{"id":25480,"date":"2022-08-10T00:31:58","date_gmt":"2022-08-10T00:31:58","guid":{"rendered":"http:\/\/egrowonline.com\/?p=25480"},"modified":"2022-08-10T00:31:58","modified_gmt":"2022-08-10T00:31:58","slug":"curve-finance-resolves-site-exploit-directs-users-to-revoke-any-recent-contracts","status":"publish","type":"post","link":"http:\/\/egrowonline.com\/?p=25480","title":{"rendered":"Curve Finance resolves site exploit, directs users to revoke any recent contracts"},"content":{"rendered":"<p> <br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/images.cointelegraph.com\/images\/840_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvNzZkN2JlNWMtNDQ5ZS00NzdhLWJjMDEtYzhkY2M1NDJlM2E3LmpwZw==.jpg\" \/><\/p>\n<div data-v-28d77a7a=\"\">\n<p>On Tuesday, automated market maker Curve Finance took to Twitter to warn users of an exploit on its site. The team behind the protocol noted that the issue, which appeared to be an attack from a malicious actor, was affecting the service\u2019s nameserver and frontend.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Don&#8217;t use <a target=\"_blank\" href=\"https:\/\/t.co\/vOeMYOTq0l\" rel=\"noopener\">https:\/\/t.co\/vOeMYOTq0l<\/a> site &#8211; nameserver is compromised. Investigation is ongoing: likely the NS itself has a problem<\/p>\n<p>\u2014 Curve Finance (@CurveFinance) <a target=\"_blank\" href=\"https:\/\/twitter.com\/CurveFinance\/status\/1557107088962224132?ref_src=twsrc%5Etfw\" rel=\"noopener\">August 9, 2022<\/a><\/p><\/blockquote>\n<p>Curve <a target=\"_blank\" href=\"https:\/\/twitter.com\/CurveFinance\/status\/1557110654284304384\" rel=\"noopener nofollow\">stated<\/a> via Twitter that its exchange \u2014 which is a separate product \u2014 appeared to be unaffected by the attack, as it uses a different domain name system (DNS) provider.\u00a0<\/p>\n<p>However, the issue was quickly addressed by the team. An hour after the initial warning, Curve said it had both found and reverted the issue, directing users who have approved any contracts on Curve in the last few hours to revoke them \u201cimmediately.\u201d\u00a0<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">The issue has been found and reverted. If you have approved any contracts on Curve in the past few hours, please revoke immediately. Please use <a target=\"_blank\" href=\"https:\/\/t.co\/6ZFhcToWoJ\" rel=\"noopener\">https:\/\/t.co\/6ZFhcToWoJ<\/a> for now until the propagation for <a target=\"_blank\" href=\"https:\/\/t.co\/vOeMYOTq0l\" rel=\"noopener\">https:\/\/t.co\/vOeMYOTq0l<\/a> reverts to normal<\/p>\n<p>\u2014 Curve Finance (@CurveFinance) <a target=\"_blank\" href=\"https:\/\/twitter.com\/CurveFinance\/status\/1557116419497672711?ref_src=twsrc%5Etfw\" rel=\"noopener\">August 9, 2022<\/a><\/p><\/blockquote>\n<p>Curve noted that, most likely, the DNS server provider Iwantmyname was hacked, adding that it has subsequently changed its nameserver.\u00a0<\/p>\n<p>A nameserver works like a directory that translates domain names into IP addresses.\u00a0<\/p>\n<p>While the exploit was ongoing, Twitter user\u00a0LefterisJP\u00a0speculated that the alleged attacker had likely utilized DNS spoofing to execute the exploit on the service:<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">It&#8217;s DNS spoofing. Cloned the site, made the DNS point to their ip where the cloned site is deployed and added approval requests to a malicious contract.<\/p>\n<p>\u2014 Lefteris Karapetsas | Hiring for @rotkiapp (@LefterisJP) <a target=\"_blank\" href=\"https:\/\/twitter.com\/LefterisJP\/status\/1557103336083623936?ref_src=twsrc%5Etfw\" rel=\"noopener\">August 9, 2022<\/a><\/p><\/blockquote>\n<p>Other participants in the DeFi space quickly took to Twitter to spread the warning to their own followers, with some noting that the alleged thief appears to have stolen more than $573,000 USD.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Alert to all <a target=\"_blank\" href=\"https:\/\/twitter.com\/CurveFinance?ref_src=twsrc%5Etfw\" rel=\"noopener\">@CurveFinance<\/a> users, their frontend has been compromised!