Celer: cBridge Frontend UI Suffered DNS Cache Poisoning Attack, Will Fully Compensate Affected Users
Celer Network releases updates regarding its cross-chain payment network cBridge's hack incident, saying that it was a DNS cache poisoning attack on cBridge's frontend UI. Celer protocol and smart contracts are not affected. The attack targeted third-party DNS providers that are out of the project's own control domain, which is similar to the attack on Cruve recently. Celer suggests users to turn on Secure DNS option in their web browser, and to always verify the contract addresses when interacting with any DeFi frontend. Celer says that it will fully compensate users affected during the session of the incident. Meanwhile, Celer posts ten addresses, and reminds users to check and revoke any approval to the addresses. In addition, cBridge frontend will be resumed shortly.