Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop
Tag:

Cointelegraph

Decrypt logo
NFT Gaming

Cointelegraph Website Hacked in Fake Airdrop Phishing Attack

by admin June 23, 2025



In brief

  • Cointelegraph has confirmed a front-end hack used to serve phishing pop-ups to people accessing the site.
  • CoinMarketCap suffered a similar exploit days earlier.
  • Victims are being tricked into connecting their wallets to receive fake token airdrops.

Crypto news outlet Cointelegraph has confirmed that its website was compromised in a front-end exploit used to promote a fraudulent token airdrop and steal from users.

It said in a statement on X on Sunday night that it was aware of the “fraudulent pop-up” and was “actively working on a fix”.

“Do not click on these pop-ups, connect your wallets [or] enter any personal information,” it warned. 

Decrypt has approached Cointelegraph for comment. 

The pop-up falsely claims users have been selected for a giveaway of a new token, purportedly part of a “fair launch initiative” by Cointelegraph to reward loyal readers.

It displayed a fabricated token price and promised users just under $5,500 worth of tokens if they connected their crypto wallets. It also claimed security firm CertiK had audited the smart contract.

The method used mirrors a similar front-end attack on the price aggregator CoinMarketCap, which occurred just two days prior. 



In that case, visitors to the site saw pop-ups requesting wallet connections for verification purposes. CoinMarketCap later confirmed malicious code had been injected into the site, and it was removed.

Both incidents represent a growing wave of phishing attacks targeting crypto platforms via compromised user interfaces. 

In these scams, victims are lured into connecting wallets under false pretenses—such as receiving tokens or confirming identity—and then see their accounts drained by the attacker.

According to blockchain intelligence firm TRM Labs, phishing schemes and malware-based infrastructure attacks made up 70% of the $2.2 billion stolen in crypto-related hacks in 2024.

The Cointelegraph attack comes just days after security researchers disclosed a massive data dump containing over 16 billion stolen login credentials, including access to accounts on platforms like Google, Telegram, Facebook, and GitHub.

The trove was likely assembled from infostealer malware, credential stuffing, and prior leaks.

Edited by Sebastian Sinclair

Daily Debrief Newsletter

Start every day with the top news stories right now, plus original features, a podcast, videos and more.



Source link

June 23, 2025 0 comments
0 FacebookTwitterPinterestEmail
Cointelegraph Bitcoin & Ethereum Blockchain News
Crypto Trends

Cointelegraph Bitcoin & Ethereum Blockchain News

by admin May 23, 2025



Understanding the Curve Finance DNS hijacking

On May 12, 2025, at 20:55 UTC, hackers hijacked the “.fi” domain name system (DNS) of Curve Finance after managing to access the registrar. They began sending its users to a malicious website, attempting to drain their wallets. This was the second attack on Curve Finance’s infrastructure in a week.

Users were directed to a website that was a non-functional decoy, designed only to trick users into providing wallet signatures. The hack hadn’t breached the protocol’s smart contracts and was limited to the DNS layer.

The DNS is a critical component of the internet that functions like a phonebook. It allows you to use simple, memorable domain names (such as facebook.com) instead of complex numerical IP addresses (like 192.168.1.1) for websites. DNS converts these user-friendly domain names into the IP addresses computers require to connect.

This is not the first time Curve Finance, a decentralized finance (DeFi) protocol, has suffered such an attack. Back in August 2022, Curve Finance faced an attack with similar tactics. The attackers had cloned the Curve Finance website and interfered with its DNS settings to send users to a duplicate version of the website. Users who tried using the platform ended up losing their money to the attackers. The project was using the same registrar, “iwantmyname,” at the time of the previous attack.

How attackers execute DNS hijacking in crypto

When a user types a web address, their device queries a DNS server to retrieve the corresponding IP address and connect to the correct website. In DNS hijacking, fraudsters interfere with this process by altering how DNS queries are resolved, rerouting users to malicious sites without their knowledge.

Fraudsters execute DNS hijacking in several ways. Attackers might exploit vulnerabilities in DNS servers, compromise routers, or gain access to domain registrar accounts. The objective is to change the DNS records so that a user trying to visit a legitimate site is redirected to a fake, lookalike page containing wallet-draining code. 

Types of DNS hijacking include:

  • Local DNS hijack: Malware on a user’s device changes DNS settings, redirecting traffic locally. 
  • Router hijack: Attackers compromise home or office routers to alter DNS for all connected devices. 
  • Man-in-the-middle attack: Intercepts DNS queries between user and server, altering responses on the fly. 
  • Registrar-level hijack: Attackers gain access to a domain registrar account and modify official DNS records, affecting all users globally.

Did you know? During the Curve Finance DNS attack in 2023, users accessing the real domain unknowingly signed malicious transactions. The back end was untouched, but millions were lost through a spoofed front end.

How DNS hijacking worked in the case of Curve Finance

When attackers compromise a website with DNS hijacking, they can reroute traffic to a malicious website without the user’s knowledge. 

There are several ways DNS hijacking can occur. Attackers might infect a user’s device with malware that alters local DNS settings, or they may gain control of a router and change its DNS configuration. They may also target DNS servers or domain registrars themselves. In such cases, they modify the DNS records at the source, affecting all users trying to access the site.

In the case of Curve Finance, the attackers infiltrated the systems of the domain registrar “iwantmyname” and altered the DNS delegation of the “curve.fi” domain to redirect traffic to their own DNS server. 

