetting of humanity

AI People joins Dubai’s Innovation One program: Declares war on the forgetting of humanity

07/22/2025 - Updated on 07/23/2025
XRP community

Ripple CEO reassures community after SWIFT selects rival blockchain for pilot

02/10/2026
Polygon Discord Channel Hacked, Throws Crypto Community in Turmoil

Polygon Discord Channel Hacked, Throws Crypto Community in Turmoil

2
Bitcoin reclaims $107,000 as Iran-Israel ceasefire cools market tensions

Bitcoin reclaims $107,000 as Iran-Israel ceasefire cools market tensions

2

Hello world!

1
Iran-linked crypto exchanges

US Treasury sanctions 35 entities and freezes $344 million in crypto linked to Iran’s shadow banking network

04/30/2026
Meta Hybrid AI Strategy

Meta pilots USDC payments for creators in Colombia and Philippines via Solana and Polygon

04/30/2026
the GatewayZEVM Contract Exploit

ZetaChain suspends mainnet after $300,000 exploit targets internal wallets through unprotected cross-chain contract

04/30/2026
  • Trending
  • Comments
  • Latest
The Louvre needed police escorts to move crypto attendees: Decentralised money just decentralised the danger

The Louvre needed police escorts to move crypto attendees: Decentralised money just decentralised the danger

04/18/2026
AI People joins Dubai’s innovation one — Declares war on the forgetting of humanity

AI People joins Dubai’s Innovation One program: Declares war on the forgetting of humanity

07/22/2025 - Updated on 07/23/2025
XRP community

Ripple CEO reassures community after SWIFT selects rival blockchain for pilot

02/10/2026
Polygon Discord Channel Hacked, Throws Crypto Community in Turmoil

Polygon Discord Channel Hacked, Throws Crypto Community in Turmoil

2
Bitcoin reclaims $107,000 as Iran-Israel ceasefire cools market tensions

Bitcoin reclaims $107,000 as Iran-Israel ceasefire cools market tensions

2

Hello world!

1
Iran-linked crypto exchanges

US Treasury sanctions 35 entities and freezes $344 million in crypto linked to Iran’s shadow banking network

04/30/2026
Meta Hybrid AI Strategy

Meta pilots USDC payments for creators in Colombia and Philippines via Solana and Polygon

04/30/2026
the GatewayZEVM Contract Exploit

ZetaChain suspends mainnet after $300,000 exploit targets internal wallets through unprotected cross-chain contract

04/30/2026
Thursday, April 30, 2026
  • Login
The Bit Gazette
  • Home
  • Crypto News
  • Expert Analysis
  • Finance
  • Tech
  • Sponsored
  • Press Release
  • Opinion
No Result
View All Result
The Bit Gazette
No Result
View All Result
Home Breaking News

ZetaChain suspends mainnet after $300,000 exploit targets internal wallets through unprotected cross-chain contract

The GatewayZEVM Contract Exploit has intensified scrutiny on cross-chain security as vulnerabilities in access control resurface at a fragile moment for DeFi infrastructure.

by Elizabeth Omotoke
2 hours ago
in Breaking News
Reading Time: 4 mins read
0
the GatewayZEVM Contract Exploit

the GatewayZEVM Contract Exploit

Share on FacebookShare on Twitter

ZetaChain suspended its mainnet and paused all cross-chain transactions after attackers exploited a vulnerability in its GatewayZEVM contract to drain approximately $300,000 from internal team wallets, blockchain security firm SlowMist confirmed, citing missing access controls and absent input validation as the root cause.

The GatewayZEVM Contract Exploit was first identified through a preliminary investigation conducted by blockchain security firm SlowMist. According to the firm, the vulnerability originated from a flawed call function embedded within the GatewayZEVM contract. This function lacked both access control mechanisms and input validation safeguards—two essential layers of defense in any production-grade smart contract.

Without these protections, the GatewayZEVM Contract Exploit enabled unauthorized external addresses to initiate malicious cross-chain calls. These calls could then be routed to arbitrary destinations, effectively bypassing expected trust boundaries within the protocol. Independent verification by Wu Blockchain corroborated SlowMist’s findings, reinforcing the severity of the GatewayZEVM Contract Exploit.

Zetachain confirmed that the GatewayZEVM Contract Exploit impacted its internal team wallets, with losses estimated at approximately $300,000. Crucially, the team stated that user funds were not directly compromised. As a precautionary measure, all cross-chain transactions were paused while the scope of the GatewayZEVM Contract Exploit continues to be assessed.

A full post-mortem detailing the GatewayZEVM Contract Exploit is expected once internal investigations are complete.

Root cause: missing access controls and validation failures

At the core of the GatewayZEVM Contract Exploit lies a familiar but costly oversight—insufficient access control. SlowMist’s analysis underscores that the vulnerable call function was effectively open to any external actor, with no permission checks in place to restrict execution.

