Skip to main content
Sign in

KelpDAO

avoid.net/kelpdao22/100·88% conf.
[AI-DRAFTED · AWAITING VERIFICATION][src:zachxbt]

Summary

KelpDAO (also KernelDAO) is an Ethereum-based liquid restaking protocol that issues rsETH, a yield-bearing token representing restaked positions via EigenLayer. On April 18, 2026, attackers attributed to North Korea's Lazarus Group (TraderTraitor subunit) exploited a single-verifier bridge configuration to mint 116,500 unbacked rsETH tokens worth approximately $292 million, making it the largest single DeFi exploit of 2026. The attack triggered cascading losses across Aave, SparkLend, and Fluid, sparked a $300 million+ industry recovery coalition (DeFi United), a legal dispute over $71 million frozen by Arbitrum's Security Council, and a protracted public blame dispute between KelpDAO and bridge provider LayerZero.

Have evidence about KelpDAO?

No evidence submitted yet — be the first.

On-chain audit

Editorial decisions, corrections, and updates are anchored on Solana.

Protocol Overview

KelpDAO is a liquid restaking protocol built on Ethereum and launched in November 2023. It was co-founded by Amitej Gajjala and Dheeraj Borra, who also run the liquid staking platform Stader Labs. KelpDAO allows users to deposit ETH or supported liquid staking tokens (LSTs), which are delegated to EigenLayer operators; users receive rsETH in return — a liquid, yield-bearing token representing the underlying restaked position. rsETH is designed to be composable across DeFi protocols including Aave, Uniswap, and Compound. The protocol is a subsidiary product of KernelDAO. Prior to the April 2026 exploit, KelpDAO reported over $2 billion in total value locked (TVL), with approximately 630,000 rsETH tokens in circulating supply. The protocol raised $9 million in a May 2024 private round led by SCB Limited, Laser Digital, and Binance Labs.

April 2026 Exploit: Attack Mechanics

On April 18, 2026, KelpDAO's rsETH bridge — built on LayerZero V2 infrastructure — was compromised in a sophisticated infrastructure-layer attack that resulted in the theft of approximately 116,500 rsETH tokens (roughly 18% of total circulating supply), valued at approximately $292 million. This was not a smart contract vulnerability: KelpDAO's on-chain code functioned as designed throughout the event, and no bugs were found in the rsETH token logic. The attack exploited a 'Decentralized Verifier Network' (DVN) configured in a 1-of-1 arrangement, meaning a single LayerZero Labs DVN was the sole verifier of cross-chain messages. Attackers allegedly gained access to two internal RPC nodes used by the DVN, swapping out node software to feed false blockchain data. Simultaneously, a distributed denial-of-service (DDoS) attack was launched against uncompromised external RPC nodes, forcing the DVN to fail over exclusively onto the two attacker-controlled nodes. Those poisoned nodes falsely reported that rsETH had been burned on the source chain (Unichain) when no such burn had occurred. The DVN, reading only from the compromised data sources, confirmed the fraudulent cross-chain message as valid, triggering the Ethereum-side contract to release 116,500 rsETH to attacker-controlled addresses. The malicious node software was programmed to self-destruct after execution, deleting binaries and logs to hinder forensic investigation. Security firm Halborn's post-mortem identified compounding failure factors beyond the 1-of-1 configuration, including the absence of on-chain circuit breakers that would automatically pause operations if a single transaction minted an unusually large proportion of total supply. OpenZeppelin noted in a published analysis that the exploit was undetectable by any conventional smart contract audit, as every on-chain transaction appeared technically valid; the root cause resided entirely at the operational infrastructure layer.

DPRK Attribution and Lazarus Group

LayerZero Labs and blockchain intelligence firm TRM Labs attributed the April 18, 2026 KelpDAO exploit to TraderTraitor, a subunit of North Korea's Lazarus Group operating under DPRK state direction. TRM Labs' attribution methodology relied on on-chain analysis of both pre-attack funding patterns and post-attack laundering behavior. Pre-attack funding for the exploit was allegedly traceable to a Bitcoin wallet associated with Wu Huihui, a Chinese crypto broker indicted in 2023 for laundering prior Lazarus Group thefts dating to at least 2018. Following the theft, approximately $175 million in ETH was routed through THORChain — a cross-chain liquidity protocol that does not require KYC — and converted to Bitcoin. Additional obfuscation was achieved through Umbra, an Ethereum privacy tool, before final Bitcoin conversion. TRM Labs reported that the ongoing laundering phase was executed primarily by Chinese intermediaries rather than North Korean operators directly, consistent with the previously documented TraderTraitor playbook. North Korea officially denied the TRM Labs attribution. Taken together with the April 1, 2026 Drift Protocol exploit ($285 million), which TRM Labs also attributed to DPRK-linked actors, North Korean state-sponsored hackers are alleged to account for approximately 76% of all crypto hack losses through April 2026 — totaling approximately $577 million — from just two incidents. TRM Labs reported that North Korea's cumulative attributed crypto theft since 2017 has surpassed $6 billion.

