On April 17th, a sophisticated social engineering attack compromised eth.limo, a key entry point for users of the Ethereum Name Service (ENS). The attack saw cybercriminals simulate an insider to gain control of the registration at EasyDNS, leading to a temporary suspension of eth.limo services.
How Did the Attack Happen? What Measures Averted Disaster?
During the attack, the perpetrator disguised themselves as a developer from the eth.limo team and successfully managed to initiate a recovery request. This breach led to a rerouting of eth.limo’s domain name servers, first redirecting traffic to Cloudflare followed by Namecheap, causing severe interruptions. However, the team acted swiftly, restoring the account post verification of fraudulent access.
Eth.limo functions as an open-source pipeline facilitating access to content on decentralized networks such as IPFS and Swarm. The attack chiefly targeted the platform’s comprehensive DNS provision, endangering close to two million Ethereum domains.
“On behalf of everyone at eth.limo and the wider Ethereum community, I deeply apologize. ENS has had a special place for us, as EasyDNS was the first registrar to link web2 domain names to ENS, and we’ve been active in this space since 2017.”
Why Is DNSSEC So Important in Cybersecurity?
The situation could have worsened considerably had it not been for the DNS Security Extensions (DNSSEC). This tool uses digital signatures to authenticate DNS data, effectively blocking deceitful entries and preventing users from accessing malicious sites.
The attacker’s incapability of breaching the signing keys ensured that illegitimate server responses were flagged as invalid, thus safeguarding users. As a result, no losses have been reported to date.
Vitalik Buterin, a core figure in Ethereum’s creation, advised users to exercise caution and avoid eth.limo links temporarily, before confirming the restoration of full control.
What Actions Are Being Taken Moving Forward?
Mark Jeftovic, CEO of EasyDNS, acknowledged the attack’s uniqueness in the company’s legacy, being its first social engineering incident. Plans are underway to transition eth.limo to Domainsure—a safer platform devoid of account retrieval options. Although the technicalities of the attack remain undisclosed, future security measures are being enhanced.
The rise of similar assaults highlights pressing concerns. Aerodrome and Velodrome previously suffered from DNS hijacking, and subsequent losses due to weak DNSSEC protocols. Even recently, the likes of Steakhouse Financial were also targeted.
While addressing the current challenges, the incident underscores the central puzzle facing the community—how to diminish dependency on centralized services. Buterin reiterated the necessity for direct routing via decentralized infrastructures like IPFS.
eth.limo’s service is fully operational once more, having returned to its original custodians, safeguarding continuity for its users.



