{"id":33041,"date":"2022-08-10T03:24:12","date_gmt":"2022-08-10T07:24:12","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=33041"},"modified":"2022-08-10T15:25:25","modified_gmt":"2022-08-10T19:25:25","slug":"curve-finance-fixes-site-bug-tells-users-to-cancel-recent-contracts","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/curve-finance-fixes-site-bug-tells-users-to-cancel-recent-contracts\/","title":{"rendered":"Curve Finance fixes site bug, tells users to cancel recent contracts"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\" id=\"h-users-claim-that-over-573-000-usd-was-stolen-as-a-result-of-an-exploit-of-the-curve-finance-website-s-front-end\">Users claim that over $573,000 USD was stolen as a result of an exploit of the Curve Finance website's front end.<\/h5>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/crv-1024x576.jpg\" alt=\"\" class=\"wp-image-33094\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/crv-1024x576.jpg 1024w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/crv-300x169.jpg 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/crv-768x432.jpg 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/crv-1536x864.jpg 1536w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/crv-150x84.jpg 150w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/crv-750x422.jpg 750w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/crv-1140x641.jpg 1140w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/crv.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>Curve Finance fixes site bug, tells users to cancel recent contracts<\/figcaption><\/figure>\n\n\n\n<p>Automated market creator<a href=\"https:\/\/coinscreed.com\/staging\/heres-how-terras-ust-drives-a-20-drop-in-defi-token-curve-crv.html\" target=\"_blank\" rel=\"noreferrer noopener\"> Curve Finance<\/a> used Twitter on Tuesday to alert users of a vulnerability on its platform. The protocol's developers observed that the problem, which seemed to be a malicious actor's attack, was affecting the service's nameserver and frontend.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"embed-twitter\"><blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Don&#39;t use <a href=\"https:\/\/t.co\/vOeMYOTq0l\" target=\"_blank\">https:\/\/t.co\/vOeMYOTq0l<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a> site &#8211; nameserver is compromised. Investigation is ongoing: likely the NS itself has a problem<\/p>&mdash; Curve Finance (@CurveFinance) <a href=\"https:\/\/twitter.com\/CurveFinance\/status\/1557107088962224132?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">August 9, 2022<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/div>\n<\/div><\/figure>\n\n\n\n<p>Using a different domain name system (DNS) provider<a href=\"https:\/\/www.google.com\/search?q=Curve+Finance+fixes+site+bug%2C+tells+users+to+cancel+recent+contracts&oq=Curve+Finance+fixes+site+bug%2C+tells+users+to+cancel+recent+contracts&aqs=chrome..69i57.902j0j9&sourceid=chrome&ie=UTF-8\" target=\"_blank\" rel=\"noreferrer noopener\">, Curve<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> said through Twitter that their exchange, a separate product, appeared to be untouched by the hack.<\/p>\n\n\n\n<p>But the team moved fast to solve the problem. After issuing the original warning, Curve announced that it had discovered and fixed the problem and advised customers to &#8220;immediately&#8221; withdraw any contracts they have just approved.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"embed-twitter\"><blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">The issue has been found and reverted. If you have approved any contracts on Curve in the past few hours, please revoke immediately. Please use <a href=\"https:\/\/t.co\/6ZFhcToWoJ\" target=\"_blank\">https:\/\/t.co\/6ZFhcToWoJ<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> for now until the propagation for <a href=\"https:\/\/t.co\/vOeMYOTq0l\" target=\"_blank\">https:\/\/t.co\/vOeMYOTq0l<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a> reverts to normal<\/p>&mdash; Curve Finance (@CurveFinance) <a href=\"https:\/\/twitter.com\/CurveFinance\/status\/1557116419497672711?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">August 9, 2022<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/div>\n<\/div><\/figure>\n\n\n\n<p>Iwantmyname, a provider of DNS servers, was most likely compromised, according to<a href=\"https:\/\/coinscreed.com\/staging\/curve-token-crv-soars-17-after-terras-4pool-launch.html\" target=\"_blank\" rel=\"noreferrer noopener\"> Curve<\/a>, who also stated that the company has since changed its nameserver.<\/p>\n\n\n\n<p>Like a directory, a nameserver converts domain names into IP addresses.<\/p>\n\n\n\n<p>Twitter user LefterisJP predicted that the suspected attacker had most likely used DNS spoofing to carry out the exploit on the service while it was still active:<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"embed-twitter\"><blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">looks as usual to me? how can one tell it is compromised? <a href=\"https:\/\/t.co\/79205EZeZW\" target=\"_blank\">pic.twitter.com\/79205EZeZW<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/p>&mdash; manner_teacher (@manner_teacher) <a href=\"https:\/\/twitter.com\/manner_teacher\/status\/1557100971888631813?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">August 9, 2022<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/div>\n<\/div><\/figure>\n\n\n\n<p>The alert was promptly shared on Twitter by other DeFi industry members, some of whom noted that the alleged theft appeared to have totaled more than $573,000 USD.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"embed-twitter\"><blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Alert to all <a href=\"https:\/\/twitter.com\/CurveFinance?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">@CurveFinance<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> users, their frontend has been compromised!<br><br>Do not interact with it until further notice!<br><br>It appears around $570k stolen so far \ud83d\ude44<a href=\"https:\/\/twitter.com\/hashtag\/defi?src=hash&ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#defi<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> <a href=\"https:\/\/twitter.com\/hashtag\/crypto?src=hash&ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#crypto<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> <a href=\"https:\/\/twitter.com\/search?q=%24crv&src=ctag&ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">$crv<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/p>&mdash; Assure DeFi (@AssureDefi) <a href=\"https:\/\/twitter.com\/AssureDefi\/status\/1557105692909125634?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">August 9, 2022<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/div>\n<\/div><\/figure>\n\n\n\n<p>Analysts said they were favorably evaluating Curve Finance back in July, despite the market downturn that is still having an impact on the bigger<a href=\"https:\/\/coinscreed.com\/staging\/ripple-exec-says-defi-needs-killer-app-to-advance-to-next-level.html\" target=\"_blank\" rel=\"noreferrer noopener\"> DeFi business<\/a>. Researchers at Delphi Digital especially mentioned the platform's yield potential, the demand for Curve DAO Token (CRV) deposits, and the protocol's revenue creation via stablecoin liquidity as grounds for their optimism.<\/p>\n\n\n\n<p>This came after the platform's June publication of a brand-new &#8220;algorithm for exchanging volatile assets&#8221; that promised to enable low-slippage swaps between &#8220;volatile&#8221; assets. These pools combine a bonding curve approach, previously used by well-known automated market makers like Uniswap, with internal oracles that rely on exponential moving averages (EMAs).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Users claim that over $573,000 USD was stolen as a result of an exploit of the Curve Finance website&#8217;s front end. Automated market creator Curve Finance used Twitter on Tuesday to alert users of a vulnerability on its platform. The protocol&#8217;s developers observed that the problem, which seemed to be a malicious actor&#8217;s attack, was [&hellip;]<\/p>\n","protected":false},"author":38,"featured_media":33094,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[21],"tags":[11067],"class_list":["post-33041","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-curve-finance"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/08\/crv.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/33041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=33041"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/33041\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/33094"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=33041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=33041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=33041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}