The multi-chain bridge, cBridge, operated by blockchain interoperability platform Celer Network, was temporarily forced to halt operations due to a suspected DNS hack. Celer Network’s first investigations reveal that on August 17, about 7:00 p.m. UTC, some unusual DNS activity on the cBridge started. 📢📢📢If you recently used cBridge, please make sure to check and revoke any token approval for the following contracts:Ethereum: 0x2A2aA50450811Ae589847D670cB913dF763318E8BSC: 0x5895da888Cbf3656D8f51E5Df9FD26E8E131e7CF(cont' in next thread) https://t.co/HJbCxq4RqN — CelerNetwork (@CelerNetwork) August 17, 2022 Corrupted Smart Contracts According to the platform, the exploit aims to trick users into using corrupted smart contracts to steal their cryptocurrency holdings. The network claims that the exploit’s purpose is to trick users into interacting with some corrupted smart contracts. The attackers could then use the opportunity to steal investors’ cryptocurrency holdings. The network supplied a list of smart contracts that users can revoke in case of attempted abuse. To revoke approvals, users need to go to the token approval page of each network’s blockchain explorer. Celer Network claims that smart contracts and the Celer Protocol remain unaffected, and Celer DNS’s root record was never changed or compromised. The company compared the exploit and what transpired with Curve Finance. The hack targeted ISPs and DNS servers beyond...