AllBridge Malicious DNS Hijack
Notice: This page is a new case study and some aspects have not been fully researched. Some sections may be incomplete or reflect inaccuracies present in initial sources. Please check the References at the bottom for further information and perform your own additional assessment. Please feel free to contribute by adding any missing information or sources you come across. If you are new here, please read General Tutorial on Wikis or Anatomy of a Case Study for help getting started.
About AllBridge
Allbridge, founded in 2021, is a "[c]ross-chain solutions provider" which offers "[t]he most convenient cross-chain transfers"[1][2]. The service offers AllBridge Classic, Allbridge BaaS, and Allbridge Core[1].
"Allbridge is a simple, modern, and reliable way to transfer assets between different networks. It is a bridge between both EVM (Like Ethereum, Polygon, BSC) and non-EVM compatible (like Solana, Terra) blockchains, that aims to cover L2 (like Arbitrum, Optimism) solutions and NFT transfers in the future. Allbridge’s mission is to make the blockchain world borderless and provide a tool to freely move assets between different networks."
"Allbridge Classic is a generalized bridge between EVM and non-EVM compatible blockchains, supporting native and wrapped token transfers."
"Allbridge BaaS is a white-label bridging solution that supports Solana, NEAR, Tron, and all EVM chains. The product offers a simple, customizable UI, a flexible architecture setup, full ownership of smart contracts, and a validator."
"Allbridge Core enables the transfer of value between blockchains by offering cross-chain swaps of native stablecoins. Being messaging protocol agnostic, Allbridge Core connects a variety of EVM and non-EVM networks."
The AllBridge smart contracts had been audited by Hacken and was undergoing an audit by Kudelski Security[3][4][5][6][7]. AllBridge provides a list of all smart contract addresses on their website[8][9].
Twitter:[10]
Medium:[11]
The Reality
While the smart contract operates in a decentralized manner, most users will tend to interact with the contracts using transactions generated by a centralized website. When a domain name is accessed on the internet, a service called DNS is used to point the domain name to an IP address[12].
The AllBridge project used NameCheap for their registrar for their primary website[13]. The procedures at NameCheap were such that support team members were able to override the DNS of the website to point the domain name to a malicious server[14][15][16].
What Happened
After breaching the credentials of a NameCheap customer support agent[17][18], an attacker modified the DNS settings for multiple high profile decentralized protocols with domain names registered there, including Convex Finance, Ribbon Finance, Defi Saver, and AllBridge[19] to point to a phishing server with a similar front-end. This front-end requested approval for a smart contract with the same first and last 4 characters as the official smart contract address of Convex Finance[20], and could drain funds from the wallets of any approving users.
Date | Event | Description |
---|---|---|
March 22nd, 2022 | Domain Vault Announced | The first archived appearance of the "Domain Vault" service on NameCheap which costs $19.88/mo and is still "coming soon"[21]. |
June 20th, 2022 3:05:42 AM | First Malicious Contract Creation | The very first smart contract is created by a wallet controlled from the attacker[22]. Malicious contract 0x65a8...3b2f[23] was created by wallet 0x5622...781a[22][24]. |
June 20th, 2022 9:01:35 AM | First Spoof Contract of AllBridge | The very first smart contract (0xbbbd2ed360dac9f6e005fc6a4398d7d6beabe884) is created[25] that spoofs AllBridge's bridge contract (0xBBbD1BbB4f9b936C3604906D7592A644071dE884)[26]. There is no evidence that anyone interacted with this contract[27]. |
June 20th, 2022 | Domain Vault Launches | The NameCheap "Domain Vault" service now switches from "Get early access" to "Get Domain Vault" with the price remaining at $19.88/mo[28][29]. |
