# DeFiSecurity

1.48K
#KelpDAOBridgeHacked
KelpDAO Bridge Exploit: Technical Breakdown & Industry Impact
On April 18, 2026, KelpDAO's rsETH cross-chain bridge suffered the largest DeFi exploit of 2026, with attackers draining approximately 116,500 rsETH valued at roughly $292 million. The incident represents approximately 18% of rsETH's total circulating supply and has triggered cascading effects across the DeFi ecosystem.
Attack Vector Analysis
The exploit was executed through a sophisticated multi-stage attack targeting LayerZero's infrastructure. Attackers first compromised two independent RPC nodes operated by
ZRO-0,91%
AAVE0,98%
ARB1,85%
ETH2,86%
BlackRiderCryptoLord
#KelpDAOBridgeHacked
KelpDAO Bridge Exploit: Technical Breakdown & Industry Impact
On April 18, 2026, KelpDAO's rsETH cross-chain bridge suffered the largest DeFi exploit of 2026, with attackers draining approximately 116,500 rsETH valued at roughly $292 million. The incident represents approximately 18% of rsETH's total circulating supply and has triggered cascading effects across the DeFi ecosystem.
Attack Vector Analysis
The exploit was executed through a sophisticated multi-stage attack targeting LayerZero's infrastructure. Attackers first compromised two independent RPC nodes operated by LayerZero Labs, replacing legitimate op-geth binaries with malicious versions. These poisoned nodes were specifically configured to deceive LayerZero's Decentralized Verifier Network (DVN) while maintaining truthful responses to other monitoring systems, effectively evading detection.
The attack sequence involved a coordinated DDoS strike against a third clean RPC node, forcing the DVN to failover to the compromised infrastructure. KelpDAO's bridge configuration utilized a 1-of-1 DVN setup, meaning only LayerZero Labs' DVN was required to validate cross-chain messages. The poisoned nodes successfully confirmed a fabricated burn transaction on Unichain, which the EndpointV2 relay system propagated to KelpDAO's OFT Adapter, triggering the unauthorized release of mainnet reserves.
Post-exploitation, the attacker systematically laundered the stolen rsETH across multiple wallets, depositing funds as collateral on Aave V3 markets across Ethereum and Arbitrum. The attacker secured approximately 75,700 WETH on Ethereum and 30,800 WETH on Arbitrum, achieving loan-to-value ratios near 99% before protocol-level freezes halted further borrowing.
Attribution & Threat Actor Profile
Security researchers and blockchain analytics firms have attributed the attack to North Korea's Lazarus Group, specifically the TraderTraitor cluster. The operational characteristics align with documented Lazarus methodologies: patient intrusion tactics, manipulation of trusted infrastructure, and sophisticated detection suppression mechanisms. The malware employed self-destructed following the exploit, systematically erasing forensic evidence from compromised systems.
Protocol Response & Containment
Aave responded within hours by freezing rsETH markets across V3 and V4 deployments, including SparkLend integration. The protocol currently faces approximately $177 million in bad debt, predominantly concentrated on Arbitrum. Total Value Locked across Aave ecosystem dropped from $26 billion to $18 billion, representing $8-14 billion in outflows as liquidity providers withdrew capital.
The contagion extended beyond Aave, with over 15 protocols implementing emergency bridge pauses. WETH lending pools experienced 100% utilization rates, creating secondary liquidation risks for leveraged positions. KelpDAO has blacklisted the exploiter addresses and claims to have prevented an additional $95 million in follow-up attack attempts.
Disputed Root Cause Analysis
A significant dispute exists between KelpDAO and LayerZero regarding fundamental responsibility. LayerZero maintains that KelpDAO's 1-of-1 DVN configuration deviated from recommended security practices, emphasizing that the protocol itself contained no vulnerabilities and that the incident was isolated to rsETH infrastructure. LayerZero has subsequently patched affected DVN and RPC systems.
KelpDAO counters that LayerZero's default documentation and quickstart configurations recommended the 1-of-1 setup, arguing that the infrastructure provider bears responsibility for RPC node security. Both parties agree that no smart contract bugs were exploited; the root cause centers on trust assumptions within single-point-of-failure configurations.
DeFi Security Implications
The incident exposes critical vulnerabilities in cross-chain bridge architectures, particularly regarding RPC infrastructure security. RPC nodes have emerged as a systemic weak link, with most protocols relying on a limited set of providers without adequate failover diversification. The exploit demonstrates that even sophisticated multi-signature and verification systems can be compromised when underlying data sources are poisoned.
Industry analysts recommend immediate implementation of multi-DVN configurations, diversified RPC provider networks, and real-time configuration auditing systems. The modular security architecture of LayerZero contained blast radius to rsETH specifically, with no other OFT or OApp contracts affected, suggesting that cross-chain messaging frameworks can maintain resilience even during targeted infrastructure attacks.
