EasyDNS acknowledged that it suffered a social engineering attack that led to the hijacking of the eth.limo domain.
CoinFeed reported on April 20th that, according to The Block, eth.limo, the ENS-to-Web gateway, suffered a DNS hijacking in the early hours of April 17th (Beijing time). Domain registrar EasyDNS acknowledged being the victim of a social engineering attack, marking the company's first successful social engineering attack against a customer in 28 years. The attacker impersonated a member of the eth.limo team, tricking EasyDNS into performing an account recovery process, and subsequently changed the name servers twice. Because the attacker did not obtain eth.limo's signing key, DNSSEC verification rejected the attacker's changes, and the resolver returned an error rather than a malicious response. eth.limo stated that it is currently unaware of any affected users and will migrate to the EasyDNS associated service, which does not support account recovery.