Decentralized finance (DeFi) protocols proceed to be focused by hackers, with Curve Finance turning into the newest platform to be compromised after a DNS hijacking incident.
The automated market maker warned customers to not use the entrance finish of its web site on Aug. 9 after the incident was flagged on-line by numerous members of the broader cryptocurrency group.
Whereas the precise assault mechanism continues to be underneath investigation, the consensus is that attackers managed to clone the Curve Finance web site and rerouted the DNS server to the faux web page. Customers that tried to utilize the platform then had their funds drained to a pool operated by the attackers.
Curve Finance managed to treatment the state of affairs timeously however attackers nonetheless managed to siphon what was initially estimated to be $537,000 price of USD Coin (USDC) within the time it took to revert the hijacked area. The platform believes its DNS server supplier Iwantmyname was hacked which allowed the following occasions to unfold.
Cointelegraph reached out to blockchain analytics agency Elliptic to dissect how attackers managed to dupe unsuspecting Curve customers. The workforce confirmed {that a} hacker had compromised Curve’s DNS, which led to malicious transactions being signed.
Associated: Cross chains, beware: deBridge flags tried phishing assault, suspects Lazarus Group
Elliptic estimates that 605,000 USDC and 6,500 DAI had been stolen earlier than Curve discovered and reverted the vulnerability. Using their blockchain analytics instruments, Elliptic then traced the stolen funds to numerous totally different exchanges, wallets and mixers.
The stolen funds had been instantly transformed to Ether (ETH) to keep away from a possible USDC freeze, amounting to 363 ETH price $615,000.
Curiously, 27.7 ETH was laundered by the now OFAC sanctioned Twister Money. 292 ETH was despatched into the FixedFloat trade and coin swap service. The platform managed to freeze 112 ETH and confirmed the motion of funds based on an Elliptic spokesperson:
“We’ve got been in touch with the trade, which confirmed an extra three addresses that the hacker withdrew funds into from the trade (these had been accomplished orders that FixedFloat weren’t capable of freeze in time). These embody 1 BTC tackle, 1 BSC Deal with and 1 LTC tackle.”
Elliptic is now monitoring these flagged addresses along with the unique Ethereum-based addresses. An additional 20 ETH was despatched to a Binance sizzling pockets, and one other 23 ETH was moved to an unknown trade sizzling pockets.
Elliptic additionally cautioned the broader ecosystem of additional incidents of this nature after figuring out a list on a darknet discussion board claiming to promote ‘faux touchdown pages’ for hackers of compromised web sites.
It’s unclear whether or not this itemizing, which was found only a day earlier than the Curve Finance DNS hijacking incident, was immediately associated however Elliptic famous it highlights the methodologies utilized in all these hacks.