6 hours ago
## Understanding the Curve Finance DNS hijacking
_On May 12, 2025, at 20:55 UTC, hackershijacked the “.fi” domain name system (DNS) of Curve Finance after managing to access the registrar. They began sending its users to a malicious website, attempting to drain their wallets. This was the second attack on Curve Finance’s infrastructure in a week._
Users were directed to a website that was a non-functional decoy, designed only to trick users into providing wallet signatures. The hack hadn’t breached the protocol’s smart contracts and was limited to the DNS layer.
The DNS is a critical component of the internet that functions like a phonebook. It allows you to use simple, memorable domain names (such as facebook.com) instead of complex numerical IP addresses (like 192.168.1.1) for websites. DNS converts these user-friendly domain names into the IP addresses computers require to connect.
This is not the first time Curve Finance, a decentralized finance (DeFi) protocol, has suffered such an attack. Back in August 2022, Curve Finance faced an attack with similar tactics. The attackers had cloned the Curve Finance website and interfered with its DNS settings to send users to a duplicate version of the website. Users who tried using the platform ended up losing their money to the attackers. The project was using the same registrar, “iwantmyname,” at the time of the previous attack.
## How attackers execute DNS hijacking in crypto
_When a user types a web address, their device queries a DNS server to retrieve the corresponding IP address and connect to the correct website. In DNS hijacking, fraudsters interfere with this process by altering how DNS queries are resolved, rerouting users to malicious sites without their knowledge._
Fraudsters execute DNS hijacking in several ways. Attackers might exploit vulnerabilities in DNS servers, compromise routers, or gain access to domain registrar accounts. The objective is to change the DNS records so that a user trying to visit a legitimate site is redirected to a fake, lookalike page containing wallet-draining code.
Types of DNS hijacking include:
* **Local DNS hijack:** Malware on a user’s device changes DNS settings, redirecting traffic locally. * **Router hijack:** Attackers compromise home or office routers to alter DNS for all connected devices. * **Man-in-the-middle attack:** Intercepts DNS queries between user and server, altering responses on the fly. * **Registrar-level hijack:** Attackers gain access to a domain registrar account and modify official DNS records, affecting all users globally.
_**Did you know?** During the Curve Finance DNS attack in 2023, users accessing the real domain unknowingly signed malicious transactions. The back end was untouched, but millions were lost through a spoofed front end._
## How DNS hijacking worked in the case of Curve Finance
**When attackers compromise a website with DNS hijacking, they can reroute traffic to a malicious website without the user ‘s knowledge. **
There are several ways DNS hijacking can occur. Attackers might infect a user’s device with malware that alters local DNS settings, or they may gain control of a router and change its DNS configuration. They may also target DNS servers or domain registrars themselves. In such cases, they modify the DNS records at the source, affecting all users trying to access the site.
In the case of Curve Finance, the attackers infiltrated the systems of the domain registrar “iwantmyname” and altered the DNS delegation of the “curve.fi” domain to redirect traffic to their own DNS server.
A domain registrar is a company authorized to manage the reservation and registration of internet domain names. It allows individuals or organizations to claim ownership of a domain and link it to web services like hosting and email.
The precise method of the breach is still under investigation. By May 22, 2025, no evidence of unauthorized access or compromised credentials was found.
_**Did you know?** DNS hijacking attacks often succeed by compromising domain registrar accounts through phishing or poor security. Many Web3 projects still host domains with centralized providers like GoDaddy or Namecheap. _
## How Curve Finance responded to the hack
_While the registrar was slow to respond, the Curve team took measures to deal with the situation. It successfully redirected the “.fi” domain to neutral nameservers, thus taking the website offline while efforts to regain control continued. _
To ensure safe access to the frontend and secure fund management, the Curve team quickly launched a secure alternative at “curve.finance,” now serving as the official Curve Finance interface temporarily.
Upon discovering the exploit at 21:20 UTC, the following actions were taken:
* Users were immediately notified through official channels * Requested the takedown of the compromised domain * Initiated mitigation and domain recovery processes * Collaborated with security partners and the registrar to coordinate a response.
Compromise of the domain notwithstanding, the Curve protocol and its smart contracts remained secure and fully operational. During the disruption of the front end, Curve processed over $400 million in onchain volume. No user data was at risk, as Curve’s front end does not store any user information.
Throughout the compromise, the Curve team was always available through its Discord server, where users could raise issues with them.
After implementing immediate damage control measures, the Curve team is now taking additional steps to prepare for the future.
* Assessing and enhancing registrar-level security, incorporating stronger protections and exploring alternative registrars * Investigating decentralized front-end options to eliminate dependence on susceptible web infrastructure * Partnering with the broader DeFi and Ethereum Name Service (ENS) communities to advocate for native browser support for “.eth” domains.
_**Did you know?** Unlike smart contract exploits, DNS hijacks leave no trace onchain initially, making it hard for users to realize they have been tricked until funds are gone. It is a stealthy form of crypto theft._
## How crypto projects can deal with DNS hijacking vulnerability
_The Curve Finance attack is concerning because it bypassed the decentralized security mechanisms at the protocol level. Curve ‘s backend, meaning its smart contracts and onchain logic, remained unharmed, yet users lost funds because they were deceived at the interface level. This incident underscores a significant vulnerability in DeFi. _
While the backend may be decentralized and trustless, the front end still depends on centralized Web2 infrastructure like DNS, hosting and domain registrars. Attackers can exploit these centralized choke points to undermine trust and steal funds.
The Curve attack serves as a wake-up call for the crypto industry to explore decentralized web infrastructure, such as InterPlanetary File System (IPFS) and Ethereum Name Service (ENS), to reduce reliance on vulnerable centralized services.
To address the gap between decentralized backends and centralized frontends, crypto projects must adopt a multi-layered approach.
Here are various ways crypto projects can deal with this gap:
* Minimize reliance on traditional DNS: They can minimize reliance on traditional DNS by integrating decentralized alternatives of DNS like the ENS or Handshake, which reduce the risk of registrar-level hijacks. * Use decentralized file storage systems: Hosting frontends on decentralized file storage systems such as IPFS or Arweave adds another layer of protection. * Implement domain name system security extensions (DNSSEC): Teams should implement DNSSEC to verify the integrity of DNS records and prevent unauthorized changes. * Secure registrar accounts: Registrar accounts must be secured with strong authentication methods, including multifactor authentication (MFA) and domain locking. * Train users: Educating users to verify site authenticity, such as bookmarking URLs or checking ENS records, can reduce phishing success rates.
Bridging the trust gap between decentralized protocols and centralized interfaces is essential for maintaining security and user confidence in DeFi platforms.