eth.limo domain hijacked; EasyDNS admits first social engineering attack in 28 years

ENS2,91%
AERO3,32%
AR1,09%

eth.limo域名劫持

The eth.limo gateway from ENS to the Web was hit by DNS hijacking in the evening of April 17, and subsequent analysis showed that the attacker impersonated a member of the eth.limo team to successfully trick the domain registrar EasyDNS into executing an account recovery process. EasyDNS CEO Mark Jeftovic publicly admitted that this was the first successful social engineering attack against customers in the company’s 28-year history.

Attack timeline: Account recovery process triggered by deception

According to the post-incident analysis and an EasyDNS official blog post, the timeline of the entire attack is as follows: at 7:07 PM Eastern Time on April 17, the attacker impersonated a member of the eth.limo team and tricked EasyDNS into executing the account recovery process. At 2:23 AM Eastern Time on April 18, the attacker switched the eth.limo domain name servers to Cloudflare, triggering an automatic downtime alert that woke up the eth.limo team; at 3:57 AM, the name servers were switched again to Namecheap; and by 7:49 AM, EasyDNS restored the eth.limo team’s account access permissions.

During the incident, Vitalik Buterin warned users to avoid using all eth.limo links and instead access the content directly via IPFS. He confirmed on Saturday that the issue had been fully resolved.

How DNSSEC became the final line of defense

The attacker attempted to redirect traffic to phishing infrastructure through eth.limo’s wildcard domain (*.eth.limo), with a potential impact scope covering more than 2 million ENS .eth domains, including Vitalik Buterin’s personal blog vitalik.eth.limo.

However, because the attacker never obtained the DNSSEC signing key for eth.limo, when the resolver compared the attacker’s new name server response with the legitimate DS records cached from the parent zone, the trust chain broke. The resolver returned a SERVFAIL error instead of a malicious redirect. “DNSSEC may have reduced the scope of the hijacking incident’s impact. At this time, we have not found any impact on users,” the eth.limo team said in its report.

Systemic trend of social engineering attacks against crypto front ends

This incident is the latest case in a recent series of attacks against crypto front ends at the domain registrar level: in November 2024, the attacker hijacked the NameSilo account and stripped DNSSEC, causing users of the DEX Aerodrome and Velodrome to lose more than $700k; on March 30 of this year, the OVH customer support for Steakhouse Financial was targeted by a social engineering attack that tricked it into disabling account two-factor authentication, briefly bringing the cloned website online; later the same month, the revenue platform Neutrl also suffered a similar incident.

Ironically, eth.limo had previously provided emergency support in the November Aerodrome hijacking event and was widely seen as a top decentralized failover option during DeFi front-end downtime. After the incident was resolved, eth.limo planned to migrate to Domainsure under EasyDNS—this service is for enterprise customers and does not provide any account recovery mechanism, fundamentally eliminating the entry point for social engineering attacks of this kind.

Vitalik has long argued that Ethereum’s reliance on centralized DNS resolution is a “step back in trust,” and has urged developers to guide users in 2026 to a path that accesses IPFS directly.

Frequently asked questions

What is eth.limo, and what role does it play in the Ethereum ecosystem?

eth.limo is a free, open-source reverse proxy that lets users add “.limo” after any .eth domain and access ENS-related content deployed on IPFS, Arweave, or Swarm through a standard browser. Its wildcard DNS records cover roughly 2 million .eth domains registered via ENS, making it one of the most widely used Web2 access bridges in the ENS ecosystem.

How did DNSSEC prevent this attack from causing user losses?

DNSSEC encrypts and digitally signs DNS records, allowing validating resolvers to reject responses that are unsigned or signed incorrectly. Because the attacker never obtained the DNSSEC signing key for eth.limo, their malicious changes to the domain name servers could not pass trust-chain validation. The resolver returned a SERVFAIL error instead of a malicious redirect, effectively stopping a potential large-scale phishing attack.

What warnings does this incident offer for ENS ecosystem and DeFi front-end security?

This incident once again confirms the most fundamental security contradiction for crypto front ends: smart contracts are decentralized, but the Web2 domain layer that users access still relies on centralized domain registrars, and the latter’s customer support processes are a weak link. The design of Domainsure “does not support account recovery” is one of the most direct defensive measures currently in the industry against this type of social engineering attack, but it also means that account holders must ensure secure backup of their private keys.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Bitmine bought 101627 ETH last week! Tom Lee: Crypto winter is nearing its end

Bitmine Immersion Technologies (BMNR) announced on April 20 that it purchased 101,627 Ethereum (ETH) last week, the largest week-over-week purchase since 2026, bringing its total ETH holdings to 4,976,000. Bitmine chairman Tom Lee said publicly that the crypto winter is closer to ending than the market expects.

MarketWhisper23m ago

Arbitrum emergency freezes KelpDAO hacker’s 30,766 ETH

Arbitrum’s Security Committee announced on April 21 that it has taken emergency action to freeze 30,766 ETH on the Arbitrum One chain related to the KelpDAO hacker attack. With assistance from law enforcement agencies, the Security Committee confirmed the attacker’s identity and devised a technical plan to transfer the funds to an interim freeze wallet without affecting any other chain state or Arbitrum users.

MarketWhisper30m ago

4-Week-Old Wallet Withdraws 80,000 ETH Worth $184.7M from Centralized Exchange

Gate News message, a wallet created four weeks ago has withdrawn 80,000 ETH valued at $184.7 million from a centralized exchange. The wallet address is 0x32E11a20337ebC79Abd0EEab2d91BAFBd9591149.

GateNews42m ago

KelpDAO Exploiter Burns $70.94M Worth of ETH on Arbitrum

Gate News message, the KelpDAO exploiter has burned 30,766 ETH valued at $70.94 million on Arbitrum network.

GateNews1h ago

Curve Founder: DeFi’s single point of failure harms the industry; urges Ethereum to set security standards

Curve Finance founder Michael Egorov published a long post on the X platform on April 21, 2026, pointing out that several preventable attacks have recently occurred in the DeFi space. He said the root cause is centralized failure points that are harming the entire DeFi industry. In the post, Egorov proposed to the Ethereum Foundation that it develop principles, rules, and recommendations for building DeFi security.

MarketWhisper2h ago

Ethereum Spot ETFs Post $67.77M Net Inflows, BlackRock ETHA Leads

Ethereum spot ETFs experienced significant net inflows of $67.77 million on April 20, led by BlackRock's ETHA. In contrast, Grayscale's ETHE and other products faced notable outflows.

GateNews3h ago
Comment
0/400
No comments