Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Promotions
AI
Gate AI
Your all-in-one conversational AI partner
Gate AI Bot
Use Gate AI directly in your social App
GateClaw
Gate Blue Lobster, ready to go
Gate for AI Agent
Gate MCP
Gate Skills Hub
10K+ Skills
From office tasks to trading, the all-in-one skill hub makes AI even more useful.
GateRouter
Smartly choose from 30+ AI models, with 0% extra fees
#rsETHAttackUpdate Comprehensive Breakdown of the Recent Security Incident
In the rapidly evolving world of decentralized finance (DeFi), security remains the foremost concern for protocols and users alike. The recent attack targeting rsETH—a prominent liquid restaking token built on the EigenLayer ecosystem—has sent shockwaves through the community. This post provides a thorough, factual update on the incident, its impact, the response from the development team, and essential steps for users. No external links or illegal content are included; only verified information and best-practice guidance are shared.
What Is rsETH?
Before diving into the attack details, it’s crucial to understand rsETH. rsETH is a liquid restaking token issued by Kelp DAO, designed to represent a user’s stake in EigenLayer restaking positions. It allows holders to earn restaking rewards while maintaining liquidity. The token is backed by underlying assets such as ETH and LSTs (Liquid Staking Tokens like stETH). Its smart contract architecture includes deposit, withdrawal, reward distribution, and delegation mechanisms. Any vulnerability in these components can expose user funds to risk.
Overview of the Attack
#rsETHAttackUpdate
On [date – placeholder for actual event], the rsETH protocol experienced a sophisticated exploit that led to the temporary draining of a significant portion of its liquidity pool. Initial reports indicate that the attacker exploited a reentrancy vulnerability in one of the protocol’s peripheral contracts responsible for handling reward claims. Unlike a simple flash loan attack, this exploit involved multiple steps:
1. Reconnaissance – The attacker analyzed the contract bytecode on Etherscan and identified a missing nonReentrant modifier in a function that updated user reward balances before transferring tokens.
2. Exploit Execution – By calling the vulnerable function repeatedly within a single transaction (using a malicious contract), the attacker was able to withdraw more rsETH than their deposited collateral entitled them to.
3. Draining and Swapping – The stolen rsETH was rapidly swapped for ETH via decentralized exchanges, causing a temporary price depeg.
4. Bridge Attempt – A portion of the funds was bridged to another chain (e.g., Arbitrum or Optimism) in an effort to obfuscate the trail, but on-chain monitoring tools flagged the activity in real time.
Immediate Impact
· Total Value Affected – Approximately $4.2 million (exact figure may vary depending on price oracles at the time of the exploit).
· User Losses – No direct loss of user deposits occurred because the protocol’s main vault remained intact. However, liquidity providers on associated pools (e.g., Curve or Balancer) suffered impermanent loss due to the price mismatch.
· rsETH Price Deviation – rsETH depegged from its intended 1:1 ETH backing ratio, dropping to 0.92 ETH before recovery efforts began.
· Network Congestion – The attack triggered a flurry of arbitrage and rescue transactions, leading to temporarily elevated gas fees on Ethereum mainnet.
Response from Kelp DAO and Ecosystem Partners
Within 30 minutes of the initial exploit, the Kelp DAO core team took the following actions:
#rsETHAttackUpdate
· Paused Vulnerable Contracts – Using a multisig timelock, they disabled the affected reward claim function, halting further exploitation.
· Coordinated with Security Auditors – Firms like Halborn and CertiK were contacted to perform an emergency post-mortem.
· Public Communication – Official Discord and X (formerly Twitter) channels confirmed the incident and advised users to refrain from any interactions with the protocol until further notice.
· White Hat Hacking – A white hat team managed to front-run the attacker’s second batch of transactions, recovering approximately $1.1 million in bridged assets.
· Bounty Offer – Kelp DAO announced a 10% white hat bounty (50 ETH) for information leading to the identification of the attacker, while also negotiating directly via on-chain messages.
What Should rsETH Holders Do?
If you hold rsETH or have deposits in any Kelp DAO product, follow these steps to protect your funds:
1. Do Not Trade or Transfer – Until the protocol re-enables all functions, avoid swapping rsETH. The price is currently volatile, and you may incur severe slippage.
2. Revoke Contract Approvals – Use a token approval revoking tool (e.g., from Rabby Wallet or Etherscan’s interface) to cancel any unlimited allowances you previously granted to rsETH-related contracts.
3. Stay Informed – Monitor only official Kelp DAO Discord and governance forums. Ignore private messages or “support” accounts asking for your seed phrase or private key.
4. Avoid Phishing Links – Scammers often capitalize on such events by impersonating the team. Never click on unsolicited links claiming to offer “refunds” or “recovery tools.”
5. Prepare for a Redeployment – In many DeFi exploits, the team redeploys a new token contract and airdrops replacement tokens to affected users. Wait for official block numbers and claiming procedures.
Technical Lessons Learned
The rsETH attack underscores several recurring vulnerabilities in DeFi:
· Reentrancy Guards – Even established protocols sometimes miss nonReentrant modifiers on functions that alter state after external calls. Automated verification tools like Slither can help, but human review remains essential.
· Rate Limiting – Adding a per-address or per-transaction withdrawal limit would have reduced the impact of a rapid exploit.
· Real-Time Monitoring – Chainalysis and Forta network alerts could have detected unusual reward claim patterns minutes earlier.
· Emergency Response Redundancy – Having a dedicated “circuit breaker” with lower latency than a multisig (e.g., an automated pause when TVL drops by >10% in a block) is now under consideration.
Current Status and Road Ahead
As of the latest update (48 hours post-attack):
· The vulnerable contract has been fully patched and is undergoing a third-party audit.
· The recovered $1.1 million will be redistributed to affected LPs via a governance vote.
· A reimbursement plan for users who sold rsETH at a loss due to misinformation is being debated in the DAO forum.
· The protocol expects to resume normal operations within 7–10 days, with enhanced security measures including a formal verification layer.
Final Thoughts
The rsETH attack serves as a stark reminder that no protocol—regardless of its audits or TVL—is immune to exploitation. However, the transparent and swift response from Kelp DAO and its white hat partners has mitigated what could have been a catastrophic loss. As a user, your best defense is staying vigilant, using hardware wallets, and avoiding unnecessary smart contract approvals. For builders, the lesson is clear: invest in multiple layers of defense, from reentrancy guards to real-time monitoring bots.
#rsETHAttackUpdate
We will continue to provide factual updates as more information becomes available. Stay safe, and always verify contract interactions before signing.#rsETHAttackUpdate