Start now →

LayerZero blames Kelp's setup for $290 million exploit, attributes it to North Korea's Lazarus

By Shaurya Malwa · Published April 20, 2026 · 5 min read · Source: CoinDesk
Web3Security
TechShare this articleX (Twitter)LinkedInFacebookEmail

LayerZero blames Kelp's setup for $290 million exploit, attributes it to North Korea's Lazarus

LayerZero said the attackers compromised two RPC nodes the company's verifier relied on and DDoS'd the rest, with the attack working only because Kelp had ignored multi-verifier recommendations.

By Shaurya Malwa Apr 20, 2026, 5:01 a.m. Make preferred on
North Korea flag

What to know:

LayerZero has placed responsibility for the $290 million Kelp DAO exploit on Kelp's own security configuration, saying the liquid restaking protocol ran a single-verifier setup that LayerZero had previously warned against.

The attack used a novel vector targeting the infrastructure layer rather than any protocol code.

Attackers, whom LayerZero attributed with preliminary confidence to North Korea's Lazarus Group and its TraderTraitor subunit, compromised two of the remote procedure call (RPC) nodes that LayerZero's verifier relied on to confirm cross-chain transactions.

RPC nodes are the servers that let software read and write data on a blockchain, and LayerZero's verifier used a mix of internal and external ones for redundancy.

The attackers swapped the binary software running on two of those nodes with malicious versions designed to tell LayerZero's verifier that a fraudulent transaction had occurred, while continuing to report accurate data to every other system querying those same nodes.

That selective lying was engineered to keep the attack invisible to LayerZero's own monitoring infrastructure, which queries the same RPCs from different IP addresses.

Compromising two nodes was not enough. LayerZero's verifier also queried uncompromised external RPC nodes, so the attackers ran a distributed denial-of-service attack on those to force failover to the poisoned ones.

Traffic logs LayerZero shared show the DDoS running between 10:20 a.m. and 11:40 a.m. Pacific Time on Saturday. Once the failover triggered, the compromised nodes told the verifier a valid cross-chain message had arrived, and Kelp's bridge released 116,500 rsETH to the attackers. The malicious node software then self-destructed, wiping binaries and local logs.

The attack only worked because Kelp ran a 1-of-1 verifier configuration, meaning LayerZero Labs was the sole entity verifying messages to and from the rsETH bridge.

LayerZero's public integration checklist and direct communications to Kelp had recommended a multi-verifier setup with redundancy, where consensus across several independent verifiers would be required to confirm a message. Under that configuration, poisoning one verifier's data feed would not have been enough to forge a valid message.

"KelpDAO chose to utilize a 1/1 DVN configuration," LayerZero wrote, using the protocol's term for decentralized verifier networks. "A properly hardened configuration would have required consensus across multiple independent DVNs, rendering this attack ineffective even in the event of any single DVN being compromised."

LayerZero said it has confirmed zero contagion to any other application on the protocol. Every OFT-standard token and application running multi-verifier setups was unaffected.

The LayerZero Labs verifier is back online, and the company said it will no longer sign messages for any application running a 1-of-1 configuration, forcing a protocol-wide migration off single-verifier setups.

The architectural distinction matters for how DeFi prices LayerZero risk going forward.

A protocol-level bug would have implied every OFT token on every chain was potentially at risk. However, a configuration failure by a single integrator, combined with a targeted infrastructure attack, implies the protocol worked as designed and that Kelp's security choices, not LayerZero's code, created the opening.

Kelp has not yet publicly responded to LayerZero's framing or addressed why it operated a 1-of-1 verifier setup despite the explicit recommendations against it.

Lazarus Group has been linked to the Drift Protocol exploit on April 1 and now Kelp on April 18, meaning the same North Korean unit has drained more than $575 million from DeFi in 18 days through two structurally different attack vectors: social engineering governance signers at Drift and poisoning infrastructure RPCs at Kelp.

The group is adapting its playbook faster than DeFi protocols are hardening their defenses.

More For You

Hack at Vercel sends crypto developers scrambling to lock down API keys

By Sam Reynolds, AI Boost|Edited by Aoyon Ashraf4 hours ago
Hacker (Getty Images/Seksan Mongkhonkhamsao)

Breach tied to compromised AI tool may have exposed credentials used by app frontends, the user-facing layer that connects web3 wallets and trading interfaces to backend services.

What to know:

Read full storyLatest Crypto News Oil tanker at sea. (Gerhard Traschütz/Pixabay)

Bitcoin, ether, solana slide, oil jumps on renewed U.S.-Iran war risks

24 minutes ago
(Andrei Akushevich/Getty Images)

The $13 billion DeFi wipeout in two days, and it started with KelpDAO attack

1 hour ago
Hacker (Getty Images/Seksan Mongkhonkhamsao)

Hack at Vercel sends crypto developers scrambling to lock down API keys

4 hours ago
Glasses in front of monitors with code (Kevin Ku/Unsplash)

The $292 million Kelp exploit: how it happened, and what it means for DeFi

7 hours ago
Consensus is coming soon to a Miami near you. (Nikhilesh De/CoinDesk)

Previewing Consensus' Policy Summit: State of Crypto

11 hours ago
btcproblemsolving

Web3 VCs have a differentiation problem

11 hours ago
Top Stories(Getty Images)

'DeFi is dead': crypto community scrambles after this year's biggest hack exposes contagion risk

12 hours ago
A bulk carrier shrouded in mist awaits entry to the Strait of Hormuz

Bitcoin falls back to $76,000 as Iran shuts Hormuz again

Apr 18, 2026
Aave Labs founder Stani Kulechov and Ethena founder + CEO Guy Young (Margaux Nijkerk/ CoinDesk)

Aave sees $6 billion deposit drop as Kelp hack exposes structural risk for DeFi lender

15 hours ago
Every two to three days, a crypto investor or executive is kidnapped or their home invaded by criminals who have some how found out they have digit5al assets. ((Stephanie LeBlanc/Unsplash)

Inside the rise of wrench attacks against crypto holders and how France has become the focus

16 hours ago
Bitcoin slides back into familiar range (Shutterstock)

RaveDAO's RAVE token collapses 90% in a day as exchange probes widen

15 hours ago
This article was originally published on CoinDesk and is republished here under RSS syndication for informational purposes. All rights and intellectual property remain with the original author. If you are the author and wish to have this article removed, please contact us at [email protected].

NexaPay — Accept Card Payments, Receive Crypto

No KYC · Instant Settlement · Visa, Mastercard, Apple Pay, Google Pay

Get Started →