Celer Network responded to the cBridge DNS hijacking attack and stated that this attack led to some users who used cBridge from 3:45 to 6:00 on August 18, Beijing time, to be directed to malicious smart contracts. Celer listed all malicious smart contract addresses in the tweet and called on users to revoke the authorization to write the contract as soon as possible. Celer stated that this attack was aimed at a third-party DNS provider, and Celer's own contract was not affected. Users who suffered losses in this incident will be fully compensated by Celer. Also, the cBridge front end will be back soon.