Aave Contagion and DeFi Systemic Impact

Because the stolen rsETH was still tradable at the time of the exploit, the attacker deposited approximately 89,567 rsETH (out of the 116,500 stolen) into Aave V3 markets as collateral and borrowed approximately $190 million in ETH and other assets across Ethereum and Arbitrum. This usage of unbacked collateral created significant bad debt exposure for Aave, which immediately froze rsETH and wrsETH markets across 11 instances. The Aave Governance Forum's incident report outlined two scenarios for potential bad debt depending on how KelpDAO allocates the underlying loss across its rsETH exchange rate. Under Scenario 1 (uniform loss socialization across all rsETH holders), Aave faced approximately $123.7 million in bad debt, with the heaviest proportional hit on Mantle (9.54% shortfall) and Ethereum Core ($91.8 million). Under Scenario 2 (losses isolated to Layer 2 networks), bad debt rises to approximately $230.1 million, with Mantle (71.45% shortfall) and Arbitrum (26.67% shortfall) most severely impacted. SparkLend and Fluid also froze their rsETH markets. Total value locked across DeFi fell by $13.21 billion in the 48 hours following the exploit, driven by $8.45 billion in Aave deposit outflows alone. Aave's TVL drop of approximately $6 billion was separately reported. The KuCoin research team summarized the Aave bad debt at approximately $177 million in a widely-cited figure that sits between the two official Aave governance scenarios.

Arbitrum Emergency Freeze and Legal Dispute

On April 21, 2026, the Arbitrum Security Council froze 30,766 ETH (approximately $71 million) of attacker-linked funds held on Arbitrum One, coordinating with law enforcement. This intervention prevented the movement of a substantial portion of the stolen assets but immediately ignited a debate about centralization and the nature of decentralized governance. A DeFi United recovery proposal co-authored by Aave Labs, KelpDAO, LayerZero, and EtherFi called for releasing the frozen funds into the DeFi United recovery pool. Over 90.5% of voting Arbitrum stakeholders — representing 173.9 million ARB tokens — approved the motion. However, families holding unpaid terrorism judgments against North Korea, with total claims exceeding $877 million excluding interest, filed for a court order with the U.S. District Court for the Southern District of New York. On approximately May 1, 2026, the court issued a restraining order barring Arbitrum DAO from moving the 30,766 ETH. Aave LLC filed an emergency motion to void the restraining notice. As of early May 2026, a Manhattan federal judge modified the restraining order to permit transfer of the funds to an Aave LLC-controlled wallet, but Aave agreed to be bound by the restraining notice as though served directly, meaning the terrorism creditors' claims on the funds legally survive the transfer. The episode produced a broad discussion about a structural irony: the Arbitrum Security Council's centralized emergency freeze — which brought the assets within the jurisdictional reach of a U.S. federal court — was the same mechanism that gave terrorism creditors a legal foothold to assert their claims.

DeFi United Recovery Effort

In the days following the exploit, an industry coalition branded 'DeFi United' was assembled, led by Aave service providers, to restore backing for rsETH and prevent cascading bad debt. Major pledges included 5,000 ETH from Aave founder Stani Kulechov personally, 5,000 ETH from EtherFi, and a total of 10,000 ETH from LayerZero (5,000 ETH to the DeFi United pool and 5,000 ETH directly into Aave liquidity). Lido Finance and other DeFi participants also contributed. The DeFi United coalition ultimately raised over $300 million in ETH across multiple participants. The recovery plan operates in two phases: first, contributors slowly convert their pledged ETH into rsETH and deposit it into the Kelp DAO bridge lockbox contract to restore backing; second, the attacker's remaining uncollected positions on Aave and Compound are liquidated through special governance-authorized procedures. The goal is to fully restore rsETH's exchange rate to pre-hack parity and unfreeze markets on all affected chains. Additionally, Aave DAO separately proposed using 25,000 ETH from its treasury to cover the rsETH shortfall, given the DAO treasury held approximately $181 million in assets at the time. The recovery process remains ongoing as of early May 2026, with rsETH trading around $2,420 — approximately 6-7% below pre-hack value — reflecting partial but incomplete restoration of backing.

