How 3 hours of inaction from Amazon cost cryptocurrency holders $235,000 - Ars Technica

The hackers seized control of roughly 256 IP addresses through BGP hijacking, a form of attack that exploits known weaknesses in a core Internet protocol.

The hijacked block included 44.235.216.69, an IP address hosting cbridge-prod2.celer.network, a subdomain responsible for serving a critical smart contract user interface for the Celer Bridge cryptocurrency exchange.

With possession of the certificate, the hijackers then hosted their own smart contract on the same domain and waited for visits from people trying to access the real Celer Bridge cbridge-prod2.celer.network page.

The phishing contract closely resembles the official Celer Bridge contract by mimicking many of its attributes.

For any method not explicitly defined in the phishing contract, it implements a proxy structure which forwards calls to the legitimate Celer Bridge contract.

The phishing contract steals users’ funds using two approaches:.

Back to 365NEWSX