June 21st, 2022 7:34:43 AM MDT | AllBridge New Chapter | AllBridge publishes their "AllBridge: The New Chapter" to their Medium[30] and shares its plans for the second year of its journey via a link on Twitter[31]. Since its mainnet launch in July 2021, over $6.2 billion has been bridged across 14 different networks. The platform aims to add at least five new blockchains by the end of 2022. Allbridge introduces a new bridge architecture focusing on simplicity and one-click cross-chain transfers of native tokens. The new bridge will support stablecoin transfers and prioritize select chains and assets. It emphasizes decentralization and non-custodial solutions, with non-upgradeable contracts and audits for security. The bridge's future roadmap includes the release of an MVP for internal usage in the next few weeks, with the product beta targeted for early autumn. The existing Allbridge V1 will continue to offer versatile cross-chain transfers. The ABR token will retain its utility in governance and rewards systems for both projects. It is unknown whether the DNS breach had yet occurred when this was posted. |
June 21st, 2022 7:13:11 PM | Second Spoof Contract of AllBridge | A second smart contract (0xbbbd89e4cd6c0ac07f164b84546b6439d415e884) is created[32] that spoofs AllBridge's bridge contract (0xBBbD1BbB4f9b936C3604906D7592A644071dE884)[26]. There is no evidence that anyone interacted with this contract[33]. |
June 22nd, 2022 8:29:00 AM | AllBridge Unrelated Tweet | An unrelated tweet to "[c]heck out the cool updates to @MercurialFi's Dynamic Yield Layer."[34] suggests that AllBridge still hadn't been breached yet or was unaware of any attack. |
June 23rd, 2022 3:28:00 AM | Final Spoof Contract of AllBridge | A third smart contract (0xbbbd216c0334a9e4ce7d0acde5189b5548e3e884) is created[35] that spoofs AllBridge's bridge contract (0xBBbD1BbB4f9b936C3604906D7592A644071dE884)[26]. There is also no evidence that anyone interacted with this contract[36]. |
June 23rd, 2022 6:00:00 AM | AllBridge Aware of Breach | AllBridge reports becoming aware that "in some cases bridge was requesting a second spend approval on the EVM chains" at "12:00 UTC"[37] and that it was "successfully solved in an hour after it was discovered"[38]. |
June 23rd, 2022 6:17:41 AM | Final Malicious Contract | The final malicious smart contract is created by the attacker[39]. |
June 23rd, 2022 7:39:00 AM | Revoke Approvals Tweet | AllBridge posts a Twitter notice requesting visitors to "revoke approvals given via our interface in the last 5 hours"[40]. |
June 23rd, 2022 1:02:00 PM | Alexintosh Convex Finance Tweet | The Twitter user @alexintosh reported an abnormal approval requested by the similarly affected Convex Finance website, with a similar but not exact smart contract address[41][42][43]. |
June 23rd, 2022 2:23:00 PM | Please Review Approvals | Convex Finance posts their very first announcement on Twitter, requesting users to "[p]lease review approvals while we evaluate a potential front end issue[44]." |
June 23rd, 2022 3:46:00 PM | Additional Malicious Contracts | Twitter user @HarukoTech describes several malicious contracts which were created against different protocols and that "[t]he attacker seems to be generating similar addresses to well know[n] protocols"[45]. |
June 23rd, 2022 3:54:00 PM | Bret Woods Suggestion | Twitter user Bret Woods (@fewture) posts that "[w]e're seeing hackers create addresses that match the first 4 and last 4 characters". His suggestion is to run the same transaction with "the gas SUPER LOW. Like 5 gwei. Your transaction won't go through, but it will populate on @etherscan where it is much easier to click through and make sure it's doing what you intended to do"[46]. |
June 23rd, 2023 4:33:00 PM | AllBridge Interface Notice | AllBridge provides a new tweet announcing that "[t]he issue has been fixed and it's safe to transfer the assets"[47] and requesting affected users to "revoke the approval they did for the bridge throughout the past week" and announces they've updated their interface with a revoke notice specifically targeting affected wallets[48]. |
June 23rd, 2022 4:46:00 PM | Convex Finance DNS Hijack Post | Similarly affected Convex Finance first posts on Twitter to announce the DNS hijacking. They list 5 addresses which are affected, that investigation is still ongoing, and that the issue is "remediated" for their service[49][50]. |
June 24th, 2022 5:58:00 AM | Interest In Joining Forces | Andriy responds to Convex Finance's tweet, reporting that the AllBridge protocol suffered the same attack, and enquiring about joining forces to find the responsible party[51]. |
June 24th, 2022 6:02:00 AM | Telegram Group Joined | Andriy sends a DM to join a Telegram group with other affected protocols[52][53]. |
