How a coordinated registrar exploit exposed domain vulnerabilities across two major Web3 platforms, and what it means for DNS security in crypto. Case Study: PancakeSwap & C.R.E.A.M. Finance Incident: DNS Hijacking & Phishing Redirects Date: March 15, 2021 Overview On March 15, 2021, two major DeFi platforms on Binance Smart Chain ... View Post
Our latest blog posts
Inside the Coinbase Phishing Breach: What Every Crypto Platform Must Know About DNS and Insider Risk
On May 15, 2025, Coinbase—the world’s third-largest crypto exchange—revealed a sophisticated phishing breach that could cost up to $400 million in damages. While the technical infrastructure of their blockchain remained intact, the attackers never needed to touch it. Instead, they exploited something far older and more vulnerable: human trust and DNS-linked access ... View Post
A Crypto CTO’s Checklist: 10 Steps to Lock Down Your Domain Security
For many crypto and DeFi platforms, smart contract audits and protocol upgrades are a top priority. But one of the most overlooked and vulnerable areas is the domain and DNS layer — the access point to your entire ecosystem. If attackers compromise your domain, they don’t need to hack your smart contract. They can reroute users to phishing sites, hijack DNS ... View Post
How to Monitor Your Domains for Typosquatting Before Hackers Strike
Attackers don’t need to hack your blockchain to compromise your project. They can copy your domain. By registering lookalike URLs—often just one letter off—they can create fake versions of your site, wallet interface, or login page. These cloned domains are used in phishing attacks to steal funds, capture seed phrases, or redirect your traffic to malicious ... View Post
DNSSEC for Web3: What It Is, Why You Need It, and How to Deploy It
Most crypto and Web3 projects focus their security on smart contracts, wallets, and protocol layers. But there’s a less visible, equally critical point of failure that still relies on Web2 infrastructure: your domain name and DNS. If attackers can spoof your DNS, they don’t need to compromise your code. They can reroute your users, serve malicious front-ends, and ... View Post
Phishing 3.0: How Attackers Use Domain Clones to Trick Your Crypto Users
Crypto moves fast. Security threats move faster. While we focus on strengthening smart contracts, improving multi-sig setups, and decentralizing governance, attackers are bypassing it all by exploiting a simple vulnerability: Your domain. Your DNS. Your users' trust. Phishing 3.0 targets your users, not your blockchain. If your domain security ... View Post