• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
Some Coins2Day Crypto pricing data is provided by Binance.
The CoinsCryptocurrency

Mark Cuban says a cross-chain future remains ‘possible’ despite slew of bridge hacks

By
Taylor Locke
Taylor Locke
Down Arrow Button Icon
By
Taylor Locke
Taylor Locke
Down Arrow Button Icon
October 11, 2022, 10:54 AM ET
Jerod Harris—Getty Images/Vox Media

Will cross-chain applications ever be safe? Bridge hacks don’t appear to be going away.

Another just happened today, as the QANplatform, a Layer-1 blockchain, was hacked for around $1 million. Last week, a bridge used by Binance, the largest crypto exchange, fell victim to a $100 million hack. And the list goes on and on, and each adds up: About $2 billion in cryptocurrency has been stolen this year due to cross-chain bridge hacks, according to the blockchain data firm Chainalysis.

Even still, investor Mark Cuban thinks a cross-chain future is “possible” and “viable,” but acknowledges it’s “risky,” he tells Coins2Day. “I really try to limit my use of bridges.”

Last night, a hacker stole 2M BNB worth approx. $560M by exploiting a bug in the Binance Bridge.This theft brings the total amount stolen in hacks this year to just under $2.9 billion worth of cryptocurrency, $1.9 billion of which was stolen from cross-chain bridges. Pic.twitter.com/LxnL2QtlBA

— Chainalysis (@chainalysis) October 7, 2022

Most of those within the space agree, noting that the technology must evolve to be more secure.

Bridges are very important because, at least as of now, blockchains can’t communicate with each other. An application on Ethereum can’t communicate with another application on, say, Solana, which can be obviously limiting for those within the crypto space. However, bridges—serving as a “storage point” between chains—are often targeted by hackers, and each bridge is only as strong as the code behind it.

“Current popular cross-chain bridges that are secured by a multisig (‘proof-of-authority’) in its current form have a very large attack surface, which makes it very difficult to be secured,” Edmund Kua, head of research at blockchain analytics firm Nansen, tells Coins2Day. A multisig requires multiple keys to move funds from a wallet, and proof-of-authority is an identity-based consensus mechanism that allows pre-approved validators to use software that automates the process of verifying transactions. 

But bridges are “still an important part of the infralayer for any ecosystem, especially when it comes to interoperability, so [they] will definitely be viable even going forward,” Kua said. “The only difference is the innovation in their designs.”

A few projects have begun addressing current design flaws. One includes a sort of “cluster” solution for chains where “you can bridge more natively, which drastically reduces attack vectors,” Niklas Polk, a research analyst at Nansen, tells Coins2Day, noting the Cosmos ecosystem, which is known for its Inter-Blockchain Communication (IBC) protocol, and Layer-3 solutions atop ZK (zero-knowledge) technology. 

“But for bridging between those clusters, we might need the current design for the foreseeable future,” Polk said.

Others, like Sergey Nazarov, cofounder of smart contract oracle network Chainlink, unsurprisingly point to their project’s solutions. Chainlink, for example, is working on its cross-chain interoperability protocol (CCIP), which provides a standard of communication between blockchains.

“As blockchain adoption increases in the coming years, oracles will be the key to solving the cross-chain puzzle,” Nazarov tells Coins2Day. “Security must come first with cross-chain applications—especially with DeFi’s growing value. But with the number of new use cases that cross-chain bridging and messaging can open up, I firmly believe the future of Web3 will be cross-chain.”

In the meantime, as the crypto realm awaits proposed solutions, bridge code evaluations should become standard, Erin Plante, vice president of investigations at Chainalysis, tells Coins2Day.

“While not foolproof, a valuable first step towards addressing security issues is for extremely rigorous code audits to become the gold standard, both for developers building protocols and investors evaluating them,” Plante said. “And over time, the strongest, safest smart contracts can serve as templates for developers to build from.”

Sign up for the Coins2Day Features email list so you don’t miss our biggest features, exclusive interviews, and investigations.

About the Author
By Taylor Locke
LinkedIn iconTwitter icon
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.