Resonance Security unveils new tool for web3 websites to combat DNS manipulation

Blockchain security firm Resonance Security is launching a new tool to help web3 protocols defend against DNS and CDN manipulation.

Resonance Security has developed a new tool designed to take continuous snapshots of the web state of crypto websites, including their DNS records and scripts, in order to detect unauthorized changes in real time.

According to a press release shared with Crypto.news, the new tool, called “Harmony,” will allow crypto investors to detect CDN hijackings and DNS manipulations early on, tactics that are increasingly being used by malicious actors to create fraudulent websites and steal personal information.

Charles Dray, CEO of Resonance Security, says the solution will help projects avoid DNS hijackings and “prevent their sensitive assets from being exposed to black hat hacker groups.”

“Our goal is to keep any organization’s cybersecurity strategies in line with the ever-evolving cyberattacks.”

Charles Dray

DNS hijacking has emerged as a preferred attack vector among cybercriminals in recent times. Recent incidents involving compromised domains, such as those affecting the Celer Network and Compound Finance protocols, highlight the vulnerability of crypto websites to such attacks. While the full scope of the attack remains unclear, security experts believe that around 11 platforms, including Pendle Finance, Polymarket, and THORChain, could still be potential targets.

Paradigm’s anonymous researcher, who goes by the pseudonym “samczsun,” suggested that the attacks were believed to originate from Google Domains accounts associated with these protocols. Last year, Squarespace acquired Google Domains in a deal valued at $180 million.

Resonance Security says the company’s latest solution uses artificial intelligence to evaluate results and eliminate false positives, “minimizing investigation time for both the customer and Resonance’s incident response team.”

Leave a Reply

Your email address will not be published. Required fields are marked *