KelpDAO Loses $290M in Lazarus Group LayerZero Attack

ZRO-4,15%
CORE8,29%
CYBER2,29%

KelpDAO suffered a $290 million loss on April 18 in a sophisticated security breach linked to the Lazarus Group, specifically an actor known as TraderTraitor, according to early reports. The attack targeted LayerZero infrastructure and exploited configuration weaknesses in KelpDAO’s verification systems. David Schwartz noted on April 20, 2026, that “the attack was way more sophisticated than I expected and aimed at LayerZero infrastructure taking advantage of KelpDAO laziness.”

How the Attack Happened

The attack employed a multi-stage approach rather than a simple exploit. Attackers first targeted the RPC system used by LayerZero’s verification network, then launched a DDoS attack to disrupt normal operations. When the system switched to backup nodes, attackers executed their key objective: those backup nodes had already been compromised, allowing them to send false signals and confirm transactions that never actually occurred. Notably, no core protocol or private keys were broken. Instead, the attack exploited weak points in the system’s configuration, demonstrating the sophistication of modern cyber threats.

Single Point of Failure as Root Cause

The fundamental vulnerability stemmed from KelpDAO’s configuration design. The platform relied on a 1-of-1 verification setup, meaning only a single verifier confirmed transactions with no backup verification layer. Once that single system was compromised, the attack succeeded without any secondary defense. Experts noted this created a clear single point of failure. LayerZero had previously recommended using multiple verifiers, and a multi-layer verification setup could have prevented the attack entirely.

Impact and Scope

While the loss was substantial, damage remained contained to a specific area. Reports confirm the breach affected only KelpDAO’s rsETH product, with other assets and applications remaining unaffected. LayerZero quickly replaced the compromised systems and restored normal operations. Teams are working with investigators to track the stolen funds. The incident has raised industry-wide concerns about configuration security in advanced systems.

Implications for Crypto Security

The incident underscores that security depends not only on code strength but also on system configuration and management practices. The involvement of the Lazarus Group—a cyber group historically linked to large-scale exploits—adds significant concern, as their methods continue to evolve. Going forward, projects may increasingly prioritize redundancy and risk control mechanisms. Multi-layer verification could become an industry standard. The KelpDAO attack serves as a warning that even one weak point in system architecture can result in massive losses. As the crypto space expands, security practices must evolve proportionally.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Seven Israeli Officers Charged in Multimillion-Dollar Crypto Theft Ring

Israeli Security Forces Charged in Crypto Theft Case Israeli authorities have charged seven military and police officers with running a multimillion-dollar theft and bribery ring involving cryptocurrency, marking the second crypto-related criminal case to hit the country's defence establishment in

CryptoFrontier30m ago

Ice Open Network Suffers Data Breach; User Emails and 2FA Phone Numbers Exposed

Ice Open Network reported a security breach on April 15, revealing unauthorized access to user data, including email addresses and 2FA phone numbers, but no financial data was compromised. The incident, linked to former partners of a service provider, is under legal review, and users are advised to update security settings. The breach highlights escalating security issues in the crypto sector, with significant losses reported in recent months.

GateNews3h ago

Russian Crypto Exchange Grinex Halts Operations After $13M Hack, Threatening Sanctions Evasion Network

Russian cryptocurrency exchange Grinex ceased operations after a cyberattack caused losses over $13 million. The shutdown impacts Russian businesses' ability to convert rubles internationally and challenges the country's shadow finance system.

GateNews5h ago

Kelp DAO Hack Attributed to Lazarus Group; eth.limo Domain Hijacked via Social Engineering

LayerZero reported that the Kelp DAO exploit, attributed to North Korea's Lazarus Group, led to a loss of $292 million in rsETH tokens due to vulnerabilities in its decentralized verifier network. Additionally, eth.limo faced a domain hijacking from a social engineering attack, but DNSSEC mitigated severe damage.

GateNews9h ago

DeFi Hack Triggers $9 Billion in Outflows from Aave as Stolen Tokens Used as Collateral

A recent hack draining nearly $300 million from a crypto project led to a liquidity crisis on Aave, causing users to withdraw around $9 billion. Concerns over collateral quality prompted mass withdrawals, highlighting risks in DeFi lending.

GateNews10h ago
Comment
0/400
GlassDomeBaskingInMoonlightvip
· 13h ago
I hope they can disclose a more detailed review: attack paths, permission change records, why alerts didn't trigger, which would be more valuable to the industry.
View OriginalReply0
0xLateAgainvip
· 13h ago
Users also need to learn their lesson; don't keep large amounts of long-term funds in a single protocol. Diversification and limits are the real defense.
View OriginalReply0
LendingPoolObservervip
· 13h ago
Ultimately, it's a trade-off between "usability" and "security"; taking shortcuts can easily lead to being compromised.
View OriginalReply0
SecondaryMarketDesertervip
· 14h ago
With this level of funding, you should assume you are the target of the national team, and your baseline configuration and continuous monitoring should be sufficiently robust.
View OriginalReply0
GateUser-8e84d799vip
· 14h ago
Single sign-on verification = single point of failure, it was long overdue to implement multi-signature + multi-layer approval + risk control thresholds, at least to reduce the explosion radius.
View OriginalReply0