article DNS Hijacking Strikes Again: How Curve Finance Users Were Targeted
How the Attack Unfolded
Attack Method: Hackers compromised the ".fi" domain registrar, altering DNS records to redirect traffic.
User Impact: Visitors were sent to a fake Curve Finance website that prompted them to sign malicious transactions.
Key Detail: The smart contracts remained secure—only the front-end interface was affected.
Please Register !
What is DNS Hijacking?The Domain Name System (DNS) acts like the internet’s phonebook, translating human-readable domains (e.g., curve.fi) into machine-readable IP addresses. When attackers hijack DNS:
✔ They redirect users to fake sites without their knowledge.
✔ They steal login credentials, wallet approvals, and funds.
✔ The attack leaves no on-chain traces until it’s too late.
Common DNS Hijacking Techniques
Type Description Local DNS Hijack Malware alters DNS settings on a victim’s device. Router Hijack Hackers change DNS settings on a Wi-Fi router. Registrar-Level Hijack Attackers compromise the domain registrar (as in Curve’s case). Man-in-the-Middle (MITM) Intercepts and modifies DNS queries in transit. Curve Finance’s Response
Immediate Mitigation
Redirected curve.fi to neutral nameservers, taking the site offline.
Launched a temporary secure front-end at curve.finance.
User Protection Measures
Alerted users via official channels (Twitter, Discord).
Requested a takedown of the compromised domain.
Long-Term Security Upgrades
Evaluating decentralized alternatives (ENS, IPFS).
Strengthening registrar security (MFA, domain locking).
<foto> *(Image: Comparison of legitimate vs. fake Curve Finance site)* <foto>
How Crypto Projects Can Prevent DNS Hijacking
Please Register !
Adopt Decentralized Web SolutionsUse Ethereum Name Service (ENS) instead of traditional DNS.
Host front-ends on IPFS or Arweave for censorship resistance.
Please Register !
Enhance Registrar SecurityEnable DNSSEC (DNS Security Extensions).
Require multi-factor authentication (MFA) for domain management.
Please Register !
Educate UsersEncourage bookmarking official URLs.
Warn against unverified transaction prompts.
Why This Matters for DeFi
Centralized Weak Points: Even decentralized protocols rely on centralized DNS, creating vulnerabilities.
Growing Threat: DNS hijacks are increasingly common in crypto (see 2023 Curve attack).
User Protection Needed: Projects must balance decentralization with security.
