Express

Two Polygon RPCs Exploited in DNS Hijack Attack; Accounts Quickly Recovered

Tyler Irvin

Summary: Two remote procedure call (RPC) interfaces for Polygon (polygon-rpc.com) and Fantom (rpc.ftm.tools) were exploited in a domain name system (DNS) hijack attack on Friday, according to Polygon chief information security officer Mudit Gupta.  Gupta said “Gandi (customer agent compromise?) transferred control of Ankr’s account to the attacker and that was the root cause of the ...

Two remote procedure call (RPC) interfaces for Polygon (polygon-rpc.com) and Fantom (rpc.ftm.tools) were exploited in a domain name system (DNS) hijack attack on Friday, according to Polygon chief information security officer Mudit Gupta. 

1.png

Gupta said “Gandi (customer agent compromise?) transferred control of Ankr’s account to the attacker and that was the root cause of the DNS Hijack.” 

2.png

He continued saying Ankr was able to act quickly and regained access to the account. So at the time of writing, the accounts were with their correct owners. 

RPC is a set of protocols that allow a client to interact with a blockchain. On the contrary, DNS hijacking is a type of cyber attack where hijackers manipulate queries and redirect users to malicious sites. 

Gupta continued via Twitter saying, “We’ll work closely with Ankr to ensure this does not happen again. 

3.png

Author: Tyler Irvin

Last Update:

Tags: ,,
Link: Two Polygon RPCs Exploited in DNS Hijack Attack; Accounts Quickly Recovered   [Copy]
  • The GENIUS Act & Stablecoin Regulation: BRG's Dominic Zagara on Crypto's Defining ... 13 hours ago
  • Bitcoin Weekly Analysis: Volume-Price Divergence and High-Level Consolidation Anticipat... 4 days ago
  • Will Introduction of the Stablecoin Act Trigger a Financial Tsunami? 5 days ago
  • Trump Just Opened the Floodgates: What Happens When $9 Trillion in Retirement Money Hit... 8 days ago
  • US Crypto Stash Shock: Marshals' Low BTC Count Fuels 'Secret Sale' Debate, Ignites Buyb... 9 days ago
  • You need to login to comment.