U.S. markets closed
  • S&P Futures

    4,295.75
    -2.50 (-0.06%)
     
  • Dow Futures

    33,853.00
    -20.00 (-0.06%)
     
  • Nasdaq Futures

    13,683.00
    +1.75 (+0.01%)
     
  • Russell 2000 Futures

    2,022.90
    -0.90 (-0.04%)
     
  • Crude Oil

    88.38
    -1.03 (-1.15%)
     
  • Gold

    1,793.80
    -4.30 (-0.24%)
     
  • Silver

    20.19
    -0.08 (-0.38%)
     
  • EUR/USD

    1.0161
    -0.0004 (-0.04%)
     
  • 10-Yr Bond

    2.7910
    -0.0580 (-2.04%)
     
  • Vix

    19.95
    +0.42 (+2.15%)
     
  • GBP/USD

    1.2050
    -0.0008 (-0.07%)
     
  • USD/JPY

    133.2300
    -0.0420 (-0.03%)
     
  • BTC-USD

    24,095.79
    -199.76 (-0.82%)
     
  • CMC Crypto 200

    571.94
    -18.82 (-3.19%)
     
  • FTSE 100

    7,509.15
    +8.26 (+0.11%)
     
  • Nikkei 225

    28,871.78
    +324.80 (+1.14%)
     

Hackers Step Up Attempts to Hijack DeFi Websites Convex's Domain Name Server Targeted in Latest Spoofing Exploit

  • Oops!
    Something went wrong.
    Please try again later.
  • Oops!
    Something went wrong.
    Please try again later.
  • Oops!
    Something went wrong.
    Please try again later.
·2 min read
In this article:
  • Oops!
    Something went wrong.
    Please try again later.
  • Oops!
    Something went wrong.
    Please try again later.
  • Oops!
    Something went wrong.
    Please try again later.

Hackers are increasingly targeting the front-end websites of DeFi protocols in a bid to steal users’ funds.

Convex Finance, a protocol offering boosted rewards for Curve liquidity providers and stakers, is urging users to be diligent in checking the addresses for contract approvals after its website was hijacked on Thursday.

Spoofing Attack

Convex is the sixth-largest DeFi protocol with a total value locked (TVL) of $3B, despite TVL dropping 6% over the past 24 hours, according to DeFi Llama.

On June 23, angel investor Alexintosh tweeted that Convex Finance was asking users to approve an unverified smart contract address, suggesting a hacker may have infiltrated Convex Finance’s website to execute a DNS (domain name server) spoofing attack.

Domain Name Servers allow users to access websites via simple text-based web addresses instead of typing out the exact IP address of each website they wish to visit, making the internet easier to use.

Convex Finance later confirmed that its DNS had indeed been hijacked, resulting in some users mistakenly approving malicious contracts. Convex launched two alternative domain names from which users can access the protocol as a precaution while an ongoing investigation into the DNS hijack is conducted.

The Convex team asked the owners of the wallets that had been spoofed to make contact via Twitter DM or its Discord channel. It also emphasized that user funds held in its verified smart contract remain safe and unaffected.

Security Precaution

Twitter user Bret Woods urged web3 users to carefully verify the addresses involved in every single crypto transaction they make as a security precaution. “Even on trusted sites we’re seeing UIs being hacked, leading to erroneous token approvals,” they said.

Meme-token DogeBonk tweeted that Convex should have used Domain Name System Security Extensions (DNSSEC) to add cryptographic authentication and defend against spoofing attacks.

The price of Convex’s native CVX token appears unaffected by the incident, having gained 2.5% in one day to trade for $4.60, according to CoinGecko.

Hijacking Attack

Convex is not the first DeFi project to suffer a DNS hijacking attack.

In March 2021, both Cream Finance and PancakeSwap reported that DNS spoofers had compromised their websites. The attack resulted in both protocols’ front-end websites requesting users to enter their seed phrase. If entered, the phrase would allow the attacker to take control of users’ wallets and drain their funds.

In December, BadgerDAO users lost about $130M in a front-end attack when its API key for Cloudflare, a website security service, was compromised. The attacker injected a malicious script into Badger’s front-end, intercepting transactions and requesting users to approve contracts under the hacker’s control.

Read the original post on The Defiant