Zerion Goes Dark Online – Here’s What Users Need to Know Now

DRIFT12,52%
DEFI8,26%

Zerion detected abnormal activity on app.zerion.io and pulled the web app offline. Blockaid has blocked the site. iOS, Android, and browser extensions remain fully safe.

Zerion flagged something unusual on its web app on April 11. The team moved fast. Within hours, app.zerion.io was offline.

The Web3 wallet platform confirmed the incident directly on X, urging users to stop using the web interface until further notice. “We’re investigating some abnormal activity on app.zerion.io,” Zerion wrote on X, adding that user funds remain safe inside self-custodial wallets. The team asked everyone to rely only on official communication from the account.

No details on the nature of the activity came immediately. The team did not confirm whether an exploit was involved or what triggered the alert.

Blockaid Steps In, Mobile Apps Stay Untouched

A second update followed. Zerion said it had proactively taken the web app down and that security firm @blockaid_ had also blocked the site as a precautionary step. “The iOS and Android Apps, Web Extension are SAFE and are not affected,” Zerion confirmed on X. The team said it is actively monitoring the situation.

The response puts Zerion among platforms that are choosing transparency and speed over waiting. This comes as crypto hacks dropped to $168 million in Q1 2026, down sharply from the year prior, though security incidents continue targeting web-based interfaces in particular.

Self-custodial architecture is the reason user funds are protected here. Because Zerion operates as a non-custodial wallet, the platform holds no private keys. Funds sit with the user. The web app going offline does not change that.

What Users Should Do Right Now

The advice from Zerion is clear. Avoid the web app entirely. Use the iOS app, the Android app, or the browser extension only. Do not interact with any links claiming to be app.zerion.io until the team confirms the platform is restored.

This pattern of a compromised frontend while underlying funds remain intact is not new. Just days ago, a fake trading firm compromised Drift Protocol through a sophisticated social engineering attack targeting the web interface and developer access. The nature of these incidents shows how web app layers often carry the most exposure in DeFi infrastructure.

Zerion said another update will come once the web app is restored. No timeline was given.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Instagram crypto-romance scam: “investment experts” defrauded a woman in her fifty-something from NT$2 million (200萬)

Hong Kong police have recently disclosed an online dating scam in which the losses exceeded HK$2 million. The fraudster initiated contact on Instagram, built trust, and then lured the victim in the name of “cryptocurrency investment,” prompting them to exchange in seven installments for USDT and transfer the funds. Police reminded residents to recognize the hallmarks of scams and advised using anti-fraud tools, urging vigilance when engaging in online dating that involves any fund transfers.

MarketWhisper3h ago

Justin Sun Criticizes WLFI Token Over Transparency Concerns

Justin Sun has exposed that the World Liberty Finance project has backdoor functions in its smart contracts, allowing asset confiscation without notice. This violates decentralization principles, harming investor rights and undermining trust in the blockchain community.

BlockChainReporter3h ago

Ethereum Hyperbridge HandlerV1 contract was subjected to an MMR proof replay attack, resulting in a loss of approximately $242k

Hyperbridge HandlerV1 contract on Ethereum was hit by an MMR proof replay attack, resulting in a loss of about $242k. The attacker used the vulnerability to replay historical proofs to carry out privileged operations, and replay protection failed to effectively bind the request payload.

GateNews3h ago

Hyperbridge cross-chain bridge was attacked; the attacker minted 1 billion DOT tokens and dumped them.

Hyperbridge's cross-chain gateway contract was recently attacked. The attacker forged messages to tamper with the contract administrators' permissions, illegally minted 1 billion bridged DOT, and sold it all off—but due to insufficient liquidity, they ultimately made only about $237k in profit. This incident did not affect the security of Polkadot's native chain.

MarketWhisper3h ago

A woman in Hong Kong was targeted by a crypto “pig butchering” scam and lost more than HK$2 million

Hong Kong police announced that a woman in her 50s was the victim of a cryptocurrency scam, suffering losses of more than HK$2 million. The scammer built a relationship with her through Instagram, lured her into investing, and asked for multiple transfers before ultimately disappearing.

GateNews4h ago

Polkadot bridge vulnerability exploited: 1 billion DOT minted on the Ethereum network and sold off

Gate News message, April 13, market reports show that a Polkadot bridge vulnerability was exploited, and the attacker minted 1 billion DOT on the Ethereum network and has already sold it off.

GateNews4h ago
Comment
0/400
No comments