#rsETHAttackUpdate


The recent security incident involving Kelp DAO's rsETH token occurred on April 18, 2026. Attackers successfully drained approximately $292 million (116,500 rsETH) from the protocol.

The exploit has been attributed by security analysts to the North Korea-linked Lazarus Group.

How the Attack Happened

The incident was a sophisticated attack on off-chain infrastructure rather than a vulnerability in the smart contracts themselves.

Forged Cross-Chain Message: The attackers bypassed the security of the bridge by forging a cross-chain message that mimicked a legitimate transaction.

Infrastructure Compromise: The target was the LayerZero-powered bridge adapter. The attackers compromised internal RPC nodes associated with the Decentralized Verifier Network (DVN) and simultaneously launched a DDoS attack against external nodes.

Verification Failure: By poisoning the verification process, they forced the system to rely on falsified data, leading the bridge to release 116,500 rsETH on Ethereum without an actual corresponding "burn" or collateral backing upstream.

Collateral Exploitation: Following the unauthorized minting of these "phantom" tokens, the attackers used them as collateral on Aave to borrow other assets, which caused significant stress and liquidity outflows across the DeFi ecosystem.

Immediate Impact and Response

Protocol Pauses: Kelp DAO promptly paused its rsETH contracts across mainnet and various Layer-2 networks upon identifying the suspicious activity.

DeFi Precautions: Major lending protocols, including Aave, moved to freeze rsETH markets to protect their platforms and users. Other protocols with exposure, such as those integrated with Lido, also suspended deposits or took precautionary measures.

Attempted Second Attack: Following the initial theft, the attackers attempted a second, smaller drain of an additional 40,000 rsETH (~$95 million), but this was thwarted after Kelp DAO blacklisted the attackers' addresses and paused the relevant contracts.

This event has sparked significant discussion within the industry regarding the reliance on single-point-of-failure configurations in bridge security and the necessity for "invariant-level" monitoring rather than just individual call verification.
$AAVE
AAVE0.65%
post-image
post-image
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 8
  • Repost
  • Share
Comment
Add a comment
Add a comment
MasterChuTheOldDemonMasterChu
· 10m ago
Just charge forward 👊
View OriginalReply0
MasterChuTheOldDemonMasterChu
· 10m ago
Just charge forward 👊
View OriginalReply0
ybaser
· 35m ago
Buy To Earn 💰️
Reply0
ChuDevil
· 53m ago
Steadfast HODL💎
View OriginalReply0
ChuDevil
· 53m ago
Just charge forward 👊
View OriginalReply0
NexaCrypto
· 1h ago
LFG 🔥
Reply0
HighAmbition
· 1h ago
thnxx for the update
Reply0
Ryakpanda
· 1h ago
Just charge forward 👊
View OriginalReply0
  • Pin