This design flaw meant that the GatewayZEVM Contract Exploit could be triggered by virtually anyone, allowing attackers to inject arbitrary instructions disguised as legitimate cross-chain operations. The absence of input validation further amplified the risk, enabling malicious payloads to pass through unchecked.

“The lack of access control combined with missing validation creates a perfect storm,” a SlowMist researcher noted. “It’s exactly the kind of condition attackers look for when scanning deployed contracts.”

The GatewayZEVM Contract Exploit illustrates a broader industry issue. Security experts have repeatedly warned that poorly implemented access controls remain one of the most common vulnerabilities in decentralized applications. Despite years of awareness, incidents like the GatewayZEVM Contract Exploit continue to surface, suggesting gaps in development practices and audit rigor.

As of now, it remains unclear whether the GatewayZEVM contract underwent a comprehensive third-party audit prior to deployment—an omission that could raise further concerns about development oversight.

Timing worsens market fragility

The GatewayZEVM Contract Exploit comes at a particularly sensitive time for decentralized finance. Earlier this month, the KelpDAO exploit triggered widespread panic across DeFi markets, leading to a wave of liquidity withdrawals and what analysts described as the most severe liquidity crunch since 2024.

The ripple effects of that incident are still being felt, making the GatewayZEVM Contract Exploit especially damaging to market confidence. Cross-chain infrastructure—already viewed as a high-risk segment due to its complexity—is now under renewed scrutiny.

In response to the KelpDAO incident, the Arbitrum Security Council intervened decisively, freezing 30,766 ETH linked to the exploiter. While that action helped contain further damage, the GatewayZEVM Contract Exploit highlights that systemic vulnerabilities persist across multiple protocols.

“The industry is dealing with compounded risk,” said a DeFi analyst. “Events like the GatewayZEVM Contract Exploit reinforce the perception that cross-chain systems are still not battle-tested.”

Industry lessons and the road ahead

The GatewayZEVM Contract Exploit is likely to reignite conversations around secure smart contract development, particularly for protocols handling cross-chain interactions. Developers are being urged to implement strict permissioning frameworks and robust input validation layers as baseline requirements—not optional enhancements.

Security researchers argue that the GatewayZEVM Contract Exploit could have been prevented with relatively standard best practices. Multi-layered access control, combined with rigorous testing and formal audits, remains the industry’s most effective defense against such attacks.

Zetachain’s response—pausing operations and initiating a full investigation—aligns with established incident management protocols. However, the GatewayZEVM Contract Exploit raises deeper questions about pre-deployment security assurance and ongoing monitoring.

As the ecosystem matures, the expectation is that incidents like the GatewayZEVM Contract Exploit will become less frequent. Yet, the persistence of such vulnerabilities suggests that the gap between security theory and execution remains significant.

For now, the GatewayZEVM Contract Exploit serves as another stark reminder: in decentralized systems, even a single unchecked function can open the door to systemic risk.

Tags: 000 exploit300blockchain incidentcross-chain vulnerabilitycrypto SecurityDeFi riskdigital assetsinternal walletsmainnet suspensionprotocol securitysmart contract exploitZetaChain
Share196Tweet123
Elizabeth Omotoke

Elizabeth Omotoke

  • Trending
  • Comments
  • Latest
The Louvre needed police escorts to move crypto attendees: Decentralised money just decentralised the danger

The Louvre needed police escorts to move crypto attendees: Decentralised money just decentralised the danger

04/18/2026
AI People joins Dubai’s innovation one — Declares war on the forgetting of humanity

AI People joins Dubai’s Innovation One program: Declares war on the forgetting of humanity

07/22/2025 - Updated on 07/23/2025
XRP community

Ripple CEO reassures community after SWIFT selects rival blockchain for pilot

02/10/2026
Polygon Discord Channel Hacked, Throws Crypto Community in Turmoil

Polygon Discord Channel Hacked, Throws Crypto Community in Turmoil

2
Bitcoin reclaims $107,000 as Iran-Israel ceasefire cools market tensions

Bitcoin reclaims $107,000 as Iran-Israel ceasefire cools market tensions

2

Hello world!

1
Iran-linked crypto exchanges

US Treasury sanctions 35 entities and freezes $344 million in crypto linked to Iran’s shadow banking network

04/30/2026
Meta Hybrid AI Strategy

Meta pilots USDC payments for creators in Colombia and Philippines via Solana and Polygon

04/30/2026
the GatewayZEVM Contract Exploit

ZetaChain suspends mainnet after $300,000 exploit targets internal wallets through unprotected cross-chain contract

04/30/2026
The Bit Gazette

Copyright © 2025 - The Bit Gazette.

Navigate Site

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Follow Us

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Crypto News
  • Expert Analysis
  • Finance
  • Tech
  • Sponsored
  • Press Release
  • Opinion

Copyright © 2025 - The Bit Gazette.