Steakhouse postmortem reveals DNS hijack caused by registrar 2FA bypass

ambcryptoОпубліковано о 2026-04-10Востаннє оновлено о 2026-04-10

Анотація

Steakhouse's postmortem of a 30 March security incident reveals that attackers hijacked its domain through a social engineering attack on its registrar, OVHcloud. The attacker impersonated the account owner, convinced support to disable hardware-based two-factor authentication, and took full control of the account. This allowed them to redirect DNS to a phishing site with a wallet drainer for about four hours. No user funds were lost, as on-chain systems remained secure, and wallet protections quickly detected the fake site. The breach underscores the risk of off-chain infrastructure vulnerabilities and over-reliance on a single registrar. Steakhouse has since migrated registrars, enhanced DNS monitoring, and implemented stricter domain security controls.

A postmortem from Steakhouse has shed new light on a 30 March security incident. Attackers briefly hijacked its domain to serve a phishing site, exposing a critical weakness in off-chain infrastructure rather than on-chain systems.

The team confirmed that the attack stemmed from a successful social engineering attempt targeting its domain registrar, OVHcloud. This allowed the attacker to bypass two-factor authentication and take control of DNS records.

Social engineering led to full account takeover

According to the report, the attacker contacted the registrar’s support desk, impersonated the account owner, and convinced a support agent to remove hardware-based two-factor authentication.

Once access was granted, the attacker rapidly executed a series of automated actions. This included deleting existing security credentials, enrolling new authentication devices, and redirecting DNS records to infrastructure under their control.

This enabled the deployment of a cloned Steakhouse website embedded with a wallet drainer, which remained intermittently accessible for roughly four hours.

Phishing site active, but funds remained safe

Despite the severity of the breach, Steakhouse stated that no user funds were lost and no malicious transactions were confirmed.

The compromise was limited to the domain layer. On-chain vaults and smart contracts, which operate independently of the frontend, were not affected. The protocol emphasized that it holds no admin keys that could access user deposits.

Browser wallet protections from providers such as MetaMask and Phantom quickly flagged the phishing site, while the team issued a public warning within 30 minutes of detecting the incident.

Postmortem highlights vendor risk and single points of failure

The report points to a key failure in Steakhouse’s security assumptions: reliance on a single registrar whose support processes could override hardware-based protections.

The ability to disable two-factor authentication via a phone call, without robust out-of-band verification, effectively turned a credential leak into a full account takeover.

Steakhouse acknowledged that it had not adequately assessed this risk, describing the registrar as a “single point of failure” in its infrastructure.

Off-chain vulnerabilities remain a weak link

The incident underscores a broader issue in crypto security — that strong on-chain protections do not eliminate risks in surrounding infrastructure.

While smart contracts and vaults remained secure, control over DNS allowed the attacker to target users through phishing, a method increasingly common in the ecosystem.

The attack also involved tools consistent with “drainer-as-a-service” operations, highlighting how attackers continue to combine social engineering with ready-made exploit kits.

Security upgrades and next steps

Following the incident, Steakhouse has migrated to a more secure registrar. It implemented continuous DNS monitoring, rotated credentials, and launched a broader review of vendor security practices.

The team also introduced stricter controls for domain management, including hardware key enforcement and registrar-level locks.


Final Summary

  • Steakhouse’s postmortem reveals that a registrar-level 2FA bypass enabled a DNS hijack, exposing users to phishing despite secure on-chain systems.
  • The incident highlights how off-chain infrastructure and vendor security remain critical vulnerabilities in crypto ecosystems.

Пов'язані питання

QWhat was the root cause of the security incident at Steakhouse on March 30th?

AThe root cause was a successful social engineering attack targeting their domain registrar, OVHcloud, which allowed the attacker to bypass two-factor authentication and take control of the DNS records.

QHow did the attacker manage to bypass the two-factor authentication on the registrar account?

AThe attacker impersonated the account owner, contacted the registrar's support desk, and convinced a support agent to remove the hardware-based two-factor authentication protection.

QWere any user funds lost as a result of this DNS hijacking and phishing attack?

ANo, Steakhouse confirmed that no user funds were lost and no malicious transactions were confirmed. The on-chain vaults and smart contracts were not compromised.

QWhat key security failure did the postmortem report identify in Steakhouse's infrastructure?

AThe report identified the reliance on a single registrar, whose support processes could override hardware-based protections, as a critical 'single point of failure' that was not adequately assessed.

