Start now →

The $292 million Kelp DAO exploit shows why crypto bridges are still one of the industry's weakest links

By Margaux Nijkerk · Published April 22, 2026 · 6 min read · Source: CoinDesk
Web3Security
TechShare this articleX (Twitter)LinkedInFacebookEmail

The $292 million Kelp DAO exploit shows why crypto bridges are still one of the industry's weakest links

The problem is structural and as long as bridges depend on complex systems with shared infrastructure and hidden trust assumptions, they will remain vulnerable.

By Margaux Nijkerk|Edited by Nikhilesh De Apr 22, 2026, 4:01 p.m. Make preferred on
lock-broken

What to know:

The $292 million exploit tied to KelpDAO is the latest in a long line of crypto bridge hacks, underscoring how the systems designed to connect blockchains have become some of the easiest ways to break them.

The incident involved KelpDAO’s use of LayerZero’s cross-chain messaging system, a type of infrastructure widely used to move data and assets between blockchains.

Bridges are meant to let users move assets from one blockchain to another, like from Ethereum to a different network. But instead of acting as seamless connectors, they have repeatedly turned into weak points, draining billions of dollars over the past few years.

So why does this keep happening?

Crypto ecosystem leaders say the answer is not just bad code or careless mistakes. The problem is more fundamental; it is in how bridges are built in the first place.

The core problem: trusting the middleman

To understand the issue, it helps to look at what a bridge actually does.

If you move tokens from one blockchain to another, the second chain needs proof that your tokens existed and were locked on the first one. In an ideal world, it would verify that itself. In reality, that is too expensive and complex.

“Most bridges don’t fully verify what happened on another chain,” said Ben Fisch, CEO of Espresso Systems. “Instead, they rely on a smaller system to report it. That [second] system becomes the thing you trust.”

So instead of independently checking the truth, bridges outsource it, often to small validator groups or external networks like LayerZero or Axelar. That shortcut creates risk. In the Kelp DAO-related exploit, attackers targeted the data feeding into the bridge.

“Attackers compromised nodes and fed the system a false version of reality,” Fisch said. “The bridge worked as designed. It just believed the wrong information.”

Bridge hacks often look different on the surface. Some involve stolen keys, others faulty smart contracts. But experts say those are symptoms of a deeper issue. The real problem lies in how the systems are designed.

“Anything that can go wrong will go wrong, and bridge hacks are a perfect example,” said Sergej Kunz, co-founder of 1inch. “You see code vulnerabilities, centralization issues, social engineering, even economic attacks. Usually it’s a mix.”

How bridges work

For users, bridges look simple. You click a button and move assets from one blockchain to another. Behind the scenes, the process is more complicated.

First, your tokens are locked on the original blockchain. Then a separate system confirms that the tokens are locked. This system usually consists of a small group of operators or validators. Those operators then send a message to the second blockchain saying the tokens were locked so new ones can be issued. If that message is accepted, the second chain creates a new version of your tokens. These are wrapped tokens, like rsETH or WBTC.

The problem is that this process depends on trusting whoever sends that message. If attackers compromise that system, they can send a false message and create tokens that were never backed on the original chain.

“The worst case is when the system isn’t really checking anything,” Fisch said. “It’s just trusting someone else’s version of events.”

When one failure spreads

Given how often bridges fail, why has the industry not fixed them?

Part of the answer comes down to incentives. “Security is often not the top priority,” Kunz said. “Teams focus on launching quickly, growing users and increasing total value locked.”

Building secure systems takes time and money. Many DeFi projects operate with limited resources, making it difficult to invest heavily in audits, monitoring and infrastructure.

At the same time, projects are racing to support more blockchains. Each new integration adds complexity. “Every new connection adds more assumptions,” Fisch said.

Bridge hacks rarely stay contained. Bridged assets are used across lending protocols, liquidity pools and yield strategies. If those assets are compromised, the damage spreads.

