#rsETHAttackUpdate


The recent security incident involving Kelp DAO's rsETH token occurred on April 18, 2026. Attackers successfully drained approximately $292 million (116,500 rsETH) from the protocol.

The exploit has been attributed by security analysts to the North Korea-linked Lazarus Group.

How the Attack Happened

The incident was a sophisticated attack on off-chain infrastructure rather than a vulnerability in the smart contracts themselves.

Forged Cross-Chain Message: The attackers bypassed the security of the bridge by forging a cross-chain message that mimicked a legitimate transaction.

Infrastructure Compromise: The target was the LayerZero-powered bridge adapter. The attackers compromised internal RPC nodes associated with the Decentralized Verifier Network (DVN) and simultaneously launched a DDoS attack against external nodes.

Verification Failure: By poisoning the verification process, they forced the system to rely on falsified data, leading the bridge to release 116,500 rsETH on Ethereum without an actual corresponding "burn" or collateral backing upstream.

Collateral Exploitation: Following the unauthorized minting of these "phantom" tokens, the attackers used them as collateral on Aave to borrow other assets, which caused significant stress and liquidity outflows across the DeFi ecosystem.

Immediate Impact and Response

Protocol Pauses: Kelp DAO promptly paused its rsETH contracts across mainnet and various Layer-2 networks upon identifying the suspicious activity.

DeFi Precautions: Major lending protocols, including Aave, moved to freeze rsETH markets to protect their platforms and users. Other protocols with exposure, such as those integrated with Lido, also suspended deposits or took precautionary measures.

Attempted Second Attack: Following the initial theft, the attackers attempted a second, smaller drain of an additional 40,000 rsETH (~$95 million), but this was thwarted after Kelp DAO blacklisted the attackers' addresses and paused the relevant contracts.

This event has sparked significant discussion within the industry regarding the reliance on single-point-of-failure configurations in bridge security and the necessity for "invariant-level" monitoring rather than just individual call verification.
โ€$AAVE
AAVE1.33%
post-image
post-image
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 12
  • Repost
  • Share
Comment
Add a comment
Add a comment
MrFlower_XingChen
ยท 44m ago
To The Moon ๐ŸŒ•
Reply0
User_any
ยท 1h ago
LFG ๐Ÿ”ฅ
Reply0
Yajing
ยท 1h ago
2026 GOGOGO ๐Ÿ‘Š
Reply0
Yajing
ยท 1h ago
To The Moon ๐ŸŒ•
Reply0
MasterChuTheOldDemonMasterChu
ยท 1h ago
Just charge forward ๐Ÿ‘Š
View OriginalReply0
MasterChuTheOldDemonMasterChu
ยท 1h ago
Just charge forward ๐Ÿ‘Š
View OriginalReply0
ybaser
ยท 2h ago
Buy To Earn ๐Ÿ’ฐ๏ธ
Reply0
ChuDevil
ยท 2h ago
Steadfast HODL๐Ÿ’Ž
View OriginalReply0
ChuDevil
ยท 2h ago
Just charge forward ๐Ÿ‘Š
View OriginalReply0
NexaCrypto
ยท 2h ago
LFG ๐Ÿ”ฅ
Reply0
View More
  • Pin