June 24th, 2022 6:07:00 AM | Twitter Investigation Results | AllBridge posts on Twitter to announce that the issue was solved within an hour of discovery. They include details of the attack and that they had "mitigated the issue by restoring DNS records and switching to a new DNS provider".[38] They also reported that the "customer support team of [NameCheap] refused to provide [them] any details including date and time of logins into our account (protected by two-factor authentication) and changes to the specified IP address"[54]. |
June 24th, 2022 6:14:00 AM MDT | All Attacks Reported Together | All 4 "DNS exploit[s]" with "illicit vanity contracts" are reported by Twitter user CryptoCondom. He also mentioned that all protocols were using 2FA[55]. |
June 24th, 2022 7:00:00 AM MDT | Attacks Reported With Screenshots | Twitter user Nalin Gupta is the first to publicly provide screenshots of all 4 DNS attacks in a single thread[56]. |
June 24th, 2022 7:24:00 AM MDT | Speculation About Further Domains | Further speculation arises that some other domains may be related[57]. The list referenced are cryptocurrency phishing websites and it does not appear that any of those domains are related to the DNS attack[58]. |
June 24th, 2022 7:29:00 AM | Attacks Reported Together Again | Twitter user Tommy Famous also reports on all 4 DNS attacks in a single thread[59]. |
June 24th, 2022 10:01:00 AM | NameCheap Response | NameCheap's CEO responds on Twitter that they've "traced this down to a specific [customer support] agent that was either hacked or compromised somehow and have removed all access from this agent. This affected a few targeted domains but we will continue investigating."[17] |
June 24th, 2022 10:03:00 AM | Free DomainVault Monitoring | NameCheap's CEO expands the original tweet to say that they "would like to offer [affected services their] Domain Vault service for free and [they] will also place all affected domains on the highest security monitoring"[60]. |
June 24th, 2022 10:32:00 AM MDT | Nothing To Worry About | NameCheap assures via Twitter that "[t]here is nothing to worry about" and they will "keep investigating"[61]. |
June 24th, 2022 11:21:00 AM | NameCheap DomainVault | "Usually we require a pin code from customer. We also monitor all actions as well a monitor a real time vip list. In the end our [customer support] needs to be able to modify to help customers especially when 99% don't understand [DNS]. If you want complete security use [DomainVault]"[62] |
June 24th, 2022 4:16:00 PM | NameCheap Clarifies Hack | NameCheap responds that it "[l]ooks more like [their customer support] person was hacked."[18] |
June 25th, 2022 | Domain Vault Discount | NameCheap lowers the price of their Domain Vault service from $19.88/mo[63] to $1.88/mo[64]. |
June 26th, 2022 5:24:00 AM | Tuvaru_Crypto Affected | Twitter user @Tuvaru_Crypto responds that they "use[d AllBridge the] other day and have been away all weekend and now found [their] wallet drained[65]". |
June 26th, 2022 5:59:00 AM | AllBridge Response To Tuvaru_Crypto | AllBridge responds to request further information from Tuvaru_Crypto[66]. |
July 2nd, 2022 | Price Segmentation | NameCheap decides to offer two different Domain Vault services from "Silver" tier at $1.88/mo[67] to "Titanium" tier at $19.88/mo[68]. |
July 8th, 2022 9:48:40 AM MDT | Kudelski Security Audit | AllBridge reports that an audit by Kudelski Security has been successfully completed. No mention of the DNS exploit is made in this post[7]. "The audit has now been completed, and it determined Allbridge’s contracts to be up to Kudelski’s standards and devoid of significant issues." |
Technical Details
The account of a customer support agent for NameCheap[69] was believed to be hacked[70].
This allowed the attacker to modify the DNS settings for multiple high profile decentralized protocols with domain names registered there, including Convex Finance, Ribbon Finance, Defi Saver, and AllBridge[71]. Because they were making the changes as an official support team member, the attacker was able to override any 2-factor authentication, passwords, and security alert settings in the account[72][73][55].
The domain names were modified to point to a server which displayed a similar website to Convex Finance, and requested the user to provide approval to vanity smart contracts which had the same first and last 4 characters as the official smart contract address of Convex Finance[74].