QWhat security measures did Steakhouse implement after the incident to prevent future attacks?

ASteakhouse migrated to a more secure registrar, implemented continuous DNS monitoring, rotated credentials, enforced stricter domain management controls (like hardware keys), and launched a broader review of vendor security practices.

Пов'язані матеріали

The Era Has Arrived Where Human Writers Must Prove They Are Not Machines

The article describes an era where AI-generated content is flooding the market, forcing human authors to prove they are not machines. It begins with the example of dozens of AI-written, error-ridden biographies of Henry Kissinger appearing on Amazon within hours of his death, a pattern repeated for other deceased celebrities and even living experts who find fraudulent books under their names. This spam content has exploded, with monthly new book releases on platforms like Amazon reaching 300,000 by late 2025. The issue spans genres, from suspiciously high proportions of AI-written teen romance and self-help books to dangerous, AI-generated foraging guides containing lethal advice. The platforms' automated review systems, designed to catch plagiarism and banned words, are ill-equipped to detect AI-generated text that avoids these pitfalls while being nonsensical or fraudulent. The problem has infiltrated traditional publishing. A major publisher, Hachette, had to recall a bestselling horror novel after AI detection tools suggested 78% of its content was machine-generated. An acclaimed European philosophy book was later revealed to be entirely written by AI under a fake author persona. In response, authors are fighting back. At the 2026 London Book Fair, 10,000 writers published a blank book titled "Don't Steal This Book" containing only their signatures—using emptiness as a protest weapon in an age of AI overproduction. Initiatives like the "Human Author Certification" program have emerged, ironically placing the burden on humans to prove their work is not machine-made. The article warns of a vicious cycle: AI-generated low-quality books pollute the data used to train future AI models, leading to "model collapse" and an ever-worsening flood of digital waste, eroding trust in publishing and devaluing human creativity.

marsbit12 хв тому

The Era Has Arrived Where Human Writers Must Prove They Are Not Machines

marsbit12 хв тому

The King of Blind Date Attire in Korea: How SK Hynix Made a Comeback Against Samsung?

In South Korea's dating scene, SK Hynix employees are now highly sought after, a status shift fueled by the company's astronomical profits and employee bonuses, projected to reach up to 6.1 million RMB per person by 2027. This marks a dramatic reversal for the long-time second-place player in memory semiconductors, which has now surpassed its rival Samsung in annual operating profit. The turnaround story began in 2008 when a struggling Hynix, emerging from bankruptcy restructuring, took a risky bet by agreeing to develop High Bandwidth Memory (HBM) with AMD. At the time, HBM had no clear market beyond high-end graphics cards and was a costly, complex technology. Major players like Samsung, pursuing its own HMC technology, declined. For Hynix, with only memory as its core business, it was a gamble born of necessity. The pivotal moment came in 2012 when SK Group Chairman Chey Tae-won acquired Hynix. Defying industry downturns, he invested heavily in R&D and fabrication, sustaining the HBM project through over a decade of commercial uncertainty and internal challenges. A key break occurred around 2016-2017 when Samsung faced production issues supplying HBM2 for Google's TPU, allowing SK Hynix to gain a crucial foothold in the data center market. The AI explosion post-ChatGPT in 2022 was the catalyst, turning HBM into a critical bottleneck for AI accelerators like NVIDIA's GPUs. By 2025, SK Hynix captured 62% of the global HBM market, leaving Samsung at 17%. For the first time, its annual operating profit exceeded Samsung's. Analysts point to the "innovator's dilemma" to explain Samsung's miss: its vast, successful business portfolio made it risk-averse, preventing an all-in bet on the initially niche HBM technology. In contrast, SK Hynix, as a challenger with its back against the wall, had no choice but to commit fully. The story highlights how Korea's chaebol system allows for ultra-long-term bets beyond quarterly pressures. However, SK Hynix's lead isn't guaranteed. Samsung is aggressively catching up on HBM4, and challenges like customer concentration (heavy reliance on NVIDIA) and technical hurdles in advanced packaging remain. The narrative underscores a market truth: the greatest alpha often comes from betting on uncertain, long-term directions others dismiss, much like HBM in 2008.

marsbit52 хв тому

The King of Blind Date Attire in Korea: How SK Hynix Made a Comeback Against Samsung?

marsbit52 хв тому

Торгівля

Спот
Ф'ючерси
活动图片