A domain registrar is a company authorized to manage the reservation and registration of internet domain names. It allows individuals or organizations to claim ownership of a domain and link it to web services like hosting and email.

The precise method of the breach is still under investigation. By May 22, 2025, no evidence of unauthorized access or compromised credentials was found.

Did you know? DNS hijacking attacks often succeed by compromising domain registrar accounts through phishing or poor security. Many Web3 projects still host domains with centralized providers like GoDaddy or Namecheap. 

How Curve Finance responded to the hack

While the registrar was slow to respond, the Curve team took measures to deal with the situation. It successfully redirected the “.fi” domain to neutral nameservers, thus taking the website offline while efforts to regain control continued. 

To ensure safe access to the frontend and secure fund management, the Curve team quickly launched a secure alternative at “curve.finance,” now serving as the official Curve Finance interface temporarily.

Upon discovering the exploit at 21:20 UTC, the following actions were taken: 

  • Users were immediately notified through official channels
  • Requested the takedown of the compromised domain
  • Initiated mitigation and domain recovery processes
  • Collaborated with security partners and the registrar to coordinate a response.

Compromise of the domain notwithstanding, the Curve protocol and its smart contracts remained secure and fully operational. During the disruption of the front end, Curve processed over $400 million in onchain volume. No user data was at risk, as Curve’s front end does not store any user information.

Throughout the compromise, the Curve team was always available through its Discord server, where users could raise issues with them.

After implementing immediate damage control measures, the Curve team is now taking additional steps to prepare for the future.

  • Assessing and enhancing registrar-level security, incorporating stronger protections and exploring alternative registrars
  • Investigating decentralized front-end options to eliminate dependence on susceptible web infrastructure
  • Partnering with the broader DeFi and Ethereum Name Service (ENS) communities to advocate for native browser support for “.eth” domains.

Did you know? Unlike smart contract exploits, DNS hijacks leave no trace onchain initially, making it hard for users to realize they have been tricked until funds are gone. It is a stealthy form of crypto theft.

How crypto projects can deal with DNS hijacking vulnerability

The Curve Finance attack is concerning because it bypassed the decentralized security mechanisms at the protocol level. Curve’s backend, meaning its smart contracts and onchain logic, remained unharmed, yet users lost funds because they were deceived at the interface level. This incident underscores a significant vulnerability in DeFi. 

While the backend may be decentralized and trustless, the front end still depends on centralized Web2 infrastructure like DNS, hosting and domain registrars. Attackers can exploit these centralized choke points to undermine trust and steal funds. 

The Curve attack serves as a wake-up call for the crypto industry to explore decentralized web infrastructure, such as InterPlanetary File System (IPFS) and Ethereum Name Service (ENS), to reduce reliance on vulnerable centralized services.

To address the gap between decentralized backends and centralized frontends, crypto projects must adopt a multi-layered approach. 

Here are various ways crypto projects can deal with this gap:

  • Minimize reliance on traditional DNS: They can minimize reliance on traditional DNS by integrating decentralized alternatives of DNS like the ENS or Handshake, which reduce the risk of registrar-level hijacks. 
  • Use decentralized file storage systems: Hosting frontends on decentralized file storage systems such as IPFS or Arweave adds another layer of protection.
  • Implement domain name system security extensions (DNSSEC): Teams should implement DNSSEC to verify the integrity of DNS records and prevent unauthorized changes. 
  • Secure registrar accounts: Registrar accounts must be secured with strong authentication methods, including multifactor authentication (MFA) and domain locking. 
  • Train users: Educating users to verify site authenticity, such as bookmarking URLs or checking ENS records, can reduce phishing success rates. 

Bridging the trust gap between decentralized protocols and centralized interfaces is essential for maintaining security and user confidence in DeFi platforms.



Source link

May 23, 2025 0 comments
0 FacebookTwitterPinterestEmail

Categories

  • Crypto Trends (958)
  • Esports (727)
  • Game Reviews (677)
  • Game Updates (845)
  • GameFi Guides (950)
  • Gaming Gear (909)
  • NFT Gaming (933)
  • Product Reviews (899)
  • Uncategorized (1)

Recent Posts

  • XYZVerse aims to become a top crypto presale in 2025
  • ‘New Dawn’: Ripple CEO Reacts to Fed Governors Embracing Crypto
  • The Trump-Intel Deal Is Official
  • 2025 fantasy football draft guide – Rankings, mock drafts and analysis
  • This memecoin is making moves in the current crypto cycle

Recent Posts

  • XYZVerse aims to become a top crypto presale in 2025

    August 23, 2025
  • ‘New Dawn’: Ripple CEO Reacts to Fed Governors Embracing Crypto

    August 23, 2025
  • The Trump-Intel Deal Is Official

    August 23, 2025
  • 2025 fantasy football draft guide – Rankings, mock drafts and analysis

    August 23, 2025
  • This memecoin is making moves in the current crypto cycle

    August 23, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

About me

Welcome to Laughinghyena.io, your ultimate destination for the latest in blockchain gaming and gaming products. We’re passionate about the future of gaming, where decentralized technology empowers players to own, trade, and thrive in virtual worlds.

Recent Posts

  • XYZVerse aims to become a top crypto presale in 2025

    August 23, 2025
  • ‘New Dawn’: Ripple CEO Reacts to Fed Governors Embracing Crypto

    August 23, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

@2025 laughinghyena- All Right Reserved. Designed and Developed by Pro


Back To Top
Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop

Shopping Cart

Close

No products in the cart.

Close