HomeCryptocurrencyBinance's BNB Chain bridge was hacked: $718 million lose is calculated

Binance’s BNB Chain bridge was hacked: $718 million lose is calculated

The BNB Chain developed by the cryptocurrency exchange Binance was hacked in the early morning of the 7th! The official cross-chain bridge (BSC Token Hub) was stolen by hackers, and the loss amounted to hundreds of millions of dollars. According to BscScan data, the chain has suspended block production (the last block was 6 points).

Binance BNB BSC entire chain suspended-min

Binance founder CZ also urgently stepped forward to emphasize the safety of user funds, and the details of the attack are under investigation:

We have asked all validators to suspend BSC for additional BNB resulting from cross-chain bridge BSC Token Hub utilization. Questions are included. Your funds are safe. We apologize for the inconvenience and provide further updates.

The hack caused a lose of over $700 million?

Due to the recent incident, the total amount of damages has not been determined. According to community analysis, the attackers are suspected of stealing 2 million BNB (about $570 million at the current price), about $80 million in ETH and other assets, and tens of millions of assets transferred to other chains. Youchain analysts estimated the maximum loss to be $718 million.

According to DeBank data, the wallets marked as attackers had $540 million in assets at the time of writing.

However, CZ, the founder of Binance, tweeted that the total loss of the attack was about 100 million US dollars, which was very different from the results of the chain data, and it has yet to be clarified.

BNB slumps 5% in seconds

At the same time, in terms of BNB price, as soon as the news of the attack was made public, BNB fell by nearly 5% within 2 hours, but it has rebounded before the deadline, and is now at $286.3.

Mehmet S. Kaya
Mehmet S. Kayahttps://teknonel.com
Mehmet is one of the administrator of Teknonel. As a software developer, he loves to share his knowledge in related topics. He is highly familiar with the editorial process from the inception of an article idea, through the iterative process, publishing, and performance analysis as well as product reviews.

Follow us on Social Media!


Related Articles

Twitter reportedly developing a cryptocurrency wallet System

Twitter continues to move toward Web3, and software developers say they are already testing an e-wallet based on the Web3 concept that Twitter users...

Microstrategy is not afraid of bear market and buys 301 Bitcoins

Long-term optimistic about Bitcoin's micro-strategy, he entered the market again to buy 301 BTC, with a total investment of about 6 million US dollars,...

Hackers use Deepfake to impersonate Binance executives’ faces for cryptocurrency scams

A Binance executive pointed out that the hacker group used Deepfake (deep fake technology) to create an AI holographic projection like his face, and...

ETH option contracts will be released before Ethereum upgrade on September 15

Ethereum is about to usher in the much-anticipated Ethereum 2.0 mainnet on September 15th. Many people believe that Ethereum will usher in a surge...

Explore More Articles

Starfield How to Sell from Ship Inventory main

Starfield: How to Sell from Ship Inventory?

There's a bunch of different places you can sell your hard-earned items and gears. The only thing is there's no maps in this game....

Starfield: How to mine Chlorosilanes?

If you already used the workbench, you might have notice a recipe that requires a little resource called Chlorosilanes. And while tracking down elements,...
Starfield How to Store items in your Ship-min

Starfield: How to Store items in your Ship?

Starfield's massive open-world comes with unlimited items to farm and collect. However, it might be little bit annoying to over encumber time to time....
Proofing Your World 8 Best Strategies for Ultimate Technology Security-min

Proofing Your World: 8 Best Strategies for Ultimate Technology Security

Expanding the size of the attack surface inevitably amplifies the risk of cybersecurity breaches. Consequently, reducing the attack surface logically diminishes cybersecurity risk. It...