“Other platforms may treat a hacked asset as legitimate,” Kunz said. “That’s how contagion happens.” Users are rarely told how a bridge actually works or what could go wrong.

There are ways to make bridges safer. Fisch says one key step is removing single points of failure by relying on independent data sources rather than shared infrastructure.

In practice, these “data sources” are computers that watch blockchains and report what happened. They might be run by the bridge itself, by outside networks like LayerZero, or by infrastructure providers. But many rely on the same underlying services, meaning a single compromised source can feed bad data across multiple systems.

“If everyone is relying on the same source, you haven’t reduced risk,” he said. “You’ve just copied it.”

Other approaches include hardware protections and better monitoring to catch misconfigurations early. Some developers are also working on designs that verify data directly using cryptography instead of intermediaries.

Kunz believes a more fundamental shift is needed. “As long as we rely on validator-based bridges, these problems will continue,” he said.

Read more: North Korea’s crypto heist playbook is expanding and DeFi keeps getting hit

Hack

More For You

The Protocol: Kelp DAO exploited for $292 million

By Margaux Nijkerk|Edited by Nikhilesh De37 minutes ago
Silhouette image of a hooded figure behind three screens.  (geralt/Pixabay)

Also: DPRK hacking crypto, Aave contagion and Coinbase on quantum computing.

What to know:

Welcome to The Protocol, CoinDesk's weekly wrap of the most important stories in cryptocurrency tech development. I’m Margaux Nijkerk, a reporter at CoinDesk.

In this issue:

Read full storyLatest Crypto News U.S. Treasury Department in Washington, D.C. (Jesse Hamilton/CoinDesk)

Banks seek to slow down implementation of crypto's GENIUS Act on stablecoin oversight

37 minutes ago
Silhouette image of a hooded figure behind three screens.  (geralt/Pixabay)

The Protocol: Kelp DAO exploited for $292 million

37 minutes ago
CoinDesk

Crypto Long & Short: Protecting the people building DeFi infrastructure

56 minutes ago
An engineer works with bitcoin mining rigs (Shutterstock)

Trump-linked American Bitcoin shares spike over 12% after announcing more mining power

1 hour ago
CoinDesk

Bitcoin breaks Strategy's STRC ex-dividend date slump for the first time in six months

1 hour ago
Bitcoin (BTC) price on April 22 Wednesday (CoinDesk)

Bitcoin tops $79,000 as crypto rally gathers steam; Circle, Coinbase, Strategy lead

1 hour ago
Top StoriesThe cuts came in the third quarter. (Danny Nelson/CoinDesk)

Crypto giant GSR launches its first ETF to give investors an easy way to bet on the big 3 tokens

2 hours ago
Calculator next to tax documentation (Kelly Sikkema/Unsplash)

Kraken filed 56 million crypto tax forms for 2025. One-third were below $1

4 hours ago
World Liberty Financial's Zak Folkman (Right) at Consensus Hong Kong on Feb. 19. (Nikhilesh De/CoinDesk)

Tron's Justin Sun sues Trump-linked World Liberty Financial over frozen assets

11 hours ago
Hacker facing screens with lines of code (Boitumelo/Unsplash)

Another DeFi protocol loses millions in hack days after KelpDAO breach

9 hours ago
BTC/USD (CoinDesk Data)

Bitcoin tests $78,000 resistance as short-squeeze risks mount, altcoins rally

6 hours ago
True Market Mean (CheckonChain)

A make or break moment: why $79,200 could act as a launchpad or a ceiling for bitcoin

8 hours ago
This article was originally published on CoinDesk and is republished here under RSS syndication for informational purposes. All rights and intellectual property remain with the original author. If you are the author and wish to have this article removed, please contact us at [email protected].

NexaPay — Accept Card Payments, Receive Crypto

No KYC · Instant Settlement · Visa, Mastercard, Apple Pay, Google Pay

Get Started →