A DNS attack rerouted Aerodrome's frontend to a drainer.
↓ Blockaid detected the compromise in real time and prevented ~$3.5M in theft.
On November 21, Aerodrome and Velodrome experienced a DNS attack that modified the SOA, NS, and A records for “aerodrome . finance” and “velodrome . finance”.
The changes redirected both domains to a cloned frontend serving Eleven Drainer code.

Blockaid was the first to detect the compromise, report it to Aerodrome, and inform its Customer Data Network, based on the UTC timeline below:
→ 20:11 DNS records changed, redirecting both domains to a spoofed UI
→ 21:31 Blockaid detects malicious transactions across its customer network
→ 21:32 Blockaid classified the domain as malicious across its customer network
→ 22:07 First Aerodrome user report arrives, pointing to malicious code on the domain
→ 22:40 Nameservers are replaced as remediation begins
A great example of Blockaid’s Customer Data Network effect:
Once the domain was classified as malicious, partnered wallets, including @MetaMask, @coinbase, @Ledger, @Trezor, @rainbowdotme, and @FireblocksHQ, immediately surfaced warnings to users engaging with @AerodromeFi.

During the incident, Blockaid surfaced early warnings to 408 end users connecting their wallet to Aerodrome’s frontend and another 491 end users actively signing transactions, preventing roughly $3.5M in funds from being drained.
Blockaid traced the attacker’s onchain behavior, identifying nine addresses tied to $700K in stolen funds. These losses came from wallet end users outside of our network, who we could not inform.

Incidents like this show how much risk lives outside the protocol. Frontend and DNS layers need the same level of detection and protection.
1,173
10
本頁面內容由第三方提供。除非另有說明,OKX 不是所引用文章的作者,也不對此類材料主張任何版權。該內容僅供參考,並不代表 OKX 觀點,不作為任何形式的認可,也不應被視為投資建議或購買或出售數字資產的招攬。在使用生成式人工智能提供摘要或其他信息的情況下,此類人工智能生成的內容可能不準確或不一致。請閱讀鏈接文章,瞭解更多詳情和信息。OKX 不對第三方網站上的內容負責。包含穩定幣、NFTs 等在內的數字資產涉及較高程度的風險,其價值可能會產生較大波動。請根據自身財務狀況,仔細考慮交易或持有數字資產是否適合您。


