CoW Swap Halts Protocol After Website Compromise - Coinspeaker

COW-2.5%
ETH3.45%
GNO4.17%
AAVE8.41%

CoW Swap, the Ethereum-based decentralized exchange aggregator, paused its protocol on April 14, 2026, after attackers seized control of its website domain and redirected users to a malicious site engineered to harvest wallet approvals, with cybersecurity researcher Vladimir S. estimating approximately $500,000 in digital assets drained, and at least one user reporting individual losses exceeding $50,000.

The protocol’s underlying smart contracts and backend APIs were confirmed unaffected; the attack surface was the front-end interface alone. We suspect this is less a story about CoW Swap’s specific security posture and more a structural signal about the DeFi industry’s persistent, underweighted exposure to UI-layer infrastructure attacks – a threat vector that smart contract audits do not reach.

DISCOVER: Best crypto to buy right now – CoinSpeaker’s updated guide

CoW Swap Front-End Compromise: DNS Hijacking, Malicious Approvals, and What the Protocol Has Confirmed

The mechanism functions as follows: attackers gained administrative control of CoW Swap’s website domain – the cow.fi address that users navigate to before interacting with the protocol – and redirected that domain to a malicious site designed to mimic the legitimate interface.

Users who visited the site and signed transaction approvals during the window following 14:54 UTC on April 14 were exposed to wallet-draining transfers, without any indication at the domain level that anything was amiss.

Blockchain security firm Blockaid detected and flagged the malicious activity on the cow.fi domain, identifying it as a frontend attack capable of tricking users into signing draining transactions.

CoW Swap’s team confirmed the situation in a public statement: “We are now actively working to resolve the situation. The CoW Protocol backend and APIs were not impacted, but we have paused them temporarily as a precaution.”

MooKeeper, a pseudonymous member of the CoW Swap team, said that the scope of losses remains under active investigation and that a fuller assessment would follow, adding: “We have evidence that a small number of users signed malicious approvals for very small amounts.”

That characterization sits in tension with Vladimir S.’s on-chain estimate of $500,000 drained from multiple addresses – a figure that some reports suggested could approach $1 million within three hours of the attack’s disclosure, though that higher figure has not been independently confirmed.

It is necessary to flag the epistemic status of several details here: the precise total of stolen funds, the identity of the attackers, and the full list of affected wallets remain unconfirmed in public disclosures at the time of writing.

CoW DAO advised all users to revoke any approvals granted to CoW Swap after 14:54 UTC on April 14, recommending tools such as revoke cash for that process. Martin Köppelmann, co-founder and CEO of decentralized infrastructure provider Gnosis, noted that exposure appears limited to users who approved protocol interactions within the few hours the compromised domain was active. Aave separately disabled CoW Swap endpoints for its integrators as a precautionary measure, confirming that Aave’s own interface and protocol were not affected.

EXPLORE: Best meme coins to watch – CoinSpeaker’s updated rankings

nextDisclaimer: Coinspeaker is committed to providing unbiased and transparent reporting. This article aims to deliver accurate and timely information but should not be taken as financial or investment advice. Since market conditions can change rapidly, we encourage you to verify information on your own and consult with a professional before making any decisions based on this content.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Houston Crypto Fraudster Sentenced to 23 Years for $20M Meta-1 Coin Scam

Robert Dunlap, a Houston entrepreneur, was sentenced to 23 years in prison for a $20 million cryptocurrency fraud involving fake assets and deceptive practices, impacting over 1,000 victims. His case reflects a broader rise in crypto-related cybercrimes.

GateNews2h ago

SlowMist Warns of Active Phishing Attack Using Fake 'Harmony Voice' Software

SlowMist's security team has warned of a social engineering campaign targeting cryptocurrency users. Fraudsters are posing as project partners to trick users into downloading a malicious application disguised as a translation tool. Users are advised to verify software authenticity.

GateNews2h ago

Zonda Exchange CEO Blames Missing Founder for $336M in Lost Bitcoin

Zonda CEO Przemysław Kral has attributed the exchange's loss of access to 4,500 BTC, valued at $336 million, to missing founder Sylwester Suszek's failure to transfer private keys. Amid allegations of bankruptcy and intensified withdrawal requests, Kral insists Zonda remains solvent and will pursue legal action while searching for Suszek, who disappeared in 2022.

GateNews3h ago

Grinex Exchange Halts All Trading After $15M Cyberattack on Wallet Systems

Grinex, a Kyrgyz crypto exchange, suspended trading after a cyberattack resulting in losses of around $15 million. The advanced nature of the attack points to organized or state-level involvement. Grinex has reported the incident to authorities and is assessing the damage.

GateNews3h ago

Tether Freezes $3.29M USDT Linked to Rhea Finance Exploit

Tether froze $3.29 million in USDT linked to Rhea Finance exploit, ensuring user protection and ecosystem trust. Blockchain tracking enabled this action against suspicious wallets after attackers moved funds to evade detection.

GateNews4h ago

Circle Stock Falls After $280M Drift Protocol Hack Lawsuit Filed

Circle Internet Group's stock fell 1% after a class action lawsuit alleged it failed to prevent $230 million in stolen USDC during the Drift Protocol exploit. The lawsuit questions Circle's ability to halt the attackers' transactions, raising issues of responsibility for stablecoin issuers in breach scenarios.

GateNews4h ago
Comment
0/400
No comments