Key Takeaways:
KelpDAO was exploited to the tune of roughly $290M in a focused assault involving a extra superior attacker, almost certainly a Lazarus Group.The assault took benefit of a single-DVN configuration, which poses a crucial level of failure.LayerZero assures zero affect on different apps, and the incident is totally segregated.
The cross-chain safety has been questioned by a large-scale DeFi exploit because of the KelpDAO turning into a sufferer of one of many highest exploits in 2026. LayerZero has printed a breakdown that describes the core challenge and refutes the allegations of a protocol-level weak point.
KelpDAO Exploit Breakdown
On April 18, an assault on the rsETH system of KelpDAO price the group about $290 million. LayerZero signifies that there was no exploit of good contract bugs or key leakage.
https://t.co/3vIHs3Xgs4
— LayerZero (@LayerZero_Core) April 20, 2026
Moderately, attackers focused infrastructure, particularly RPC nodes of the verifier system of LayerZero.
They hacked into choose RPC endpoints and overwrote their binaries with malicious purposes. These nodes handed on incorrect transaction data to the verifier, however they nonetheless reported common data elsewhere, therefore overlaying up this assault in actual time.
Attackers put down an RPC node in wholesome situation utilizing DDoS assault to perform the operation. This manoeuvre compelled the system to modify to the compromised nodes, shedding the validity of actual cross-chain messages and accepting the pretend ones.
Learn Extra: $7.6M DeFi Exploit Rocks Rhea Finance as Hackers Manipulate Swimming pools in Hours



Single DVN Setup Created the Weak Level
The server downside was rooted in KelpDAO’s resolution on how the server ought to be configured.
Why the Setup Failed
The system is dependent upon a single verification (1-of-1 DVN) with out a backup layer or impartial verification. As a result of lack of redundancy and no scheme to determine or test pretend knowledge, manipulated data remains to be acceptable as reliable.
LayerZero emphasised that it has constantly really useful a multi-DVN mannequin. Below that setup, a number of impartial verifiers should agree earlier than a transaction is accepted.
Superior Techniques Linked to Lazarus
The assault exhibits a brand new stage of sophistication. LayerZero attributes it to a state-backed group, probably North Korea’s Lazarus (TraderTraitor unit). Strategies used embrace:
RPC knowledge poisoning with selective responsesCoordinated DDoS to set off failoverSelf-destructing malware to erase proof
Such strategies enabled the attackers to evade surveillance mechanisms and as a substitute carry out unfazed through the interval of exploitation.
Instant Actions Taken


Necessities are actually being tight within the LayerZero ecosystem:
It’s going to not assist single-DVN configurationsTasks are being inspired to modify to multi-DVN designsRegulation enforcement businesses are concerned within the investigationOngoing monitoring actions to reclaim stolen quantities
A change in assault patterns was evident within the incident. Moderately than cracking code, attackers are going after infrastructure and poorly configured areas, which regardless of usually being uncared for, are equally of excessive precedence.
Learn Extra: Resolv Burns 46M USR After $80M Exploit, Wipes Out Illicit Provide in Main Restoration Push