<\/p>\n<p>Do not interact with it until further notice!<\/p>\n<p>It appears around $570k stolen so far <a target=\"_blank\" href=\"https:\/\/twitter.com\/hashtag\/defi?src=hash&amp;ref_src=twsrc%5Etfw\" rel=\"noopener\">#defi<\/a> <a target=\"_blank\" href=\"https:\/\/twitter.com\/hashtag\/crypto?src=hash&amp;ref_src=twsrc%5Etfw\" rel=\"noopener\">#crypto<\/a> <a target=\"_blank\" href=\"https:\/\/twitter.com\/search?q=%24crv&amp;src=ctag&amp;ref_src=twsrc%5Etfw\" rel=\"noopener\">$crv<\/a><\/p>\n<p>\u2014 Assure DeFi (@AssureDefi) <a target=\"_blank\" href=\"https:\/\/twitter.com\/AssureDefi\/status\/1557105692909125634?ref_src=twsrc%5Etfw\" rel=\"noopener\">August 9, 2022<\/a><\/p><\/blockquote>\n<p>Back in July, <a target=\"_blank\" href=\"https:\/\/cointelegraph.com\/news\/3-reasons-why-analysts-are-turning-bullish-on-curve-finance-crv\" rel=\"noopener\">analysts suggested that they wer<\/a><a target=\"_blank\" href=\"https:\/\/cointelegraph.com\/news\/3-reasons-why-analysts-are-turning-bullish-on-curve-finance-crv\" rel=\"noopener\">e favorably eyeing Curve Finance<\/a>, despite the market downturn which continues to affect the larger DeFi space. Among the reasons cited by researchers at Delphi Digital for their bullishness, they specifically called out the platform&#8217;s yield opportunities, the demand for Curve DAO Token (CRV) deposits, and the protocol&#8217;s revenue generation from stablecoin liquidity.<\/p>\n<p>This followed the platform&#8217;s <a target=\"_blank\" href=\"https:\/\/cointelegraph.com\/news\/curve-finance-s-new-release-positions-project-for-amm-takeover\" rel=\"noopener\">release of a new\u00a0\u201calgorithm for exchanging volatile assets\u201d<\/a>\u00a0in June, which\u00a0promised to allow low-slippage swaps between \u201cvolatile\u201d assets.\u00a0These pools use a combination of internal oracles relying on Exponential Moving Averages (EMAs) and a bonding curve model, previously deployed by popular automated market makers such as Uniswap. <\/p>\n<p><em>Update: Added announcement from Curve Finance that the issue has been resolved, pointing to its nameserver as the likely culprit for the exploit.\u00a0<\/em><\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/cointelegraph.com\/news\/breaking-curve-finance-team-warns-users-to-avoid-using-site-until-further-notice\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On Tuesday, automated market maker Curve Finance took to Twitter to warn users of an exploit on its site. The team behind the protocol noted that the issue, which appeared to be an attack from a malicious actor, was affecting the service\u2019s nameserver and frontend. Don&#8217;t use https:\/\/t.co\/vOeMYOTq0l site &#8211; nameserver is compromised. Investigation is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":25481,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[41],"tags":[2155,2223,10350,1802,28,10349,10351,5744,399],"class_list":["post-25480","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ethereum","tag-contracts","tag-curve","tag-directs","tag-exploit","tag-finance","tag-resolves","tag-revoke","tag-site","tag-users"],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"http:\/\/egrowonline.com\/wp-content\/uploads\/2022\/08\/1200_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDgvNzZkN2JlNWMtNDQ5ZS00NzdhLWJjMDEtYzhkY2M1NDJlM2E3LmpwZw.jpg","_links":{"self":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/25480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=25480"}],"version-history":[{"count":1,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/25480\/revisions"}],"predecessor-version":[{"id":25482,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/25480\/revisions\/25482"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/media\/25481"}],"wp:attachment":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=25480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=25480"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=25480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}