
Curve Finance Under Attack: DNS Hijacking Strikes Again
The DeFi landscape has witnessed a concerning trend: attacks on the front-end infrastructure. Curve Finance, a prominent decentralized finance protocol, found itself in the crosshairs once again when hackers exploited a vulnerability in its domain name system (DNS) on May 12, 2025. This marked the second DNS hijacking attack on Curve Finance within a week, raising serious concerns about the security of decentralized finance platforms.
This time, the attackers managed to gain access to Curve Finance’s domain registrar, “iwantmyname,” and altered the DNS records. This redirection sent users to a malicious website designed to trick users into providing wallet signatures, potentially leading to the loss of their funds. Fortunately, Curve Finance’s smart contracts remained untouched, but the impact of this attack highlights a crucial vulnerability in the DeFi space.
How DNS Hijacking Works in the Crypto World
DNS, the internet’s phonebook, plays a crucial role in directing users to websites. In DNS hijacking, attackers manipulate this system, redirecting users to fake websites without their knowledge. This malicious redirection can occur in various ways:
- Local DNS Hijacking: Malware installed on a user’s device alters DNS settings, diverting traffic locally.
- Router Hijacking: Attackers compromise home or office routers, modifying DNS settings for all connected devices.
- Man-in-the-Middle Attacks: Attackers intercept DNS queries between a user and the server, modifying responses on the fly.
- Registrar-Level Hijacking: Attackers gain access to a domain registrar‘s account and modify DNS records, affecting all users globally. This was the method employed in the Curve Finance attack.
Curve Finance‘s Response and Lessons Learned
Curve Finance acted swiftly, recognizing the seriousness of the situation. They swiftly redirected the “curve.fi” domain to neutral nameservers, taking the website offline. A secure alternative domain, “curve.finance,” was launched to ensure users could continue accessing the platform safely.
Despite the front-end disruption, the Curve protocol itself remained operational, processing over $400 million in transactions during the period. This incident underscored the crucial distinction between a protocol’s backend (smart contracts) and its front-end (user interface). While Curve’s backend was secure, the centralized front-end presented a vulnerability that attackers exploited.
The Need for Decentralized Web Infrastructure
The Curve Finance attack serves as a powerful reminder that the DeFi ecosystem, while striving for decentralization, is still vulnerable at the point where it interfaces with centralized systems. This incident compels the crypto industry to prioritize the development of decentralized web infrastructure solutions.
Crypto projects are encouraged to adopt a multi-layered approach to address this gap. This includes:
- Decentralized DNS Alternatives: Projects can integrate solutions like Ethereum Name Service (ENS) or Handshake to minimize reliance on traditional DNS.
- Decentralized File Storage: Hosting frontends on decentralized file storage systems such as IPFS or Arweave enhances security.
- DNSSEC: Implementing DNSSEC strengthens the integrity of DNS records, preventing unauthorized modifications.
- Secure Registrar Accounts: Employing strong authentication methods like multifactor authentication and domain locking protects registrar accounts.
- User Education: Educating users about verifying site authenticity through measures like bookmarking URLs or checking ENS records can reduce phishing attacks.
Bridging the gap between decentralized protocols and centralized interfaces is critical for building trust and security in the DeFi space. As the crypto world evolves, exploring and adopting decentralized solutions for web infrastructure will be paramount in safeguarding the future of DeFi.