Hackers have compromised the DNS server of the cBridge chain bridge from Celer Network. As a result, the front-end led some users to malicious smart contracts.
📢(1/n) cBridge’s front-end UI is approx. 08/17 07:45 – 22pm UTC has caused some users to be redirected to malicious smart contracts that can consume the entire amount of tokens approved. BEFORE, PLEASE check the following and revoke approvals:
— CelerNetwork (@celernetwork) 18 August 2022
The project team ensured that they responded quickly to the incident so that only a “small portion” of users were affected. All will receive full compensation.
“The Celer protocol and smart contracts are not affected. The developers said that the root DNS record has not been compromised and has not changed.
According to them, the attack was aimed at third-party DNS providers beyond the control of the project, like the recent attack on Curve Finance.
“Regardless of the security of the protocol itself, a DNS violation can occur on the front end of any DeFi application. We strongly recommend that the entire blockchain community enable the Secure DNS option in the browser to reduce the risk,” the developers wrote.
They also urged to check smart contract addresses and reject any suspicious ones.
Recall that in the first half of the year, hackers stole $1.97 billion worth of assets from crypto projects.
Read ForkLog bitcoin news in our Telegram – cryptocurrency news, courses and analysis.
Source: Fork Log
I’m Sandra Torres, a passionate journalist and content creator. My specialty lies in covering the latest gadgets, trends and tech news for Div Bracket. With over 5 years of experience as a professional writer, I have built up an impressive portfolio of published works that showcase my expertise in this field.
Leave a Reply