Instead of function as the standard Convex Finance smart contract would, this new smart contract would enable the attacker to drain all of the user's funds from their wallet.
TBD - Sources need to be merged properly.
Blockchain Analytics
Various notable addresses and transactions from Etherscan for further research/analysis:
[75][76][77][78][79][80][81][82][83]
Total Amount Lost
Cryptonomist reports that as of June 24th, 2023, "the tally of what the hacker managed to steal is about 220 ETH[84]" however no further information is provided as to how that number was determined by Cryptonomist. The blockchain records of the attacker's known wallet show significantly fewer tokens being received in total[85].
The attacker's wallet contain transactions from exploits on multiple protocols. It is unclear which specific attack these belong to and most amounts are less substantial[86].
The total amount lost is unknown.
TBD - Sources need to be merged properly.
Immediate Reactions
On June 23, 2022, the Twitter user @alexintosh reported an abnormal approval requested by the Convex Finance website, with a similar but not exact smart contract address[87][88].
"What is this unverified contract? 0xF403a2c10B0B9feF8f0d4F931df5d86aD187AE31. [The] @ConvexFinance website is asking for approval for that but the correct one is 0xF403C135812408BFbE8713b5A23a04b3D48AAE31. 4 Starting/Ending Characters are the same. DNS spoofing?"
The situation was initially reported and detailed by Twitter users @HarukoTech[89] and Bret Woods (@fewture)[90]. These users provided a complex analysis of the transactions and a guide on a work around to validate transactions on hardware devices by using smaller transaction fees[89][90].
TBD - Sources need to be merged properly.
It was quickly realized that multiple protocols were affected by the exploit. A Telegram group was set up for communication between the different affected protocols[53].
Allbridge shared some warnings to users through Twitter[48][47].
https://twitter.com/Allbridge_io/status/1540100791641456643
https://twitter.com/Allbridge_io/status/1540305846164398081
https://twitter.com/Allbridge_io/status/1540020624579592192
https://twitter.com/Allbridge_io/status/1541028432234299392
It does not appear that any details about the incident were posted on their Medium page[7].
Ultimate Outcome
The NameCheap CEO ultimately responded on Twitter to explain that there was a hacked or compromised customer support agent and all access was removed from them[17]. He also offered completely free Domain Vault monitoring to all affected services[91].
"We've traced this down to a specific [customer support] agent that was either hacked or compromised somehow and have removed all access from this agent. This affected a few targeted domains but we will continue investigating." "In the meantime we would like to offer you our Domain Vault service for free and we will also place all affected domains on the highest security monitoring."
AllBridge posted the completion of an additional audit by Kudelski Security to their Medium on July 8th, roughly a week after the attack. While this may suggest an increased focus on security, the audit would obviously be unrelated to the website front-end or DNS services[7].
Total Amount Recovered
While other services affected by the DNS breach have put significant efforts together, it is unclear whether AllBridge made efforts to compensate impacted users.
The total amount recovered is unknown.
Ongoing Developments
What parts of this case are still remaining to be concluded?
Individual Prevention Policies
There are two policies which apply in this case. See the Prevention Policies for Individuals page for the full list.
Full Prevention
Every approval on Web3 is an opportunity to lose all of the funds present in your wallet. Take the time to review the transaction in full. Fully check over the balance, permissions, and entire address which you are interacting with. Do not trust that your clipboard or any website front-end is guaranteed to provide an accurate address or transaction status. Always perform a test transaction prior to the first high-value transaction in any session.
Limiting Losses
Store the majority of funds offline. By offline, it means that the private key and/or seed phrase is exclusively held by you and not connected to any networked device. Examples of offline storage include paper wallets (seed phrase or key written down and deleted from all electronic media), hardware wallets, steel wallet devices, etc...
Platform Prevention Policies
There are three different policies applying here. See the Prevention Policies for Platforms page for all policies.
Prevention by Namecheap
All wallets, minting functions, and critical infrastructure should be implemented with a multi-signature requirement, with a recommended minimum of 3 signatures required. This means that making important changes or approving spending will require the keys held by at least 3 separate individuals within the organization to approve. The multi-signature should be implemented at the lowest layer possible, all key holders should have security training, and all key holders should be empowered and encouraged to exercise diligence.
