Late on August 17, the Celer Network Layer 2 Scalability Platform (CELR) received reports that reflect potential DNS hijacking of cbridge frontend.
Currently Celer is under investigation, the platform has issued a warning to users these contracts are related to a potential UI hack to redirect users to interact with the above addresses and consume the token balance.
According to initial investigation, hackers can start around Aug-17-2022 07:00:00 PM +UTC. Celer Network urges users not to use cBridge for cross-chain assets for the time being. cBridge’s user interface is offline and the situation involved is currently under investigation.
The Celer cBridge is a decentralized and non-custodial asset bridge, which allows users to transfer a variety of tokens across different blockchains in a fast, secure and low-cost fashion. It currently supports 100+ tokens across 30+ blockchains and layer-2 rollups. Built on top of the Celer Inter-chain Message Framework, cBridge has processed over $6B cross-chain asset transfer volume on 30+ blockchains for more than 140K unique users, and is quickly growing and expanding into more blockchains and layer-2s.
DISCLAIMER: The Information on this website is provided as general market commentary and does not constitute investment advice. We encourage you to do your own research before investing.
Join CoinCu Telegram to keep track of news: https://t.me/coincunews
Follow CoinCu Youtube Channel | Follow CoinCu Facebook page
Foxy
CoinCu News
Explore the top Base Meme Coins to invest in, including popular and promising tokens like…
The SEC accelerates 19b-4 filings review, sparking hope for Spot Ethereum ETF approval. However, approval…
Ethereum ETF timeline is a topic of interest to many investors as the SEC's May…
Trezor Ethereum staking leverages Everstake's staking platform, offering a user-friendly interface for selecting staking options…
The Genesis settlement prohibits Genesis from operating in New York and establishes a victims' fund…
Brazil Central Bank is making significant strides in the supervision of encrypted assets and virtual…
This website uses cookies.