Zerion detected abnormal activity on app.zerion.io and pulled the web app offline. Blockaid has blocked the site. iOS, Android, and browser extensions remain fully safe.
Zerion flagged something unusual on its web app on April 11. The team moved fast. Within hours, app.zerion.io was offline.
The Web3 wallet platform confirmed the incident directly on X, urging users to stop using the web interface until further notice. “We’re investigating some abnormal activity on app.zerion.io,” Zerion wrote on X, adding that user funds remain safe inside self-custodial wallets. The team asked everyone to rely only on official communication from the account.
No details on the nature of the activity came immediately. The team did not confirm whether an exploit was involved or what triggered the alert.
Blockaid Steps In, Mobile Apps Stay Untouched
A second update followed. Zerion said it had proactively taken the web app down and that security firm @blockaid_ had also blocked the site as a precautionary step. “The iOS and Android Apps, Web Extension are SAFE and are not affected,” Zerion confirmed on X. The team said it is actively monitoring the situation.
The response puts Zerion among platforms that are choosing transparency and speed over waiting. This comes as crypto hacks dropped to $168 million in Q1 2026, down sharply from the year prior, though security incidents continue targeting web-based interfaces in particular.
Self-custodial architecture is the reason user funds are protected here. Because Zerion operates as a non-custodial wallet, the platform holds no private keys. Funds sit with the user. The web app going offline does not change that.
What Users Should Do Right Now
The advice from Zerion is clear. Avoid the web app entirely. Use the iOS app, the Android app, or the browser extension only. Do not interact with any links claiming to be app.zerion.io until the team confirms the platform is restored.
This pattern of a compromised frontend while underlying funds remain intact is not new. Just days ago, a fake trading firm compromised Drift Protocol through a sophisticated social engineering attack targeting the web interface and developer access. The nature of these incidents shows how web app layers often carry the most exposure in DeFi infrastructure.
Zerion said another update will come once the web app is restored. No timeline was given.
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to
Disclaimer.
Related Articles
Scallop Discovers sSUI Reward Pool Vulnerability, Suffers 150K SUI Loss but Pledges Full Reimbursement
Gate News message, April 26 — Scallop, a lending protocol in the Sui ecosystem, announced the discovery of a vulnerability in an auxiliary contract associated with its sSUI reward pool, resulting in a loss of approximately 150,000 SUI. The affected contract has been frozen, and Scallop confirmed
GateNews1h ago
Litecoin Undergoes Deep Chain Reorganization After MWEB Privacy Layer Zero-Day Exploit
Gate News message, April 26 — Litecoin experienced a deep chain reorganization on Saturday (April 26) after attackers exploited a zero-day vulnerability in its MimbleWimble Extension Block (MWEB) privacy layer, according to the Litecoin Foundation. The reorg spanned blocks 3,095,930 to 3,095,943 and
GateNews2h ago
Litecoin Sees First Privacy Layer Hack: MWEB Zero-Day Vulnerability Triggered 13-Block Reorganization
According to The Block, the Litecoin Foundation confirmed that the MWEB privacy layer suffered a zero-day vulnerability. The attacker used older nodes to make forged MWEB transactions appear valid, causing a rollback of 13 blocks on the main chain (about 3 hours), and performing double-spends against cross-chain exchanges; NEAR Intents exposed about $600k, and the mining pool was also hit with a DoS. A patched version has been released—please upgrade immediately. Main-chain balances are not affected, but it highlights the trade-off between reducing observability and increasing detection difficulty for the privacy layer.
ChainNewsAbmedia4h ago
Aave, Kelp, LayerZero Seek $71M Frozen ETH Release from Arbitrum DAO
Aave Labs, Kelp DAO, LayerZero, EtherFi, and Compound filed a Constitutional AIP on the Arbitrum forum Saturday morning requesting the network's DAO release approximately $71 million in frozen ETH to support rsETH recovery efforts following last week's $292 million Kelp DAO exploit. The proposal
CryptoFrontier5h ago
Litecoin Suffers Deep Chain Reorganization After MWEB Zero-Day Exploit, Erasing Three Hours of History
Gate News message, April 26 — Litecoin experienced a deep chain reorganization (reorg) on Saturday after attackers exploited a zero-day vulnerability in its MimbleWimble Extension Block (MWEB) privacy layer, according to the Litecoin Foundation. The bug allowed mining nodes running older software to
GateNews11h ago
Apecoin Insider Turns $174K Into $2.45M in One Day With 14x Trade on Both Sides of 80% Surge
An anonymous wallet with no prior trading history turned $174,000 worth of ether into $2.45 million by trading Apecoin on both sides of an 80% price surge in a single day.
Key Takeaways:
Wallet 0x0b8a converted $174,000 in ETH into a leveraged Apecoin long, exiting near the top for a $1.79M
Coinpedia11h ago