#KelpDAOBridgeHacked


**KelpDAO Bridge Exploit: A Comprehensive Breakdown of the $292 Million DeFi Hack**

On April 18, 2026, the decentralized finance ecosystem witnessed one of its most significant security breaches when KelpDAO's LayerZero-powered rsETH bridge was exploited, resulting in approximately $292 million in losses. This incident has sent shockwaves through the DeFi landscape, triggering a cascade of emergency responses across multiple lending protocols and exposing critical vulnerabilities in cross-chain bridge infrastructure.

**The Exploit Mechanism**

At approximately 17:35 UTC on April 18, an attacker executed a sophisticated exploit targeting KelpDAO's rsETH bridge, which utilizes LayerZero's Omnichain Fungible Token (OFT) adapter technology. The attacker managed to forge a cross-chain message through the lzReceive function, effectively bypassing validation mechanisms on Ethereum mainnet. By spoofing the source chain as Unichain (EID 30320), the attacker was able to release 116,500 unbacked rsETH tokens from the bridge escrow without any corresponding deposit on the source chain.

The root cause of this exploit has been traced to a fragile 1-of-1 Decentralized Verifier Network (DVN) signer quorum configuration that relied on limited RPC endpoints. These endpoints appear to have been compromised, feeding false verification data to the bridge contract. Notably, no actual token burn occurred on the source chain, yet the bridge erroneously minted the equivalent rsETH on Ethereum mainnet. The key transaction hash for this exploit is 0x1ae232da212c45f35c1525f851e4c41d529bf18af862d9ce9fd40bf709db4222, which can be traced on blockchain explorers such as Routescan.

**Immediate Aftermath and DeFi Contagion**

Rather than simply holding the stolen rsETH, the attacker immediately deployed these unbacked tokens as collateral across multiple lending protocols, transforming a bridge security issue into a systemic DeFi contagion event. The stolen rsETH was deposited into Aave V3 and V4 markets on both Ethereum mainnet and Arbitrum, as well as Compound V3, Euler, and approximately 30 other lending platforms. From these positions, the attacker borrowed approximately 83,427 WETH and wstETH, with specific breakdowns showing 52,834 WETH borrowed on Ethereum mainnet and 29,782 WETH plus 821 wstETH on Arbitrum.

This aggressive leveraging strategy created significant bad debt exposure across the DeFi ecosystem. Current estimates place potential losses between $120 million and $236 million across affected lending protocols, with Aave facing the largest exposure at potentially $230 million in bad debt. The situation has placed immense pressure on the AAVE governance token and raised serious questions about the risk management practices of major lending platforms.

**Emergency Response Protocols**

The response to this exploit was swift but reactive. At approximately 18:21 UTC on April 18, KelpDAO's emergency pauser multisig executed a freeze on core rsETH contracts across mainnet and all Layer 2 networks. Shortly thereafter, Aave moved to freeze rsETH markets on both V3 and V4 versions, a decision that was quickly mirrored by Spark, Fluid, Ethena, Upshift, Morpho, and numerous other protocols.

Stani Kulechov, Aave's founder and CEO, confirmed via X that rsETH had been frozen on both Aave V3 and V4, with the asset stripped of all borrowing power as a direct response to the KelpDAO bridge exploit. The official Aave account indicated that the community would need to discuss whether rsETH should be permanently delisted from all Aave markets once the immediate crisis subsides, following a pattern established after previous bad debt events.

**Attribution and Technical Analysis**

Security researchers and blockchain analytics firms have attributed this attack to North Korea's Lazarus Group, a state-sponsored hacking collective notorious for targeting cryptocurrency platforms. The attack methodology aligns with established Lazarus Group tactics, including patient intrusion, manipulation of trust mechanisms, and suppression of detection capabilities.

LayerZero Labs has provided additional technical details regarding the attack vector. According to their analysis, the attacker gained access to the list of RPC endpoints used by their DVN infrastructure, subsequently compromising two independent nodes running on separate clusters without direct connection to each other. The attacker then replaced the binaries running the op-geth nodes, effectively controlling the verification data fed to the bridge contracts.

KelpDAO has reportedly placed blame on LayerZero's infrastructure for the security breach, while LayerZero has countered that the issue stemmed from KelpDAO's specific DVN configuration. LayerZero maintains that they and other external parties had previously communicated best practices regarding DVN diversification to KelpDAO, suggesting that proper configuration could have prevented the exploit.

**Market Impact and rsETH Depegging**

The exploit has had severe consequences for rsETH's market position. The token experienced significant depegging from its intended ETH backing ratio, creating uncertainty for holders across more than 20 blockchain networks where wrapped rsETH is deployed. With approximately 18% of the circulating rsETH supply now representing unbacked tokens, confidence in the liquid staking derivative has been severely shaken.

The broader DeFi ecosystem has also felt the impact, with total hack losses for 2026 now exceeding $750 million through mid-April. This KelpDAO exploit surpassed the previous record for 2026, which was held by Drift Protocol's $285 million hack on April 1, by several million dollars. The concentration of bridge exploits in 2026 has highlighted the ongoing security challenges facing cross-chain infrastructure.

**Current Status and Recovery Efforts**

As of April 21, 2026, both KelpDAO and LayerZero are actively collaborating on a comprehensive root cause analysis and post-mortem report. KelpDAO has confirmed via their official X account that they are working with LayerZero, Unichain, security auditors, and blockchain experts to investigate the incident and develop a recovery framework.

LayerZero has stated that they have been aware of the incident since it occurred and are actively remediating the situation with KelpDAO's team. They have emphasized that other applications utilizing LayerZero infrastructure remain secure and that a detailed post-mortem is forthcoming in collaboration with KelpDAO and the SEAL 911 security response team.

The attacker addresses, including 0x1F4C1c2e610f089D6914c4448E6F21Cb0db3adeF, have been labeled on major blockchain explorers and are being actively monitored for any movement of the stolen funds. However, given the sophistication of the attack and the involvement of state-sponsored actors, recovery prospects remain uncertain.

**Critical Takeaways**

This exploit represents a watershed moment for DeFi security, demonstrating how bridge vulnerabilities can cascade into systemic risks across the entire ecosystem. The incident underscores the critical importance of robust DVN configurations, diversified verification mechanisms, and proactive risk management in cross-chain protocols. For users, the event serves as a stark reminder of the risks associated with wrapped assets and the interconnected nature of modern DeFi lending markets.

The situation continues to evolve, with affected protocols working to quantify losses and develop remediation strategies. Users are advised to monitor official channels from KelpDAO, LayerZero, and affected lending platforms for updates regarding potential reimbursement plans or recovery mechanisms.
ZRO2.69%
ETH0.77%
AAVE3.03%
ARB-0.83%
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 3
  • Repost
  • Share
Comment
Add a comment
Add a comment
Yajing
· 57m ago
To The Moon 🌕
Reply0
HighAmbition
· 1h ago
Just charge and you're done 👊
Reply0
MasterChuTheOldDemonMasterChu
· 2h ago
Just charge forward and it's done 👊
View OriginalReply0
  • Pin