
$292M stolen from KelpDao
Everyone’s first instinct is to look for a smart contract exploit. This wasn’t one.
No reentrancy. No key compromise. Core contracts worked exactly as designed.
What failed was the verification layer.
Here’s the breakdown:
- Attackers (linked to Lazarus Group) targeted the RPC infrastructure feeding LayerZero’s DVN
- Two RPC nodes were compromised, while the remaining honest nodes were DDoS’d
- This forced the verifier to rely entirely on poisoned data
- A forged cross-chain message was submitted and validated as legitimate
- Result: 116,500 unbacked rsETH (~$292M) released from escrow in a single transaction
The critical flaw wasn’t the attack itself. It was the setup:
- KelpDAO was running a 1-of-1 DVN configuration
- One verifier. No redundancy. No fallback
- ~$1B+ in assets secured by a single validation path
Once that verifier was compromised, the system had no way to reject a fake message.
Key takeaway:
Bridges don’t fail at execution - they fail at verification assumptions.
>Wanna know more?
We’ve broken this down in detail here: "KelpDAO rsETH $292M Bridge Exploit (Explained)"