Learn from MyEtherWallet

The $150k Phishing Attack:
How the MyEtherWallet DNS Hijack Unfolded

In 2018, attackers hijacked MyEtherWallet's DNS records, redirecting users to a phishing site and stealing an estimated $150,000 in Ether. Incident Drill lets your team practice responding to similar security incidents, improving your preparedness and resilience.

MyEtherWallet | 2018 | Security (DNS hijack)

The Ever-Present Threat of DNS Hijacking

DNS hijacking remains a critical security risk. A single compromised route can lead to widespread phishing attacks, financial losses, and reputational damage. Are you prepared to defend against this sophisticated threat?

PREPARE YOUR TEAM

How Incident Drill Helps You Prepare

Incident Drill provides realistic simulations of security incidents like the MyEtherWallet DNS Hijack. Your team can practice identifying, responding, and recovering from these attacks in a safe, controlled environment, building muscle memory and improving your incident response capabilities.

🚨

Realistic Simulations

Experience a simulated DNS hijack attack, mirroring the MyEtherWallet incident.

🕵️‍♀️

Threat Intelligence

Analyze threat actors and their techniques used in the attack.

📈

Impact Assessment

Evaluate the potential financial and reputational damage of a successful hijack.

🛡️

Defense Strategies

Implement and test various mitigation strategies to prevent future attacks.

💬

Team Collaboration

Practice communication and coordination during a high-pressure security incident.

Post-Incident Review

Conduct a thorough post-incident analysis to identify areas for improvement.

WHY TEAMS PRACTICE THIS

Master Incident Response

  • Improve incident detection and response times
  • Strengthen your security posture against DNS attacks
  • Develop a proactive security mindset within your team
  • Reduce the financial and reputational impact of security incidents
  • Enhance team collaboration and communication during crises
  • Identify and address vulnerabilities in your infrastructure

Attack Flow

2018 BGP Route Hijack
+0:05 DNS Poisoning
+0:15 Users Redirected to Phishing Site
+1:00 Funds Stolen $150k+
+2:00 Mitigation Efforts Begin Partial Recovery

How It Works

1

Step 1: Simulation Setup

Configure the MyEtherWallet DNS Hijack simulation in Incident Drill.

2

Step 2: Incident Response

Respond to the simulated attack as a team, following your incident response plan.

3

Step 3: Analysis & Mitigation

Analyze the attack, identify vulnerabilities, and implement mitigation strategies.

4

Step 4: Post-Incident Review

Review your team's performance and identify areas for improvement.

Ready to Level Up Your Incident Response?

Join the Incident Drill waitlist and be among the first to access our realistic incident simulations. Prepare your team for the inevitable security challenges.

Get Early Access
Founding client discounts Shape the roadmap Direct founder support

Join the Incident Drill waitlist

Drop your email and we'll reach out with private beta invites and roadmap updates.