ID:
celer-network-1058
100 pts
Platform:
Type:
Category:
Method:
Data Sources:
Celer Network
Platform
Bridge
Front-end Vulnerabilities
Extended Method:
DNS hijack
Days in Operation:
1692
(4.64 Years)





100 pts each
Celer Network reported a potential DNS hijack of its frontend on cBridge. Impacted addresses include:
Polygon: 0x9c8b72f0d43ba23b96b878f1c1f75edc2beec9f9
Avalanche: 0x9c8B72f0D43BA23B96B878F1c1F75EdC2Beec9F9
Arbitrum: 0x9c8B72f0D43BA23B96B878F1c1F75EdC2Beec9F9
Astar: 0x9c8B72f0D43BA23B96B878F1c1F75EdC2Beec9F9
Aurora: 0x9c8b72f0d43ba23b96b878f1c1f75edc2beec9f9
These contracts are related to a potential UI hijack to redirect users to interact with the above addresses and drain tokens balances. The cBridge frontend UI is currently offline to be safe. Requesting users to revoke approval for those contracts.
DISCLAIMER: While web3rekt has used the best efforts in aggregating and maintaining this database, this web site makes no representations or warranties with respect to the accuracy or completeness of its information and data herein, and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose.
​
Under no circumstances, shall web3rekt be liable for any loss of profit or funds, any regulatory or governmental penalties, any legal costs, or any other commercial and non-commercial damages, including but not limited to special, incidental, consequential, or other damages from any or all usage of the data and information derived from this database.