#KelpDAOBridgeHacked


On April 18, 2026, Kelp DAO became the victim of the largest cryptocurrency exploit of the year when hackers drained approximately $292-294 million from its cross-chain bridge infrastructure. The attack targeted the protocol's LayerZero-powered bridge, which enables the transfer of rsETH (restaked Ether) tokens across multiple blockchain networks. This incident represents a significant breach in the decentralized finance ecosystem and has sent shockwaves throughout the crypto community.

What is Kelp DAO

Kelp DAO operates as a liquid restaking protocol that allows users to deposit popular staking tokens such as stETH or cbETH in exchange for rsETH tokens. These rsETH tokens represent "restaked" Ether, enabling users to earn yields on their idle cryptocurrency investments while maintaining liquidity. The protocol's bridge infrastructure, built using LayerZero technology, facilitates the movement of these tokens across more than 20 different blockchain networks including Base, Arbitrum, Linea, Blast, Mantle, and Scroll.

The Attack Mechanism

The exploit occurred through a sophisticated manipulation of the cross-chain messaging system. Attackers managed to send fake cross-network messages that appeared to be valid instructions, triggering the system to transfer 116,500 rsETH tokens to the attacker's address. This amount represented approximately 18% of the total circulating supply of rsETH at the time of the attack.

Security experts from Cyvers explained that the attacker exploited state validation and message passing vulnerabilities to bypass security measures and extract collateral. The technique allowed the creation of unbacked rsETH tokens, which were then used to borrow real assets like ETH. This mechanism demonstrates how cross-chain bridge exploits can escalate rapidly, creating not just a single protocol breach but a cross-protocol contagion event affecting multiple platforms simultaneously.

Immediate Response and Damage Control

Upon detecting suspicious cross-chain activity involving rsETH, Kelp DAO immediately paused all rsETH contracts across Ethereum mainnet and several layer-2 networks. The protocol coordinated with LayerZero, Unichain, auditors, and security experts to conduct a root cause analysis. This emergency response helped contain further damage but could not reverse the already stolen assets.

The attack triggered emergency freezes across multiple DeFi platforms. Aave, the largest DeFi lending protocol, froze its rsETH markets on both Ethereum and Arbitrum to prevent additional bad debt exposure. Industry estimates suggest Aave could face potential losses ranging from $123 million to $230 million due to this incident. Lido reported approximately $21.6 million in exposure through leveraged positions and indicated it might utilize a $3 million loss buffer to mitigate damages.

Attribution and Investigation

Multiple sources have attributed the attack to North Korean hackers, specifically the Lazarus Group, also known as TraderTraitor. LayerZero identified that on April 18, the attackers targeted its DVN (Decentralized Validator Network) by poisoning downstream RPC infrastructure. The attackers gained access to the list of RPCs used by the DVN, compromised two independent nodes running on separate clusters, and swapped out binaries running the op-geth nodes.

This attribution aligns with North Korea's established pattern of targeting cryptocurrency platforms. According to available data, North Korean hackers stole more than $2 billion in cryptocurrency during 2025, bringing their total haul since 2017 to approximately $6 billion. Security experts note that this attack demonstrates the familiar North Korean approach of patient intrusion, manipulation of trust, and detection suppression.

The Blame Game: Kelp DAO vs LayerZero

Following the incident, a dispute emerged between Kelp DAO and LayerZero regarding responsibility for the security breach. Kelp DAO claimed that LayerZero's default settings were the actual cause of the massive disaster, suggesting that the infrastructure provider's configuration choices created the vulnerability. LayerZero countered by stating that Kelp DAO's specific setup was at fault and emphasized that they had previously communicated best practices around DVN diversification to Kelp DAO.

This disagreement highlights the complex nature of accountability in decentralized finance, where multiple parties contribute to the security infrastructure of interconnected protocols. The incident raises important questions about responsibility allocation between protocol developers and infrastructure providers in the DeFi ecosystem.

Broader Implications for DeFi

The Kelp DAO hack has pushed total DeFi exploit losses for April 2026 beyond $600 million, making it one of the most damaging months in cryptocurrency history. This incident follows closely on the heels of the Drift Protocol exploit on April 1, 2026, which resulted in approximately $285 million in losses, also attributed to North Korean hackers.

