KelpDAO Loses $290M in Lazarus Group LayerZero Attack

ZRO-3.65%
CORE10.88%
CYBER3.54%

KelpDAO suffered a $290 million loss on April 18 in a sophisticated security breach linked to the Lazarus Group, specifically an actor known as TraderTraitor, according to early reports. The attack targeted LayerZero infrastructure and exploited configuration weaknesses in KelpDAO’s verification systems. David Schwartz noted on April 20, 2026, that “the attack was way more sophisticated than I expected and aimed at LayerZero infrastructure taking advantage of KelpDAO laziness.”

How the Attack Happened

The attack employed a multi-stage approach rather than a simple exploit. Attackers first targeted the RPC system used by LayerZero’s verification network, then launched a DDoS attack to disrupt normal operations. When the system switched to backup nodes, attackers executed their key objective: those backup nodes had already been compromised, allowing them to send false signals and confirm transactions that never actually occurred. Notably, no core protocol or private keys were broken. Instead, the attack exploited weak points in the system’s configuration, demonstrating the sophistication of modern cyber threats.

Single Point of Failure as Root Cause

The fundamental vulnerability stemmed from KelpDAO’s configuration design. The platform relied on a 1-of-1 verification setup, meaning only a single verifier confirmed transactions with no backup verification layer. Once that single system was compromised, the attack succeeded without any secondary defense. Experts noted this created a clear single point of failure. LayerZero had previously recommended using multiple verifiers, and a multi-layer verification setup could have prevented the attack entirely.

Impact and Scope

While the loss was substantial, damage remained contained to a specific area. Reports confirm the breach affected only KelpDAO’s rsETH product, with other assets and applications remaining unaffected. LayerZero quickly replaced the compromised systems and restored normal operations. Teams are working with investigators to track the stolen funds. The incident has raised industry-wide concerns about configuration security in advanced systems.

Implications for Crypto Security

The incident underscores that security depends not only on code strength but also on system configuration and management practices. The involvement of the Lazarus Group—a cyber group historically linked to large-scale exploits—adds significant concern, as their methods continue to evolve. Going forward, projects may increasingly prioritize redundancy and risk control mechanisms. Multi-layer verification could become an industry standard. The KelpDAO attack serves as a warning that even one weak point in system architecture can result in massive losses. As the crypto space expands, security practices must evolve proportionally.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Ice Open Network Suffers Data Breach; User Emails and 2FA Phone Numbers Exposed

Ice Open Network reported a security breach on April 15, revealing unauthorized access to user data, including email addresses and 2FA phone numbers, but no financial data was compromised. The incident, linked to former partners of a service provider, is under legal review, and users are advised to update security settings. The breach highlights escalating security issues in the crypto sector, with significant losses reported in recent months.

GateNews1h ago

Russian Crypto Exchange Grinex Halts Operations After $13M Hack, Threatening Sanctions Evasion Network

Russian cryptocurrency exchange Grinex ceased operations after a cyberattack caused losses over $13 million. The shutdown impacts Russian businesses' ability to convert rubles internationally and challenges the country's shadow finance system.

GateNews3h ago

Kelp DAO Hack Attributed to Lazarus Group; eth.limo Domain Hijacked via Social Engineering

LayerZero reported that the Kelp DAO exploit, attributed to North Korea's Lazarus Group, led to a loss of $292 million in rsETH tokens due to vulnerabilities in its decentralized verifier network. Additionally, eth.limo faced a domain hijacking from a social engineering attack, but DNSSEC mitigated severe damage.

GateNews7h ago

DeFi Hack Triggers $9 Billion in Outflows from Aave as Stolen Tokens Used as Collateral

A recent hack draining nearly $300 million from a crypto project led to a liquidity crisis on Aave, causing users to withdraw around $9 billion. Concerns over collateral quality prompted mass withdrawals, highlighting risks in DeFi lending.

GateNews8h ago

Ethereum Phishing Attack Drains $585K From Four Users, Single Victim Loses $221K WBTC

A coordinated Ethereum phishing attack drained $585,000 from four victims, exploiting user permissions through a deceptive link. This incident highlights the rapid loss of funds via social engineering, even under the guise of legitimacy.

GateNews9h ago

Pay attention to the signed content! Vercel is hit with ransomware demanding $2 million, and crypto protocol frontend security raises a red flag

The cloud development platform Vercel was breached by hackers on April 19. The attackers gained access through a third-party AI tool used by employees and threatened to extort $2 million. Although sensitive data was not accessed, other data may have been used. The incident has raised security concerns in the crypto community, and Vercel is currently investigating while advising users to rotate their keys.

ChainNewsAbmedia11h ago
Comment
0/400
GlassDomeBaskingInMoonlightvip
· 11h ago
I hope they can disclose a more detailed review: attack paths, permission change records, why alerts didn't trigger, which would be more valuable to the industry.
View OriginalReply0
0xLateAgainvip
· 11h ago
Users also need to learn their lesson; don't keep large amounts of long-term funds in a single protocol. Diversification and limits are the real defense.
View OriginalReply0
LendingPoolObservervip
· 11h ago
Ultimately, it's a trade-off between "usability" and "security"; taking shortcuts can easily lead to being compromised.
View OriginalReply0
SecondaryMarketDesertervip
· 11h ago
With this level of funding, you should assume you are the target of the national team, and your baseline configuration and continuous monitoring should be sufficiently robust.
View OriginalReply0
GateUser-8e84d799vip
· 12h ago
Single sign-on verification = single point of failure, it was long overdue to implement multi-signature + multi-layer approval + risk control thresholds, at least to reduce the explosion radius.
View OriginalReply0