CoW Swap Pauses Protocol After DNS Hijacking Drains at Least $1M in User Funds

COW-2,15%
ETH1,94%
GNO3,32%

Gate News message, April 15 — CoW Swap suspended its protocol yesterday (April 14) after attackers hijacked the DNS records of swap.cow.fi at 14:54 UTC, redirecting users to a malicious frontend that drained at least $1 million in crypto assets within three hours. Cow DAO issued a public warning at 15:41 UTC and confirmed the DNS compromise at 16:24 UTC.

On-chain data shows the attack intercepted at least $1 million, including 219 ETH from a single wallet. The exploit targeted the domain at the registrar level, cloning the interface to trick users into approving wallet-draining transactions. Smart contracts and backend systems were not compromised, but the protocol remained offline as a precaution.

Cow DAO instructed affected users at 16:33 UTC to revoke token approvals via revoke.cash. Security firm Blockaid flagged the malicious domains during the incident. CoW Swap, part of the Gnosis ecosystem, uses batch auctions and Coincidence of Wants matching to process trades. No timeline for service restoration has been announced.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Rhea Finance Suffers a $18.4 Million Loss After an Oracle Attack: ZachXBT Warns, Tether Freezes 4.34 Million USDT, and the Attacker Returns Some Funds

Rhea Finance suffered an oracle manipulation attack on the NEAR Protocol, with losses reaching $18.4 million—double the initial estimate. The attacker manipulated the pricing of a fake token, causing collateral valuations to be incorrect. Tether froze about $4.34 million in USDT; the attacker returned roughly $3.5 million. To date, more than $7.8 million has been recovered, highlighting the importance of oracle security.

ChainNewsAbmedia22m ago

eth.limo DNS Under Attack, Vitalik Urges Users to Pause Access and Switch to IPFS

Vitalik Buterin warned on April 18 about an attack on the DNS registrar for eth.limo, urging users to avoid accessing vitalik.eth.limo and related pages. He recommended using IPFS as an alternative until the issue is resolved.

GateNews30m ago

Sanctioned Exchange Grinex Hit by $13.7M Hack; Blames Foreign Intelligence Services

Grinex, a sanctioned crypto-ruble exchange, has halted operations due to a cyberattack that stole over $13.74 million in USDT. The attack is believed to involve state-level actors aiming to destabilize Russia's financial system. Grinex is cooperating with law enforcement but has no timeline for resuming services.

Coinpedia8h ago

Figure Faces Short Seller Accusations Over Blockchain Integration Claims; FIGR Stock Down 53% From January Peak

Figure Technology Solutions faced allegations from Morpheus Research of overstating its blockchain technology use, resulting in a significant drop in share prices. Figure defended its operations, highlighting its digital asset features and strong performance metrics.

GateNews15h ago

Houston Crypto Fraudster Sentenced to 23 Years for $20M Meta-1 Coin Scam

Robert Dunlap, a Houston entrepreneur, was sentenced to 23 years in prison for a $20 million cryptocurrency fraud involving fake assets and deceptive practices, impacting over 1,000 victims. His case reflects a broader rise in crypto-related cybercrimes.

GateNews20h ago

SlowMist Warns of Active Phishing Attack Using Fake 'Harmony Voice' Software

SlowMist's security team has warned of a social engineering campaign targeting cryptocurrency users. Fraudsters are posing as project partners to trick users into downloading a malicious application disguised as a translation tool. Users are advised to verify software authenticity.

GateNews21h ago
Comment
0/400
No comments