Jul 21, 2023 Frank Stewskid
Uniswap Founder Twitter Account Hack: Consequences and Recovery
Hayden Adams' Twitter Account Breached
Uniswap founder Hayden Adams' Twitter account, followed by over 254,000 users, was recently compromised. The account began sending out suspicious tweets on July 20, sparking concerns within the crypto community.
The Hack Explained: Misinformation and Misleading Links
Hackers used Adams' account to send out tweets alleging an unknown exploit in Uniswap's Permit2 contract. These messages were paired with a dubious link, designed to trick users into interacting with it. While the initial fraudulent tweet was quickly removed, several similar posts followed. There were also reports suggesting that the hacking incident might have affected more than just the Twitter account of the Uniswap founder - apparently Adams may had also been blocked from his MetaMask and Coinbase Wallet accounts.
Countermeasures: Quick Response from Uniswap Labs
In response to the incident, Uniswap Labs used its official Twitter account to clarify the situation. The team behind the popular DEX assured users that there were no ongoing giveaways, airdrops, or bounties, and the Uniswap protocol was unaffected. Users were advised not to click on any links from Adams' account during this period.
.@haydenzadams’ Twitter account has been hacked. Please do not click on any links. There is no giveaway, airdrop, or bounty. The Protocol has not been hacked or exploited.
— Uniswap Labs 🦄 (@Uniswap) July 20, 2023
We will let you know when the issue is resolved
Aftermath and Security Suggestions
Several hours after the incident, Adams announced he had regained control of his Twitter account. He thanked those who helped during the incident and promised to provide more details in due time.
In control of my twitter again 🫡
— hayden.eth 🦄 (@haydenzadams) July 21, 2023
Appreciate everyone who helped out tonight, and the effort people put in to help with takedowns, warnings, etc
Will follow up with updates when ready https://t.co/t6WCAWOYlP
Highlighting vulnerabilities associated with SIM card-based 2FA such as susceptibility to SIM swap attacks, security experts pointed out the need for more robust protective measures. Apps like Google Authenticator and Authy were suggested as alternatives. These apps generate time-sensitive codes directly on users' devices, making them less vulnerable to common attack methods. The reliance on physical access to the device for code generation enhances security, reducing the risk of unauthorized access.