Late on August 17, the Celer Network Layer 2 Scalability Platform (CELR) received reports that reflect potential DNS hijacking of cbridge frontend.
Currently Celer is under investigation, the platform has issued a warning to users these contracts are related to a potential UI hack to redirect users to interact with the above addresses and consume the token balance.
According to initial investigation, hackers can start around Aug-17-2022 07:00:00 PM +UTC. Celer Network urges users not to use cBridge for cross-chain assets for the time being. cBridge’s user interface is offline and the situation involved is currently under investigation.
The Celer cBridge is a decentralized and non-custodial asset bridge, which allows users to transfer a variety of tokens across different blockchains in a fast, secure and low-cost fashion. It currently supports 100+ tokens across 30+ blockchains and layer-2 rollups. Built on top of the Celer Inter-chain Message Framework, cBridge has processed over $6B cross-chain asset transfer volume on 30+ blockchains for more than 140K unique users, and is quickly growing and expanding into more blockchains and layer-2s.
DISCLAIMER: The Information on this website is provided as general market commentary and does not constitute investment advice. We encourage you to do your own research before investing.
Join CoinCu Telegram to keep track of news: https://t.me/coincunews
Follow CoinCu Youtube Channel | Follow CoinCu Facebook page
Foxy
CoinCu News
Swift, UBS Asset Management, and Chainlink have completed a proof-of-concept that would settle tokenized fund…
Abu Dhabi, United Arab Emirates, 5th November 2024, Chainwire
According to data from SolanaFloor, Jito and Solana's 24-hour protocol fee income has surpassed Ethereum's…
As the crypto market is about to witness the next big Bitcoin surge, Rexas Finance,…
In the third quarter of 2024, despite a challenging market environment, Gate.io maintained strong growth…
MEXC is proud to partner with the inaugural Crypto Content Creator Campus CCCC event, taking…
This website uses cookies.