Curve Finance front end UI compromised following DNS hack – users advised to exercise caution
Over $500k has been stolen from Curve finance as the front end is compromised through an attack taking control of its nameserver.
Update: Curve has announced the issue has been fixed and says it is safe to use again. Follow up article can be found here.
The issue has been found and reverted. If you have approved any contracts on Curve in the past few hours, please revoke immediately. Please use https://t.co/6ZFhcToWoJ for now until the propagation for https://t.co/vOeMYOTq0l reverts to normal
— Curve Finance (@CurveFinance) August 9, 2022
Samczsun, a researcher at Paradigm, reported that the Curve Finance front end had been compromised, with over $500k stolen within a matter of minutes.
🚨🚨🚨@CurveFinance frontend is compromised, do not use it until further notice!
— samczsun (@samczsun) August 9, 2022
The official Curve Finance Twitter had confirmed the news stating:
Don't use the frontend yet. Investigating! https://t.co/8kmtpGsLQQ
— Curve Finance (@CurveFinance) August 9, 2022
The founder of Rotkiapp, Lefteris Karapetsas, theorized that “It’s DNS spoofing. Cloned the site, made the DNS point to their ip where the cloned site is deployed and added approval requests to a malicious contract.” Curve retweeted the theory in apparent support before following up with a further announcement;
Don't use https://t.co/vOeMYOTq0l site – nameserver is compromised. Investigation is ongoing: likely the NS itself has a problem
— Curve Finance (@CurveFinance) August 9, 2022