Key Takeaways:
KelpDAO was exploited to the tune of roughly $290M in a focused assault involving a extra superior attacker, more than likely a Lazarus Group.The assault took benefit of a single-DVN configuration, which poses a crucial level of failure.LayerZero assures zero impression on different apps, and the incident is totally segregated.
The cross-chain safety has been questioned by a large-scale DeFi exploit as a result of KelpDAO changing into a sufferer of one of many highest exploits in 2026. LayerZero has revealed a breakdown that describes the core concern and refutes the allegations of a protocol-level weak spot.
KelpDAO Exploit Breakdown
On April 18, an assault on the rsETH system of KelpDAO value the group about $290 million. LayerZero signifies that there was no exploit of good contract bugs or key leakage.
https://t.co/3vIHs3Xgs4
— LayerZero (@LayerZero_Core) April 20, 2026
Quite, attackers focused infrastructure, specifically RPC nodes of the verifier system of LayerZero.
They hacked into choose RPC endpoints and overwrote their binaries with malicious purposes. These nodes handed on incorrect transaction info to the verifier, however they nonetheless reported common info elsewhere, therefore masking up this assault in actual time.
Attackers put down an RPC node in wholesome situation utilizing DDoS assault to perform the operation. This manoeuvre compelled the system to modify to the compromised nodes, dropping the validity of actual cross-chain messages and accepting the pretend ones.
Learn Extra: $7.6M DeFi Exploit Rocks Rhea Finance as Hackers Manipulate Swimming pools in Hours



Single DVN Setup Created the Weak Level
The server drawback was rooted in KelpDAO’s choice on how the server needs to be configured.
Why the Setup Failed
The system is dependent upon a single verification (1-of-1 DVN) with no backup layer or unbiased verification. As a result of lack of redundancy and no scheme to establish or verify pretend knowledge, manipulated info continues to be acceptable as authentic.
LayerZero emphasised that it has persistently really helpful a multi-DVN mannequin. Underneath that setup, a number of unbiased verifiers should agree earlier than a transaction is accepted.
Superior Techniques Linked to Lazarus
The assault reveals a brand new degree of sophistication. LayerZero attributes it to a state-backed group, possible North Korea’s Lazarus (TraderTraitor unit). Strategies used embrace:
RPC knowledge poisoning with selective responsesCoordinated DDoS to set off failoverSelf-destructing malware to erase proof
Such strategies enabled the attackers to evade surveillance mechanisms and as a substitute carry out unfazed through the interval of exploitation.
Rapid Actions Taken


Necessities are actually being tight within the LayerZero ecosystem:
Support Greater and Subscribe to view content
This is premium stuff. Subscribe to read the entire article.












