

In late November, a sophisticated DNS hijacking attack targeted two prominent decentralized exchange platforms, Aerodrome Finance and Velodrome Finance, redirecting unsuspecting users to malicious phishing websites. According to reports from Bitcoin.com, this security breach resulted in losses exceeding 1 million USD. The attack exploited vulnerabilities in the Domain Name System infrastructure, demonstrating the ongoing security challenges faced by decentralized finance platforms despite their technological sophistication.
The incident serves as a stark reminder that even decentralized platforms can be vulnerable to traditional web infrastructure attacks, highlighting the importance of multi-layered security approaches in the cryptocurrency ecosystem.
DNS hijacking, also known as DNS redirection, is a type of malicious attack where the attacker intercepts DNS queries and provides false IP addresses to redirect users to fraudulent websites. In this particular case, when users attempted to access the legitimate Aerodrome Finance and Velodrome Finance platforms through their standard web browsers, the compromised DNS servers redirected them to carefully crafted phishing sites that mimicked the authentic platforms.
These phishing sites were designed to appear identical to the genuine platforms, tricking users into connecting their wallets and authorizing transactions that ultimately transferred funds to the attackers' addresses. The sophistication of this attack lies in its ability to bypass many traditional security measures, as users believed they were accessing the legitimate platforms through their familiar URLs.
The financial impact of this DNS hijacking attack exceeded 1 million USD in stolen cryptocurrency assets. However, the damage extended beyond immediate monetary losses. User trust in these platforms was temporarily shaken, and the incident raised broader questions about the security of decentralized finance infrastructure.
It's important to note that the attack specifically targeted the web interface layer rather than the underlying blockchain technology. The vulnerability existed in the centralized DNS infrastructure that users rely upon to access these decentralized platforms, illustrating the paradox of decentralized applications still depending on centralized web technologies for user access.
Both Aerodrome Finance and Velodrome Finance responded swiftly to the security incident, issuing official statements to reassure their user communities. Critically, both platforms confirmed that their smart contracts—the core blockchain-based components of their decentralized exchanges—remained completely unaffected by the attack. The funds stored in these smart contracts were never at risk, as the attack only compromised the web-based access layer.
This distinction is crucial for understanding the nature of the threat. The blockchain infrastructure itself demonstrated its security and resilience, while the vulnerability existed in the traditional web infrastructure used to interface with these decentralized systems. The platforms worked quickly to regain control of their DNS records and restore normal operations.
In response to the incident, both platforms issued important security guidance to their user communities. The primary recommendation emphasized avoiding reliance on centralized URLs for accessing decentralized applications. Instead, users were strongly encouraged to utilize ENS (Ethereum Name Service) mirrors, which provide a more decentralized and secure method of accessing blockchain-based platforms.
ENS mirrors offer several advantages over traditional DNS-based access. They operate on blockchain infrastructure, making them resistant to the type of hijacking attack that affected the centralized DNS system. Additionally, users were advised to verify website authenticity through multiple channels, bookmark verified addresses, and remain vigilant for any unusual behavior or interface changes when accessing their accounts.
Other recommended security practices include using hardware wallets for transaction signing, carefully reviewing all transaction details before approval, and maintaining awareness of official platform communication channels for security alerts.
The timing of this attack proved particularly notable, occurring just days before a proposed merger between the two affected platforms, which would consolidate them under the Aero token. This proximity raised questions about whether the attack was opportunistically timed to exploit the period of transition and potentially heightened user activity around the merger announcement.
The incident also reflects broader trends in cryptocurrency security threats. As direct attacks on blockchain protocols become increasingly difficult due to robust cryptographic protections, malicious actors are shifting their focus to peripheral infrastructure and social engineering tactics. DNS hijacking represents this evolution in attack strategies, targeting the weakest links in the user access chain rather than the blockchain technology itself.
This event underscores the ongoing need for the cryptocurrency industry to address security holistically, considering not just the blockchain layer but also the entire user experience infrastructure. As decentralized finance continues to grow, developing more secure and truly decentralized access methods will be crucial for protecting users and maintaining trust in these innovative financial platforms.
DNS hijacking occurs when attackers intercept and redirect domain name lookups to fraudulent IP addresses. Users are then directed to fake websites instead of legitimate ones. This is accomplished by compromising DNS servers or modifying network routing configurations to redirect traffic maliciously.
Attackers used social engineering to compromise domain registrar accounts, gaining control of Aerodrome and Velodrome's domains. They redirected users to phishing sites, resulting in user losses of approximately 250,000 USD.
DNS hijacking redirects users to fraudulent sites, compromising personal information and wallet security. Users may lose access to legitimate platforms and fall victim to phishing scams that steal private keys and funds.
Verify the exact URL spelling and domain name carefully. Look for HTTPS protocol with a valid SSL certificate. Check for official verification badges and logos. Be cautious of urgent requests for personal information. Visit official sites only through bookmarks or direct searches, never through suspicious links.
Immediately change your router password and disable remote management. Enable firewall protection, update firmware regularly, and verify URLs before accessing wallets. Monitor for suspicious activities and use hardware wallets for sensitive transactions to ensure asset security.
Switch to secure public DNS servers like Google's 8.8.8.8 and 8.8.4.4, or Cloudflare's 1.1.1.1. Change your device's DNS settings in network preferences to use these trusted servers instead of your ISP's default, reducing the risk of DNS request interception and redirection to phishing sites.
No, user assets remain safe in this attack. The attacker transferred approximately 3.9 million dollars, but user balances were not affected or stolen.
Aerodrome and Velodrome have issued security alerts, updated DNS records, and recommended users verify official domains directly. They coordinate with security partners to identify and block phishing attempts while urging community vigilance.
Check for suspicious URLs, spelling errors, and missing security certificates. Verify site legitimacy through official channels. Report phishing sites to Google Safe Browsing, PhishTank, hosting providers, or anti-phishing organizations. Document evidence before reporting.
DNS hijacking redirects users by altering DNS records, while domain hijacking steals domain control itself. DNS hijacking targets DNS servers, domain hijacking targets domain ownership. Other attacks like phishing use social engineering. DNS hijacking uniquely intercepts traffic at the infrastructure level.