Current Status & Recovery Efforts
Aave governance is currently debating debt socialization mechanisms to address the bad debt situation. KelpDAO, LayerZero, and Aave have established coordination channels for recovery operations. Blockchain security collective Seal-911 is actively tracking fund movements, with portions of stolen assets identified flowing through Tornado Cash and other obfuscation protocols. Whitehat negotiation channels remain open, though no recovery has been confirmed at time of writing.
The exploit establishes a new record for 2026 DeFi hacks, surpassing the $285 million Drift Protocol incident from April 1. The incident reinforces ongoing concerns regarding bridge security as the primary attack vector in DeFi, with cross-chain infrastructure remaining the ecosystem's most contested security frontier.
#KelpDAO #DeFiSecurity #BridgeExploit #CryptoNews
repost-content-media
  • Reward
  • Comment
  • Repost
  • Share
#KelpDAOBridgeHacked
KelpDAO Bridge Exploit: Technical Breakdown & Industry Impact
On April 18, 2026, KelpDAO's rsETH cross-chain bridge suffered the largest DeFi exploit of 2026, with attackers draining approximately 116,500 rsETH valued at roughly $292 million. The incident represents approximately 18% of rsETH's total circulating supply and has triggered cascading effects across the DeFi ecosystem.
Attack Vector Analysis
The exploit was executed through a sophisticated multi-stage attack targeting LayerZero's infrastructure. Attackers first compromised two independent RPC nodes operated by
ZRO-0,91%
AAVE0,98%
ARB1,85%
ETH2,86%
BlackRiderCryptoLord
#KelpDAOBridgeHacked
KelpDAO Bridge Exploit: Technical Breakdown & Industry Impact
On April 18, 2026, KelpDAO's rsETH cross-chain bridge suffered the largest DeFi exploit of 2026, with attackers draining approximately 116,500 rsETH valued at roughly $292 million. The incident represents approximately 18% of rsETH's total circulating supply and has triggered cascading effects across the DeFi ecosystem.
Attack Vector Analysis
The exploit was executed through a sophisticated multi-stage attack targeting LayerZero's infrastructure. Attackers first compromised two independent RPC nodes operated by LayerZero Labs, replacing legitimate op-geth binaries with malicious versions. These poisoned nodes were specifically configured to deceive LayerZero's Decentralized Verifier Network (DVN) while maintaining truthful responses to other monitoring systems, effectively evading detection.
The attack sequence involved a coordinated DDoS strike against a third clean RPC node, forcing the DVN to failover to the compromised infrastructure. KelpDAO's bridge configuration utilized a 1-of-1 DVN setup, meaning only LayerZero Labs' DVN was required to validate cross-chain messages. The poisoned nodes successfully confirmed a fabricated burn transaction on Unichain, which the EndpointV2 relay system propagated to KelpDAO's OFT Adapter, triggering the unauthorized release of mainnet reserves.
Post-exploitation, the attacker systematically laundered the stolen rsETH across multiple wallets, depositing funds as collateral on Aave V3 markets across Ethereum and Arbitrum. The attacker secured approximately 75,700 WETH on Ethereum and 30,800 WETH on Arbitrum, achieving loan-to-value ratios near 99% before protocol-level freezes halted further borrowing.
Attribution & Threat Actor Profile
Security researchers and blockchain analytics firms have attributed the attack to North Korea's Lazarus Group, specifically the TraderTraitor cluster. The operational characteristics align with documented Lazarus methodologies: patient intrusion tactics, manipulation of trusted infrastructure, and sophisticated detection suppression mechanisms. The malware employed self-destructed following the exploit, systematically erasing forensic evidence from compromised systems.
Protocol Response & Containment
Aave responded within hours by freezing rsETH markets across V3 and V4 deployments, including SparkLend integration. The protocol currently faces approximately $177 million in bad debt, predominantly concentrated on Arbitrum. Total Value Locked across Aave ecosystem dropped from $26 billion to $18 billion, representing $8-14 billion in outflows as liquidity providers withdrew capital.
The contagion extended beyond Aave, with over 15 protocols implementing emergency bridge pauses. WETH lending pools experienced 100% utilization rates, creating secondary liquidation risks for leveraged positions. KelpDAO has blacklisted the exploiter addresses and claims to have prevented an additional $95 million in follow-up attack attempts.
Disputed Root Cause Analysis
A significant dispute exists between KelpDAO and LayerZero regarding fundamental responsibility. LayerZero maintains that KelpDAO's 1-of-1 DVN configuration deviated from recommended security practices, emphasizing that the protocol itself contained no vulnerabilities and that the incident was isolated to rsETH infrastructure. LayerZero has subsequently patched affected DVN and RPC systems.
