CryptoLayerZero details $292M KelpDAO exploit and tightens bridge security

LayerZero details $292M KelpDAO exploit and tightens bridge security

-



LayerZero Labs has released its incident report on the KelpDAO bridge attack, saying about $292 million in rsETH was stolen after attackers poisoned RPC infrastructure used by its verification network and forcing policy changes around single-signer configurations.

Summary

  • LayerZero said KelpDAO was exploited for about $290 million, or roughly 116,500 rsETH, in an attack isolated to rsETH’s single-DVN setup.
  • The company said preliminary indicators point to North Korea-linked TraderTraitor and described the exploit as an infrastructure compromise rather than a protocol flaw.
  • LayerZero said it will stop signing messages for applications using 1/1 DVN configurations and is pushing affected integrators toward multi-DVN redundancy.

LayerZero Labs has published a detailed account of the KelpDAO exploit, confirming that attackers stole roughly 116,500 rsETH, worth about $292 million, by compromising downstream infrastructure tied to the verification layer used in KelpDAO’s cross-chain configuration.

The company said the incident was limited to KelpDAO’s rsETH setup because the application relied on a 1-of-1 DVN configuration with LayerZero Labs as the sole verifier, a design LayerZero said directly contradicted its standing recommendation that applications use diversified multi-DVN setups with redundancy.

In its statement, LayerZero said there was “zero contagion to any other cross-chain assets or applications,” arguing that the protocol’s modular security architecture contained the blast radius even as a single application-level configuration failed.

How the attack worked

According to LayerZero’s report, the April 18, 2026 attack targeted the RPC infrastructure relied on by the LayerZero Labs DVN rather than exploiting the LayerZero protocol, key management, or the DVN software itself.

The company said the attackers gained access to the list of RPCs used by the DVN, compromised two nodes running on separate clusters, replaced binaries on op-geth nodes, and then used malicious payloads to feed forged transaction data to the verifier while returning truthful data to other endpoints, including internal monitoring services.

To complete the exploit, the attackers also launched DDoS attacks on uncompromised RPC endpoints, which triggered failover toward the poisoned nodes and allowed the LayerZero Labs DVN to confirm transactions that had never actually occurred.

Outside forensic work broadly matches that description. Chainalysis said the attackers linked to North Korea’s Lazarus Group, specifically TraderTraitor, did not exploit a smart contract bug but instead forged a cross-chain message by poisoning internal RPC nodes and overwhelming external ones in a single-point-of-failure verification setup.

Security changes

LayerZero said the immediate response included deprecating and replacing all affected RPC nodes, restoring the LayerZero Labs DVN to operation and contacting law enforcement agencies while working with industry partners and Seal911 to trace the stolen funds.

More importantly, the company is changing how it handles risky configurations. In the statement, LayerZero said its DVN “will not sign or attest messages from any applications that utilize a 1/1 configuration,” a direct policy shift aimed at preventing a repeat of the KelpDAO failure mode.

The company is also reaching out to projects still using 1/1 configurations to migrate them to multi-DVN models with redundancy, effectively admitting that configuration flexibility without enforced safety rails was too permissive in practice.

The attribution picture has also hardened. Chainalysis linked the exploit to North Korea’s Lazarus Group and specifically TraderTraitor, while Nexus Mutual said the forged message drained $292 million from KelpDAO’s bridge in under 46 minutes, making it one of 2026’s biggest DeFi losses.

The result is a familiar but brutal lesson for cross-chain infrastructure: the smart contracts can survive intact and the protocol can still fail in practice if the off-chain trust layer is weak enough. LayerZero is now trying to prove that the right takeaway from a $292 million bridge theft is not that modular security failed, but that letting anyone run a single-signer setup was the real mistake.



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest news

What Is Meme Punch? The Medieval Meme Battle Game That Pays You to Play

Meme punch is a play-to-earn crypto game built around one of the easiest crypto concepts to understand. Players...

Saylor Buys $2B, BlackRock Unloads $450M — Which Whale Is Reading Bitcoin Right?

Two institutional giants made opposing moves on Bitcoin this week. One is betting on a decade. The other...

Apple Intelligence Powers New Accessibility Features for iPhone, Mac

Apple Intelligence will upgrade VoiceOver, Voice Control, captions, and Vision Pro wheelchair controls in new accessibility features coming...

Traders Price Zero Fed Rate Cuts in 2026 as New Fed Boss Kevin Warsh Inherits 3.8% Inflation – Bitcoin News

Key TakeawaysMarkets now price the Fed holding rates at 3.50%-3.75% through 2026, ending earlier bets on cuts.Kalshi and...

Advertisement

SEC To Allow Crypto-Based Tokenized Stock Trading

The U.S. Securities and Exchange Commission is on the verge of releasing a landmark “innovation exemption” that would...

Must read

What Is Meme Punch? The Medieval Meme Battle Game That Pays You to Play

Meme punch is a play-to-earn crypto game built...

Saylor Buys $2B, BlackRock Unloads $450M — Which Whale Is Reading Bitcoin Right?

Two institutional giants made opposing moves on Bitcoin...

You might also likeRELATED
Recommended to you