{"id":26289,"date":"2026-04-20T07:49:47","date_gmt":"2026-04-20T07:49:47","guid":{"rendered":"https:\/\/bitunikey.com\/news\/layerzero-links-kelp-dao-exploit-to-lazarus-as-defi-losses-deepen\/"},"modified":"2026-04-20T07:49:56","modified_gmt":"2026-04-20T07:49:56","slug":"layerzero-links-kelp-dao-exploit-to-lazarus-as-defi-losses-deepen","status":"publish","type":"post","link":"https:\/\/bitunikey.com\/news\/layerzero-links-kelp-dao-exploit-to-lazarus-as-defi-losses-deepen\/","title":{"rendered":"LayerZero links Kelp DAO exploit to Lazarus as DeFi losses deepen"},"content":{"rendered":"<p><\/p>\n<div class=\"post-detail__content blocks\">\n<p><strong>LayerZero said North Korea\u2019s Lazarus Group is the likely actor behind the Kelp DAO exploit that drained 116,500 rsETH worth about $292 million.\u00a0<\/strong><\/p>\n<div id=\"cn-block-summary-block_8af2498180026b8447388cfe28b99c11\" class=\"cn-block-summary\">\n<div class=\"cn-block-summary__nav tabs\">\n        <span class=\"tabs__item is-selected\">Summary<\/span>\n    <\/div>\n<div class=\"cn-block-summary__content\">\n<ul class=\"wp-block-list\">\n<li>LayerZero said Lazarus likely led the Kelp DAO exploit that drained 116,500 rsETH worth $292 million.<\/li>\n<li>LayerZero blamed Kelp DAO\u2019s single-DVN setup, saying no backup verifier blocked the forged cross-chain message.<\/li>\n<li>The exploit triggered over $10 billion in Aave outflows and a wider DeFi TVL drop.<\/li>\n<\/ul><\/div>\n<\/div>\n<p><!-- .cn-block-summary --><\/p>\n<p>The company said early indicators point to a \u201chighly-sophisticated state actor\u201d and named \u201cDPRK\u2019s Lazarus Group, more specifically TraderTraitor\u201d in its latest statement.<\/p>\n<p>The attack took place on April 18 and quickly became the largest DeFi exploit reported this year. LayerZero said the attacker targeted the system used to verify cross-chain messages, which allowed a false message to pass through and unlock tokens on the bridge.<\/p>\n<p>    <!-- .cn-block-related-link --><\/p>\n<h1 class=\"wp-block-heading\"><strong>Attack centered on node access and message forgery<\/strong><\/h1>\n<p>LayerZero <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/LayerZero_Core\/status\/2046081551574983137?s=20\" target=\"_blank\" rel=\"nofollow\">said<\/a> the attacker got access to the list of RPC nodes used by LayerZero Labs\u2019 decentralized verified network, or DVN. According to the company, the attacker then poisoned two of those nodes so they delivered a fake cross-chain message to the verifier network.<\/p>\n<p>At the same time, the attacker launched a DDoS attack against clean nodes, which pushed the DVN to rely on the poisoned nodes. LayerZero said this combination allowed the forged message to move through the system and trigger the token unlock that led to the loss.<\/p>\n<p>In addition, LayerZero said the damage became possible because Kelp DAO used a single 1-of-1 DVN setup with no backup verifier. The company said this created a single point of failure, leaving no independent check to reject the fake message before the bridge released funds.<\/p>\n<p>In its statement, LayerZero said \u201coperating a single-point-of-failure configuration meant there was no independent verifier to catch and reject a forged message.\u201d It also said \u201cLayerZero and other external parties previously communicated best practices around DVN diversification to KelpDAO.\u201d The company added that it will no longer sign messages for applications that use a 1\/1 DVN setup.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Aave outflows and DeFi pressure follow exploit<\/strong><\/h2>\n<p>The exploit spread stress across DeFi after the attacker moved stolen rsETH to Aave V3 and used it as collateral to borrow large amounts of WETH. This raised concern over possible bad debt on Aave and led the protocol to freeze rsETH markets on both V3 and V4.<\/p>\n<p>Aave founder Stani Kulechov <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/StaniKulechov\/status\/2045595382986559987\" target=\"_blank\" rel=\"nofollow\">said<\/a> \u201cRsETH has been frozen on Aave V3 and V4\u201d and added that the asset no longer has borrowing power because of the Kelp DAO bridge exploit. Historical data from Aavescan <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/aavescan.com\/protocol\/totals\" target=\"_blank\" rel=\"nofollow\">showed<\/a> more than $10 billion left Aave after the attack, with total supplied funds falling to $35.7 billion from $45.8 billion.<\/p>\n<p>The fallout extended beyond Aave. Several DeFi protocols, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/CatfishFishy\/status\/2045957724538650624\" target=\"_blank\" rel=\"nofollow\">including<\/a> Ethena, ether.fi, Tron DAO, and Curve Finance, paused LayerZero OFT bridges as a precaution.\u00a0<\/p>\n<p>DefiLlama data showed DeFi total value locked dropped 7% in 24 hours to about $86.3 billion, down from $99.5 billion on April 18. LayerZero said there is \u201czero contagion\u201d for other assets or applications using multi-DVN setups, while law enforcement efforts to trace the funds continue.<\/p>\n<p>    <!-- .cn-block-related-link --><\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>LayerZero said North Korea\u2019s Lazarus Group is the likely actor behind the Kelp DAO exploit that drained 116,500 rsETH worth about $292 million.\u00a0 Summary LayerZero said Lazarus likely led the&hellip;<\/p>\n","protected":false},"author":1,"featured_media":1981,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-26289","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrency"],"_links":{"self":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/26289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/comments?post=26289"}],"version-history":[{"count":1,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/26289\/revisions"}],"predecessor-version":[{"id":26290,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/26289\/revisions\/26290"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/media\/1981"}],"wp:attachment":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/media?parent=26289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/categories?post=26289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/tags?post=26289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}