According to the monitoring of the Beosin EagleEye Web3 security early warning and monitoring platform, the QANplatform cross-chain bridge project has been hacked. The attack transactions are the following two transactions: 0xf93047e41433d73ddf983cfa008aeb356ec89803c0a92b0e97ccdc6c42a13f51(bsc),0x048a1a71fd41102c72427cc1d251f4ecbf705585625641h306ed919f. The Beosin security team analyzed and found that the attacker first used the address 0x68e8198d5b3b3639372358542b92eb997c5c314 (because 0x68e819 is to create a cross-chain bridge address, so this address should belong to the project party.) Call the bridgeWithdraw function in the cross-chain bridge contract to extract QANX tokens, and then exchange the QANX tokens For the corresponding platform currency. Stored at the attacker's address (0xF163A6cAB228085935Fa6c088f9Fc242AFD4FB11). At present, the stolen funds are still stored in the attacker's address, and the Beosin security team will continue to track. Beosin Trace will keep track of the stolen funds.