LayerZero attributes $290 million Kelp DAO exploit to Lazarus Group via RPC compromise
LayerZero clarifies that the $290 million Kelp DAO exploit was not caused by its core protocol, pointing to an RPC vulnerability and the North Korean Lazarus Group.
LayerZero clarified that the $290 million exploit of Kelp DAO’s rsETH bridge resulted from external security configurations rather than a flaw in the LayerZero protocol.
LayerZero Labs has formally addressed the recent $290 million security breach involving Kelp DAO, asserting that the underlying interoperability protocol functioned as intended. The incident, which targeted the rsETH bridge, appears to be the result of a targeted operation by the Lazarus Group, a notorious North Korean state-sponsored hacking collective known for high-profile decentralized finance (DeFi) exploits. According to preliminary investigations by security firms and LayerZero developers, the attackers did not exploit a vulnerability within the LayerZero smart contracts. Instead, the breach was facilitated by a compromise of the RPC (Remote Procedure Call) nodes used by Kelp DAO. By gaining control over these nodes, the attackers were able to manipulate transaction data and authorize the drainage of assets from the bridge. The operation was notably sophisticated, reportedly involving a DDoS (Distributed Denial of Service) attack designed to overwhelm monitoring systems and distract the Kelp DAO security team during the execution of the theft. This multi-layered approach is a hallmark of the Lazarus Group, which has increasingly moved from simple phishing to complex infrastructure-level attacks on DeFi protocols. “The security of a bridge is only as strong as its most vulnerable endpoint,” a LayerZero spokesperson noted. “In this case, the decentralized infrastructure surrounding the bridge, specifically the RPC configuration, was the entry point. Our protocol performed according to its design, but the external security decisions left a window open for bad actors.” Kelp DAO has since paused all liquid restaking activities and is working with law enforcement and blockchain analytics firms to track the movement of the $290 million in stolen rsETH. The incident highlights a growing trend of supply chain attacks in the crypto space, where hackers target the middleware and service providers that connect users to blockchain protocols.
Market analysts suggest that this exploit may lead to stricter security standards for RPC providers and bridge operators. For now, the Kelp DAO community remains on high alert as the protocol attempts to formulate a recovery plan for affected users.
Disclaimer: This article is for informational purposes only and does not constitute advice of any kind. Readers should conduct their own research before making any decisions.
© Cryptopress. For informational purposes only, not offered as advice of any kind.
Latest Content
Lo Último
- Weekly Snapshot – Institutional Inflows Ignite Crypto Recovery
- LayerZero attributes $290 million Kelp DAO exploit to Lazarus Group via RPC compromise
- Bitcoin’s Fourth Halving Cycle Dramatically Underperforming Prior Ones
- RaveDAO’s RAVE token plunges 90% as Binance and Bitget launch manipulation probes
- Aave Faces Liquidity Crisis and $280M Bad Debt Following Kelp DAO Exploit
Related
- Aave Faces Liquidity Crisis and $280M Bad Debt Following Kelp DAO Exploit Aave ETH pool hits 100% utilization as a $292M exploit on Kelp DAO triggers a liquidity crunch, bad debt, and $5.4 billion in panic withdrawals....
- JSON-RPC JSON-RPC is a method for moving data between computer systems....
- LayerZero Airdrop With the expected launch of its token, $ZRO, is the time to prepare for a potential airdrop....
- Google Cloud Launches Ethereum-Compatible RPC Service The service aims to simplify blockchain interactions for developers....