The attack has reignited discussions about the security of cross-chain bridges, which have historically been among the most vulnerable components of the DeFi infrastructure. Despite numerous audits and security measures, bridges continue to present attractive targets for sophisticated attackers due to their complexity and the large amounts of value they secure.

The incident also exposed the interconnected nature of modern DeFi protocols. What began as an attack on Kelp DAO's bridge quickly cascaded into liquidity crises and bad debt situations across multiple platforms, demonstrating how vulnerabilities in one protocol can create systemic risks throughout the ecosystem.

Community Response and Market Impact

The crypto community has reacted with concern and introspection following the hack. The phrase "DeFi is dead" circulated on social media platforms as users grappled with the implications of yet another major exploit. Ethereum's price dipped to $2,300 on April 17, 2026, with prediction markets pricing in continued volatility.

The exploit has prompted calls for enhanced security measures, improved bridge designs, and greater transparency in DeFi protocols. Industry participants are increasingly recognizing that the current approach to cross-chain interoperability may require fundamental rethinking to achieve the security standards necessary for mainstream adoption.

Lessons and Future Considerations

The Kelp DAO bridge hack serves as a stark reminder of the risks inherent in cross-chain DeFi protocols. Several key lessons emerge from this incident:

First, the complexity of cross-chain bridges creates multiple attack vectors that sophisticated actors can exploit. Despite audits and security reviews, the interaction between different blockchain networks and messaging protocols introduces vulnerabilities that may not be apparent during standard security assessments.

Second, the interconnected nature of DeFi protocols means that exploits can rapidly cascade across multiple platforms, amplifying the damage beyond the initial breach. This systemic risk requires coordinated response mechanisms and improved isolation between protocols.

Third, the attribution to state-sponsored hackers highlights the evolving threat landscape in cryptocurrency security. Nation-state actors with substantial resources and patience pose a fundamentally different challenge than individual hackers or criminal groups.

Fourth, the dispute between Kelp DAO and LayerZero underscores the need for clearer accountability frameworks in DeFi infrastructure. When multiple parties contribute to a protocol's security, determining responsibility for failures becomes complex and can delay effective response and recovery efforts.

Conclusion

The Kelp DAO bridge hack represents a watershed moment for the DeFi industry in 2026. With nearly $300 million stolen and cascading effects across multiple protocols, the incident has exposed critical vulnerabilities in cross-chain infrastructure and highlighted the sophisticated capabilities of state-sponsored threat actors. As the industry continues to grapple with the aftermath, the attack serves as a powerful reminder that security must remain the paramount concern in the development of decentralized financial systems. The path forward will require not just technical improvements but also fundamental changes in how the industry approaches risk management, accountability, and cross-protocol coordination. Bhai is per picture banaa do la ke na aap puri post ko uthakar tasvir mein Dal dete ho Thoda Thoda sa mavad uthakar jabardast ek VIP tasvir banaa do meherbani Hogi
post-image
post-image
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 12
  • 1
  • Share
Comment
Add a comment
Add a comment
CryptoEye
ยท 2h ago
LFG ๐Ÿ”ฅ
Reply0
Falcon_Official
ยท 9h ago
To The Moon ๐ŸŒ•
Reply0
juttmunda
ยท 9h ago
2026 GOGOGO ๐Ÿ‘Š
Reply0
SoominStar
ยท 10h ago
To The Moon ๐ŸŒ•
Reply0
MasterChuTheOldDemonMasterChu
ยท 10h ago
Just charge and you're done ๐Ÿ‘Š
View OriginalReply0
Yajing
ยท 10h ago
To The Moon ๐ŸŒ•
Reply0
discovery
ยท 10h ago
LFG ๐Ÿ”ฅ
Reply0
discovery
ยท 10h ago
2026 GOGOGO ๐Ÿ‘Š
Reply0
Ryakpanda
ยท 12h ago
Just charge forward ๐Ÿ‘Š
View OriginalReply0
GateUser-68291371
ยท 12h ago
Hold tight ๐Ÿ’ช
View OriginalReply0
View More
  • Pin