The issue ultimately stemmed from a single customer support agent being compromised. A multi-signature requirement on DNS changes would have prevented this scenario entirely. While NameCheap offers advanced protections on their domain names, this service had just launched two days prior to the DNS change, so it was unlikely to be a reasonable expectation that Convex Finance would have already signed up.
Prevention by AllBridge
All points along the communication and supply chain should be inspected for vulnerabilities. Common vulnerability points may include DNS, Discord, and customer information. What steps are required to access and/or modify the component? Do any third party companies or organizations implement a proper multi-signature approach? What additional security options are available?
Regulatory Prevention Policies
There is one policy to prevent the situation, and one to reduce the impact. See the Prevention Policies for Regulators page for the full list of policies.
Full Prevention Through Security Assessments
All platforms should undergo published security and risk assessments by independent third parties. Two assessments are required at founding or major upgrade, one after 3 months, and one every 6 months thereafter. The third parties must not repeat within the past 14 months. A risk assessment needs to include what assets back customer deposits and the risk of default from any third parties being lent to. The security assessment must include ensuring a proper multi-signature wallet, and that all signatories are properly trained. Assessments must be performed on social media, databases, and DNS security.
Reduction Through Education
Create a standard tutorial and quiz for all new cryptocurrency participants, which is required to be completed once per participant. This tutorial and quiz should cover the basics of proper seed phrase protection, strong password generation, secure two-factor authentication, common fraud schemes, how to detect and guard against phishing attacks, how ponzi schemes work, as well as other risks which are unique to the cryptocurrency space.
This could greatly reduce the effectiveness of a similar fraud to affect those such educated.
References
- ↑ 1.0 1.1 Allbridge is the best cross-chain bridging solution provider. - Allbridge Homepage (Feb 7, 2023)
- ↑ What is Allbridge? - Allbridge Docs (Feb 7, 2023)
- ↑ AllBridge Security Overview - AllBridge Docs (Feb 25, 2023)
- ↑ AllBridge Audit Performed by Hacken (Feb 25, 2023)
- ↑ AllBridge Audit by Kudelski Security (Feb 25, 2023)
- ↑ Allbridge Successfully Completes Smart Contract Code Review By Hacken - AllBridge Medium (Feb 25, 2023)
- ↑ 7.0 7.1 7.2 7.3 Kudelski Security Audit Completed - AllBridge Medium (Feb 25, 2023)
- ↑ Bridge Contract Addresses - AllBridge Docs (Feb 25, 2023)
- ↑ Bridge Contract Addresses on May 27th, 2022 - AllBridge Docs Archived (Feb 25, 2023)
- ↑ Allbridge Twitter Profile (Dec 27, 2023)
- ↑ Allbridge Medium Account (Dec 27, 2023)
- ↑ What is DNS? | How DNS works | Cloudflare (Feb 9, 2023)
- ↑ Post Mortem Of Events June 23 (Aug 24, 2022)
- ↑ @ConvexFinance Twitter (Aug 24, 2022)
- ↑ @DevanCollins3 Twitter (Aug 24, 2022)
- ↑ @LefterisJP Twitter (Feb 10, 2023)
- ↑ 17.0 17.1 17.2 Richard Kirkendall - "traced this down to a specific [customer support] agent that was either hacked or compromised" - Twitter (Aug 24, 2022)
- ↑ 18.0 18.1 Richard Kirkendall - "[l]ooks more like [their customer support] person was hacked." - Twitter (Feb 11, 2023)
- ↑ DeFi Dapps DNS Attacked - TrustNodes (Feb 25, 2023)