KelpDAO counters that LayerZero's default documentation and quickstart configurations recommended the 1-of-1 setup, arguing that the infrastructure provider bears responsibility for RPC node security. Both parties agree that no smart contract bugs were exploited; the root cause centers on trust assumptions within single-point-of-failure configurations.
DeFi Security Implications
The incident exposes critical vulnerabilities in cross-chain bridge architectures, particularly regarding RPC infrastructure security. RPC nodes have emerged as a systemic weak link, with most protocols relying on a limited set of providers without adequate failover diversification. The exploit demonstrates that even sophisticated multi-signature and verification systems can be compromised when underlying data sources are poisoned.
Industry analysts recommend immediate implementation of multi-DVN configurations, diversified RPC provider networks, and real-time configuration auditing systems. The modular security architecture of LayerZero contained blast radius to rsETH specifically, with no other OFT or OApp contracts affected, suggesting that cross-chain messaging frameworks can maintain resilience even during targeted infrastructure attacks.
Current Status & Recovery Efforts
Aave governance is currently debating debt socialization mechanisms to address the bad debt situation. KelpDAO, LayerZero, and Aave have established coordination channels for recovery operations. Blockchain security collective Seal-911 is actively tracking fund movements, with portions of stolen assets identified flowing through Tornado Cash and other obfuscation protocols. Whitehat negotiation channels remain open, though no recovery has been confirmed at time of writing.
The exploit establishes a new record for 2026 DeFi hacks, surpassing the $285 million Drift Protocol incident from April 1. The incident reinforces ongoing concerns regarding bridge security as the primary attack vector in DeFi, with cross-chain infrastructure remaining the ecosystem's most contested security frontier.
#KelpDAO #DeFiSecurity #BridgeExploit #CryptoNews
repost-content-media
  • Reward
  • Comment
  • Repost
  • Share
#KelpDAOBridgeHacked
🚨 KelpDAO Bridge Hack Shakes DeFi Ecosystem – $292M Drained!
The crypto space witnessed a major security incident as the KelpDAO cross-chain bridge was exploited, resulting in the loss of approximately $292 million worth of rsETH. The attack targeted vulnerabilities in the bridge’s verification mechanism, allowing malicious transactions to be executed without proper validation.
According to early reports, the stolen assets were quickly moved across multiple DeFi protocols, raising concerns about cross-chain bridge security and systemic risk in the ecosystem. Several plat
post-image
  • Reward
  • 13
  • Repost
  • Share
Yajing:
To The Moon 🌕
View More
#KelpDAOBridgeHacked
The incident behind #KelpDAOBridgeHacked marks one of the most significant DeFi security events of the year, reinforcing a recurring structural vulnerability within the ecosystem—cross-chain bridge design.
A large-scale exploit targeting KelpDAO’s infrastructure resulted in the loss of approximately $290M+ worth of rsETH, making it one of the largest DeFi hacks in 2026. This was not a traditional smart contract failure, but rather a breakdown in how cross-chain communication was validated.
At its core, the attack exploited trust assumptions.
The attacker was able to send
post-image
  • Reward
  • 14
  • Repost
  • Share
HighAmbition:
Just charge it 👊
View More
🛡️ Web3 Security Guide – Protect Your Crypto Assets! 🔑
As the Web3 ecosystem grows, so do the risks. From DeFi protocols to NFTs and smart contracts, staying secure is non-negotiable. Here’s your ultimate guide to navigating Web3 safely: 🌐✨
🔹 1️⃣ Use Secure Wallets
Prefer hardware wallets for long-term storage 🖥️🔒
Enable multi-factor authentication on all accounts 🔑📱
🔹 2️⃣ Verify Smart Contracts & DApps
Always audit or research before interacting 💻
Check community reviews and official sources ✅
🔹 3️⃣ Beware of Phishing & Scams
Avoid clicking unknown links ⚠️
Double-check URLs and so
  • Reward
  • 1
  • Repost
  • Share
EagleEye:
good work thanks for sharing
#Web3SecurityGuide
#Gate广场四月发帖挑战
The Only Security Guide That Matters in 2026 — Because the Attackers Are Already Three Steps Ahead of You
January 2026 alone saw $370.3 million in cryptocurrency stolen through exploits and scams — the highest single-month total in 11 months, according to CertiK data. Of that figure, $311 million came from phishing alone. In the first three months of 2026, before the Drift Protocol hack added another $285 million to the ledger, DeFi protocols had already bled over $137 million across 15 separate incidents. And sitting underneath all of it is a baseline realit
post-image
post-image
post-image
  • Reward
  • 8
  • Repost
  • Share
Luna_Star:
To The Moon 🌕
View More
#DriftProtocolHacked
“In decentralized finance, speed is power—but when security fails, that same speed turns into systemic risk. The incident is not just an exploit, it is a live demonstration of how fragile trust, liquidity, and protocol design can be under pressure.”
