How Cross-Chain Bridges are Hacked?