Tweet thread by Spirit Swap
Primary Source ↗Incident Details
In what is beginning to become a pattern, SpiritSwap was the latest project where attackers gained control of their domain and were able to modify the frontend to divert funds to a wallet under their own control. SpiritSwap tweeted that the “the hacker has managed to exploit Godaddy” (unlikely — it was more likely a case of stolen credentials) and swap out the recipient address.The hacker only managed to exfiltrate around $18,000 before being discovered, and SpiritSwap shut down their swapping through their router to prevent the attack from continuing.MM.Finance suffered a similar attack earlier in the month, losing $2 million after an attacker gained control of the domain and swapped in their own address to siphon funds.
Total loss estimated at $18,000.
Technical Details
- Initial Attack Vector
- DNS hijacking / domain takeover (front-end compromise)
- Vendor / Product
- SpiritSwap domain hijacking attack
Timeline
- 2022-05-13 Breach occurred
- 2022-05-13 Publicly disclosed