The recent exploit involving Drift Protocol has once again placed the spotlight on the structural vulnerabilities within the DeFi ecosystem. As a high-performance decentralized exchange operating on fast and low-cost infrastructure, Drift Protocol had built strong traction among traders seeking efficiency and leverage. However
DRIFT3,91%
post-image
  • Reward
  • 1
  • Repost
  • Share
ybaser:
To The Moon 🌕
#DriftProtocolHacked
“In decentralized finance, speed is power—but when security fails, that same speed turns into systemic risk. The incident is not just an exploit, it is a live demonstration of how fragile trust, liquidity, and protocol design can be under pressure.”
The recent exploit involving Drift Protocol has once again placed the spotlight on the structural vulnerabilities within the DeFi ecosystem. As a high-performance decentralized exchange operating on fast and low-cost infrastructure, Drift Protocol had built strong traction among traders seeking efficiency and leverage. However
DRIFT3,91%
post-image
  • Reward
  • 14
  • Repost
  • Share
xxx40xxx:
To The Moon 🌕
View More
#CryptoMarketSeesVolatility Drift Protocol Hack: DeFi Governance Under Fire
The crypto market received a harsh reminder on April 2026: DeFi risk is no longer limited to smart contracts; governance is now a primary vulnerability. Drift Protocol, one of Solana’s largest derivatives platforms, suffered a devastating exploit that drained approximately $280–$285 million. Initially dismissed as an April Fools rumor, it quickly emerged as a sophisticated administrative takeover, marking the largest crypto hack of 2026 so far and one of the most significant incidents in Solana DeFi history.
This was n
DRIFT3,91%
SOL2,45%
USDC0,01%
BTC1,99%
Dubai_Prince
#CryptoMarketSeesVolatility Drift Protocol Hack: DeFi Governance Under Fire
The crypto market received a harsh reminder on April 2026: DeFi risk is no longer limited to smart contracts; governance is now a primary vulnerability. Drift Protocol, one of Solana’s largest derivatives platforms, suffered a devastating exploit that drained approximately $280–$285 million. Initially dismissed as an April Fools rumor, it quickly emerged as a sophisticated administrative takeover, marking the largest crypto hack of 2026 so far and one of the most significant incidents in Solana DeFi history.
This was not a simple code vulnerability. The attacker leveraged Solana’s durable nonce transactions and compromised signer approvals to seize Security Council powers, bypass withdrawal protections, weaken vault controls, and drain major assets including USDC, SOL, wrapped BTC, and collateral funds. Preparation reportedly took days to weeks, highlighting the strategic depth and operational sophistication behind the exploit.
Before the hack, Drift held nearly $550 million in TVL, reflecting strong liquidity and market trust. The immediate market reaction was sharp: the DRIFT token collapsed, deposits and withdrawals were paused, and total value locked rapidly decreased as liquidity exited the ecosystem.
This incident underscores a critical lesson for all participants in DeFi: human-layer security is often more fragile than the code itself. Even robust multisig setups fail if signers are compromised through social engineering or procedural oversights. Features intended to enhance reliability, such as delayed transactions, can be weaponized when combined with compromised administrative access.
For DeFi users, the immediate focus should be on avoiding new deposits, auditing and revoking unnecessary wallet approvals, securing assets in isolated wallets, and strictly following official protocol updates.
For the broader DeFi ecosystem, Drift’s collapse raises urgent questions about governance: How secure are multisig controls? Can delayed transaction mechanisms be abused again? How should admin access and key management evolve to prevent similar attacks? This hack may accelerate adoption of hardware-enforced keys, stricter signer isolation, governance circuit breakers, and transparent administrative oversight.
Drift Protocol is now more than a news story; it is a case study for 2026, highlighting that operational security and governance are now as critical as code integrity. Traders, developers, and protocol designers must internalize this: trust in humans is the new vulnerability. DeFi participants who fail to adapt risk exposure, capital, and market confidence.
#DriftProtocolHacked #DeFiSecurity #SolanaDeFi #BlockchainStrategy #CryptoTradingInsights
repost-content-media
  • Reward
  • Comment
  • Repost
  • Share
#DriftProtocolHacked
#DriftProtocolHacked
Drift Protocol, one of Solana's largest decentralized perpetual futures exchanges, suffered a massive $285 million exploit on April 1, 2026, marking the largest crypto hack of the year so far. The attacker gained unauthorized access through a novel durable nonce attack combined with sophisticated social engineering, taking over Drift's Security Council administrative powers. This wasn't a smart contract bug — the attacker manufactured a fictitious "CarbonVote Token" with minimal liquidity, and Drift's oracles treated it as legitimate collateral worth
DRIFT3,91%
SOL2,45%
ON5,46%
post-image
  • Reward
  • Comment
  • Repost
  • Share
Load More