Aerodrome Finance, a leading decentralised exchange on Base, recently warned about a possible breach involving its frontend and is currently investigating the situation. The team urged users to avoid accessing any domain until they fully assess the situation.
The Aerodrome team confirmed that its centralised domains, including the .finance and .box addresses, are still compromised. The team notes that two decentralised mirror sites are currently safe to access: aero.drome.eth.limo and aero.drome.eth.link.
Aerodrome says its smart contract infrastructure appears secure. More updates will be shared as the investigation continues. Velodrome Finance has also reported a similar issue, suggesting the possibility of a wider attack.
One user reported that an exploit affecting Aerodrome and Velodrome resulted in more than $1 million being stolen in less than an hour.
While another user notes that he visited the site before the warning was issued, and although the user did not approve any transactions, the attack was severe. A simple signature request was quickly followed by attempts to gain unlimited approvals to drain their NFTs, ETH, and USDC.
- Also Read :
- Crypto Markets Wiped $1Trillion, but Raoul Pal sees a Strong Bitcoin Recovery
- ,
Alexander Cutler, the co-founder of Aerodrome and the CEO of Dromos Labs, called out another builder for mocking the project during the DNS hijacking incident.
He notes that the decentralised domains were unaffected, 3DNS was protected by a multisig, and multiple top security teams are still trying to understand the issue, and it was not an issue from the team’s end.
“The first rule of building in DeFi is that you don’t use exploits to dunk on other builders, especially for something like a DNS hijacking that is almost always out of a team’s control,” he said, calling the behaviour unprofessional.
A new Global Ledger report shows how crypto hackers are getting faster than ever.
More than $3 billion was stolen in the first half of 2025, and in many cases, attackers laundered the money within minutes, sometimes even before anyone realised a hack had happened.
The report notes that Centralised exchanges remain the most attractive as high-value, single-point-of-failure targets for attackers, contributing to 54.26% of total losses. About 15% of laundered funds passed through CEXs. The report emphasises that real-time monitoring is now essential.