- ↑ Stefan Patatu - "What are vanity addresses? How can haxxors use them to steal your coins? How can dapps use them to protec you? What can wallets do to protec you? What can you do to protec yourself? A thread on some obscure knowledge, on things you don’t know you don’t know." - Twitter (Aug 23, 2022)
- ↑ Domain Vault Page on Mar 22nd, 2022 - Namecheap (Feb 9, 2023)
- ↑ 22.0 22.1 First Transaction Creating Malicious Contract 0x65a8...3b2f - Etherscan (Feb 23, 2023)
- ↑ Unused Contract 0x65a8...3b2f - Etherscan (Feb 27, 2023)
- ↑ Wallet Address 0x5622...7d1a Who Created 0x65a8...3b2f - Etherscan (Feb 27, 2023)
- ↑ First AllBridge Spoof Contract - Etherscan (Feb 25, 2023)
- ↑ 26.0 26.1 26.2 AllBridge's Bridge Contract - Etherscan (Feb 25, 2023)
- ↑ No Interaction With First Spoof Contract - Etherscan (Feb 25, 2023)
- ↑ Domain Vault Page on June 19th, 2022 - Namecheap (Feb 12, 2023)
- ↑ Domain Vault Page on June 20th, 2022 - Namecheap (Feb 12, 2023)
- ↑ AllBridge: The New Chapter - AllBridge Medium (Feb 25, 2023)
- ↑ @Allbridge_io - "share our vision of the new generation of #crosschain transfers" - Twitter (Feb 25, 2023)
- ↑ Second Spoof Smart Contract Created - Etherscan (Feb 25, 2023)
- ↑ No Interaction with Second Spoof - Etherscan (Feb 25, 2023)
- ↑ @Allbridge_io - "Check out the cool updates to @MercurialFi's Dynamic Yield Layer." - Twitter (Feb 25, 2023)
- ↑ Final Spoof Contract Creation - Etherscan (Feb 25, 2023)
- ↑ No Interactions With Final Spoof - Etherscan (Feb 25, 2023)
- ↑ @Allbridge_io - "in some cases bridge was requesting a second spend approval on the EVM chains" - Twitter (Feb 25, 2023)
- ↑ 38.0 38.1 @Allbridge_io - "we would like to disclose the results of our investigation" - Twitter (Feb 25, 2023)
- ↑ Final Malicious Contract Creation - EtherScan (Feb 23, 2023)
- ↑ @Allbridge_io - "revoke approvals given via our interface in the last 5 hours" - Twitter (Feb 25, 2023)
- ↑ @Alexintosh Twitter (Aug 23, 2022)
- ↑ Contract Addresses - ConvexFinance (Aug 24, 2022)
- ↑ https://en.cryptonomist.ch/2022/06/24/convex-more-info-on-the-hack/ (Jul 2, 2022)
- ↑ @ConvexFinance - "Please review approvals while we evaluate a potential front end issue." - Twitter (Aug 23, 2022)
- ↑ @HarukoTech Twitter (Aug 24, 2022)
- ↑ Bret Woods (@fewture) Guide - Twitter (Feb 22, 2023)
- ↑ 47.0 47.1 Allbridge - "The issue has been fixed and it's safe to transfer the assets. Please verify the address and the contract that is being approved. The official list of contracts can be found here" - Twitter (Dec 27, 2023)
- ↑ 48.0 48.1 @Allbridge_io - "revoke the approval [you] did for the bridge throughout the past week" - Twitter (Feb 25, 2023)
- ↑ @ConvexFinance Twitter (Aug 24, 2022)
- ↑ https://en.cryptonomist.ch/2022/06/24/convex-more-info-on-the-hack/ (Jul 2, 2022)
- ↑ Andriy @avelykyy - "would be happy to to align efforts in finding the responsible party" - Twitter (Feb 27, 2023)
- ↑ Andriy @avelykyy - "DMd" - Twitter (Feb 27, 2023)
- ↑ 53.0 53.1 0xLlam4 - "on TG, can add you into a group with affected protocols" - Twitter (Feb 27, 2023)
- ↑ @Allbridge_io - "[NameCheap] refused to provide us any details including date and time of logins into our account" - Twitter (Feb 25, 2023)
- ↑ 55.0 55.1 CryptoCondom - "A multi-platform DNS exploit appears to have occurred this week w/illicit vanity contracts" - Twitter (Apr 1, 2023)
- ↑ Nalin Gupta - "4 DeFi projects have experienced a DNS hijack attack" - Twitter (Apr 1, 2023)
- ↑ Nalin Gupta - "It does seem some others might be affected tho[ugh]" - Twitter (Apr 1, 2023)
