PANews reported on April 20th that, according to The Block, eth.limo, the ENS-to-Web gateway, suffered a DNS hijacking in the early hours of April 17th Beijing time. Domain registrar EasyDNS admitted to being the victim of a social engineering attack, marking the company's first successful social engineering attack against a customer in 28 years. The attacker impersonated a member of the eth.limo team, tricking EasyDNS into performing an account recovery process, and subsequently changed the name servers twice. Because the attacker did not obtain eth.limo's signing key, DNSSEC verification rejected the attacker's changes, and the resolver returned an error rather than a malicious response.
eth.limo stated that it is currently unaware of any affected users and will be migrating to the EasyDNS association service, which does not support account recovery. Vitalik Buterin had warned users during the incident to avoid using eth.limo links and access directly via IPFS, and confirmed on Saturday that the issue had been resolved.

