Skip to content

Finance platform Curve undergoes DNS record intrusion; users advised to refrain from main website access

"The team assures that user funds are intact and the smart contracts connected with Curve are still secure."

Project's team assures: User assets are intact; smart contract security is maintained.
Project's team assures: User assets are intact; smart contract security is maintained.

Straight Up: The Lowdown on Curve Finance's DNS Hijack

Finance platform Curve undergoes DNS record intrusion; users advised to refrain from main website access

Here's the skinny: Curve Finance, a popular DeFi protocol, had its front-end website compromised in a DNS attack on Tuesday. Attackers redirected users to a shady site, attempting to drain their digital wallets.

"This DNS incident underscores a broader industry issue," Curve Finance informed us. "There's been a spike in attacks targeting crypto projects' infrastructure lately."

Early on Monday, the shady site was discovered, leading to a preliminary response from Curve Finance. They urged everyone to steer clear of the dodgy website as the domain directed traffic to a malicious IP address.

The team promptly isolated the problem, launched an investigation, and partnered with their domain registrar and security partners to get things back on track. They emphasized that no compromise occurred on their side.

The devious scheme? Attackers tampered with the DNS records to point to an IP address under their control. A DNS record links a domain name to its IP address, routing web traffic accordingly.

This phony site, replicating Curve's interface, reportedly contained rogue scripts to tempt users into approving token transfers to the crooks' accounts.

"DNS hacks are a form of infrastructure-level social engineering," explained Meir Dolev, Cyvers co-founder, and CTO. If a site's mapping changes due to stolen credentials or a registrar's vulnerability, users could end up on harmful servers — without even realizing it.

The attack didn't touch the protocol's blockchain; instead, it exploited the trust gap between users and the interface of decentralized apps. But, as long as users connect with Curve via valid contract addresses, their funds should be safe.

It's no secret that Curve has had tough times before. Back in 2022, they suffered a similar DNS hijack, causing a $570,000 loss. In response, Curve suggested users migrate to the Ethereum Name Service (ENS) to thwart future vulnerabilities.

Just a year later, Curve dealt with yet another exploit involving Vyper programming language versions and the CRV/ETH pool, resulting in losses of around $24 million across affected DeFi projects.

But, hey — Curve's smart contracts and user funds are铁打金 coin as always. And, despite the rogue incidents, Curve remains steadfast in its mission of providing easy-to-use DeFi tools for the crypto community.

Stay tuned for more updates and, as always, never forget to double-check those links before connecting your wallet!

💡 Extra Insight:The latest DNS compromise incident involved a targeted DNS attack that directed users to a dangerous clone site, increasing the risk of phishing scams and potential wallet drains. Key details include:

  • Nature of the Attack: a DNS hijack, redirecting users to a phishing site.
  • Warning and Response: Curve Finance cautioned users on May 12, warning them not to engage with the compromised site. The team explained that user traffic was pointing to a malicious IP address due to the DNS hijack.
  • Security Measures: Despite the attack, Curve Finance asserted that their smart contracts and user funds were secure, as the attack was confined to the DNS layer. The team had strong security measures in place, such as password security and two-factor authentication.
  • Resolution: The team tackled the problem head-on, recovering control over the domain and migrating to a new, secure domain to avoid further attacks.
  • Wallet Drains: Users who transacted with the scam site prior to it being secured had their wallets drained by the attackers.
  • CRV Token Price Slide: The DNS hijack triggered a significant drop in the CRV token value, with an estimated decrease of over 8%.
  • Trust and Confidence: The repeated DNS hijacks have raised questions about the security of DeFi infrastructure and may affect user trust and confidence in the platform.
  1. Despite the recent DNS hijack on Curve Finance's front-end website, their smart contracts and user funds remain secure.
  2. The DNS attack on Curve Finance serves as a reminder of the increasing number of attacks targeting infrastructure in the crypto projects sector.
  3. Attackers exploited the trust gap between users and the interface of decentralized apps by tampering with DNS records to redirect traffic to a malicious IP address.
  4. Meir Dolev, Cyvers co-founder and CTO, stated that DNS hacks are a form of infrastructure-level social engineering.
  5. The latest DNS compromise incident involved a targeted attack that directed users to a dangerous clone site, increasing the risk of phishing scams and potential wallet drains.
  6. Wallet drains occurred for users who transacted with the scam site prior to it being secured by Curve Finance.
  7. The drop in the CRV token value following the DNS hijack is estimated to be over 8%, raising questions about the security of DeFi infrastructure and potentially affecting user trust and confidence in the platform.

Read also:

    Latest