- ↑ idclickthat - "crypto phish" - Twitter (Apr 1, 2023)
- ↑ TommyBeFamous - "So far 4 #ethereum DeFi projects experienced a DNS hijack attack." - Twitter (Mar 24, 2023)
- ↑ @NamecheapCEO - "we would like to offer you our Domain Vault service for free and we will also place all affected domains on the highest security monitoring" - Twitter (Feb 24, 2023)
- ↑ NameCheap - "There is nothing to worry about; we keep investigating" - Twitter (Apr 1, 2023)
- ↑ @NamecheapCEO "If you want complete security use [Domain Vault]" - Twitter (Aug 24, 2022)
- ↑ Domain Vault Page on June 24th, 2022 - Namecheap (Feb 13, 2023)
- ↑ Domain Vault Page on June 25th, 2022 - Namecheap (Feb 13, 2023)
- ↑ @Tuvari_Crypto - "I use this site other day and have been away all weekend and now found my wallet drained" - Twitter (Feb 25, 2023)
- ↑ @Allbridge_io - "send an email ... with a detailed description of this issue" - Twitter (Feb 25, 2023)
- ↑ Domain Vault Page on July 1st, 2022 - Namecheap (Feb 13, 2023)
- ↑ Domain Vault Page on July 2nd, 2022 - Namecheap (Feb 13, 2023)
- ↑ Richard Kirkendall - "traced this down to a specific [customer support] agent that was either hacked or compromised" - Twitter (Aug 24, 2022)
- ↑ Richard Kirkendall - "[l]ooks more like [their customer support] person was hacked." - Twitter (Feb 11, 2023)
- ↑ DeFi Dapps DNS Attacked - TrustNodes (Feb 25, 2024)
- ↑ DeFiSaver - "Same as with others, strong passwords and 2fa were used and we don't recognise security factors on our end that could have led to this." - Twitter (Mar 23, 2023)
- ↑ DefiSaver - "We certainly did use 2FA, as mentioned and as did other teams." - Twitter (Mar 23, 2023)
- ↑ Stefan Patatu - "What are vanity addresses? How can haxxors use them to steal your coins? How can dapps use them to protec you? What can wallets do to protec you? What can you do to protec yourself? A thread on some obscure knowledge, on things you don’t know you don’t know." - Twitter (Aug 23, 2022)
- ↑ Unused Contract 0x65a8...3b2f - Etherscan (Feb 27, 2023)
- ↑ Transaction Creating Contract 0x65a8...3b2f - Etherscan (Feb 27, 2023)
- ↑ Wallet Address 0x5622...7d1a Who Created 0x65a8...3b2f - Etherscan (Feb 27, 2023)
- ↑ Transaction Creating 0xdd49....c82b - Etherscan (Feb 27, 2023)
- ↑ Transactions By Wallet 0x56d3...49c8 (Fake_Phishing5851) - Etherscan (Dec 27, 2023)
- ↑ Address 0x4e12...899a Who Created 0xf403...ae31 - Etherscan (Dec 28, 2023)
- ↑ Vanity Phishing Smart Contract 0xF403...AE31 - Etherscan (Dec 7, 2o23)
- ↑ Address 0xB732...F9Aa (Convex & Ribbon Phisher) - Etherscan (Aug 23, 2022)
- ↑ Convex Finance Tokens Received By Convex & Ribbon Phisher - Etherscan (Dec 28, 2023)
- ↑ Convex: more info on the hack - Cryptonomist (Jul 2, 2022)
- ↑ Token's Received and Sent By The Attacker's Wallet - Etherscan (Feb 23, 2023)
- ↑ Token's Received and Sent By The Attacker's Wallet - Etherscan (Feb 23, 2023)
- ↑ Alexintosh - "What is this unverified contract ?" - Twitter (Aug 23, 2022)
- ↑ Contract Addresses - ConvexFinance (Aug 24, 2022)
- ↑ 89.0 89.1 HarukoTech - "[t]he attacker seems to be generating similar addresses to well know[n] protocols" - Twitter (Aug 24, 2022)
- ↑ 90.0 90.1 Bret Woods (@fewture) - "[w]e're seeing hackers create addresses that match the first 4 and last 4 characters" - Twitter (Feb 22, 2023)
- ↑ @NamecheapCEO - "we would like to offer you our Domain Vault service for free and we will also place all affected domains on the highest security monitoring" - Twitter (Feb 24, 2023)