

Aerodrome, a decentralized exchange (DEX) on the Base ecosystem, has issued an official warning about a potential DNS hijacking threat. The Aerodrome team announced this on the X platform (formerly Twitter), providing transparent updates on their ongoing security investigation. DNS hijacking is a serious threat in the crypto asset industry—it can directly impact user assets. As a result, Aerodrome has taken swift action.
This incident could affect Aerodrome, one of the leading DEXs on Base, and serves as a key case that heightens security awareness across the decentralized finance (DeFi) ecosystem.
DNS hijacking is an attack in which an adversary illegally alters Domain Name System (DNS) settings to redirect users from legitimate websites to malicious sites under their control. This method is especially dangerous for crypto exchanges and DEXs because users who connect their wallets or enter private keys on a fraudulent site risk losing their assets.
In recent years, several crypto asset platforms have been targeted by DNS hijacking. This has raised vigilance across the industry. Attackers typically compromise DNS provider accounts or modify domain settings at the registrar level to carry out these attacks.
The Aerodrome team immediately began a proactive investigation after detecting signs of potential DNS hijacking. The security team is currently taking the following steps:
Aerodrome is committed to transparency, providing regular updates to the community on the investigation’s progress. These actions are critical for maintaining user trust and minimizing any potential damage.
Until further official notice, Aerodrome strongly advises users to take the following precautions:
Avoid Using the Main Domain: Temporarily refrain from accessing the official website’s main domain. This reduces the risk of being redirected to a malicious site if DNS hijacking occurs.
Check Official Channels for Updates: Get the latest information from Aerodrome’s official X account or verified communication channels. Attackers may create fake official accounts, so always confirm authenticity.
Be Cautious With Wallet Connections: Avoid new wallet connections and large transactions until the investigation is complete. Existing positions are safe, but new actions could introduce additional risk.
Verify Bookmarks and URLs: Even when using browser bookmarks, always check that the domain in the URL bar is correct.
Aerodrome’s security investigation is ongoing. The team is working to fully understand the situation and implement all necessary countermeasures. In past cases, DNS hijacking investigations and resolutions have taken from several days to several weeks.
This incident highlights the critical importance of security infrastructure on DeFi platforms. The entire Base ecosystem can learn from this event and reinforce its security measures. Aerodrome is expected to report on the investigation results and remediation efforts with full transparency.
Users should continue to monitor updates from official channels and follow security best practices.
DNS hijacking is a cybersecurity threat where the Domain Name System is compromised, redirecting users to fraudulent sites. Aerodrome is currently investigating a potential DNS hijacking incident. Users should avoid using the official domain until security measures are fully implemented.
DNS vulnerabilities in the Aerodrome protocol can allow domain tampering and redirect users to malicious sites. This can lead to theft of sensitive information or funds. Deploying DNSSEC technology is essential for protection.
Use a trusted DNS service, enable the DoH protocol, regularly review DNS records, and set up multi-factor authentication. Implementing HTTPS and configuring host files are also recommended.
DNS hijacking can redirect users to fake websites, leading to private key leaks and asset theft. Users may lose access to official platforms and face phishing attacks, directly threatening digital asset security.
Aerodrome and Base officials are investigating the potential DNS hijacking incident. Users should avoid using the primary domain until the investigation concludes.