LayerZero Blame Dispute and Subsequent Apology

In the immediate aftermath of the exploit, LayerZero published an incident statement that framed the attack as the result of a configuration choice made by KelpDAO — specifically, KelpDAO's selection of a 1-of-1 DVN setup despite LayerZero's documented recommendations for multi-DVN redundancy. LayerZero stated that the LayerZero protocol itself had functioned exactly as intended and that the incident was isolated to rsETH due to its application-level security configuration. KelpDAO publicly disputed this account on April 20, 2026, arguing that the single-verifier setup was the default configuration recommended in LayerZero's own developer documentation, quickstart guides, and examples. KelpDAO further asserted on approximately May 5, 2026, that LayerZero personnel had explicitly reviewed and approved the specific configuration later cited as the cause of the exploit. On May 9, 2026, LayerZero reversed its position in a public blog post, writing 'First things first: an overdue apology' and acknowledging 'We've done a terrible job on comms over the past three weeks.' LayerZero stated: 'We believe developers should choose their own security configurations, but we made a mistake by allowing our DVN to act as a 1/1 DVN for high-value transactions.' The company announced that the LayerZero Labs DVN would no longer service 1-of-1 DVN configurations, and that default settings across all pathways would be migrated to require a minimum of five verifiers where possible, with a floor of three on chains with limited DVN availability. KelpDAO announced its migration away from LayerZero to Chainlink's Cross-Chain Interoperability Protocol (CCIP). Solv Protocol ($700 million in tokenized bitcoin assets) and Re (reUSD stablecoin) separately announced migrations from LayerZero to Chainlink CCIP following security reviews prompted by the KelpDAO incident.

April 2026 Macro Context and Systemic Risk

The KelpDAO exploit was the single largest DeFi hack of 2026, surpassing the April 1, 2026 Drift Protocol exploit ($285 million) by approximately $7 million. Together, the two incidents accounted for approximately 89% of total April 2026 crypto losses. Crypto Impact Hub reported April 2026 as the worst month for crypto hacks in history, with a total of approximately $651 million stolen across 30 exploits. The KelpDAO incident contributed to an estimated $9.5 billion to $13 billion decline in DeFi total value locked in the 48-72 hours following the exploit, including a $6 billion TVL drop at Aave and a $15 billion drop noted by some trackers. The incident demonstrated a previously underappreciated category of risk: off-chain infrastructure and bridge configuration risk, which is invisible to traditional smart contract audits. OpenZeppelin's published analysis specifically highlighted that 'zero bugs were found' in the KelpDAO codebase, underscoring that audit coverage does not extend to operational infrastructure. An open-source AI security tool had reportedly flagged the bridge configuration as a risk 12 days before the exploit, rating it 'moderate' rather than severe — a missed signal that has since prompted discussion about continuous monitoring obligations for DeFi protocols beyond point-in-time code audits. TRM Labs' data indicates that DPRK-attributed actors' share of total crypto hack losses has grown from under 10% in 2020-2021 to 22% in 2022, 37% in 2023, 39% in 2024, 64% in 2025, and 76% through April 2026 — the highest sustained share on record, representing a significant and escalating nation-state threat to crypto infrastructure.

Pre-Hack Audit Record

KelpDAO's smart contracts were subject to a security audit published in March 2024 by MixBytes, covering the LRT-rsETH codebase as deployed to Ethereum mainnet with approximately 140,000 ETH in TVL at that time. The audit identified four high-severity vulnerabilities, all of which were reported as absent in the version deployed at the time of publication. A separate audit PDF is publicly available on the KelpDAO domain. As established by the April 2026 exploit and subsequent analysis by OpenZeppelin and Halborn, these conventional code audits did not — and by design cannot — assess the security of bridge configuration choices, off-chain RPC infrastructure, or operational decisions such as the selection of a single-verifier DVN arrangement. The distinction between code risk and operational risk is now central to post-mortems of the incident.

Timeline

2023-11-01

KelpDAO launches on Ethereum, issuing rsETH liquid restaking token built on EigenLayer.

Kelp GitBook / KuCoin Research

2024-03-04

MixBytes publishes security audit of KelpDAO LRT-rsETH smart contracts, identifying and confirming remediation of four high-severity issues.

KelpDAO Audit (MixBytes PDF)

2024-05-22

KelpDAO raises $9 million in a private funding round led by SCB Limited, Laser Digital, and Binance Labs, valuing the protocol at $90 million.

The Block

2026-04-01

Drift Protocol is exploited for $285 million in a separate DPRK-attributed attack involving social engineering and compromised protocol signers.

CoinDesk

2026-04-06

An open-source AI security tool allegedly flags KelpDAO's LayerZero bridge configuration as a moderate-to-severe risk — approximately 12 days before the exploit. The warning is not acted upon.

PANews

2026-04-18

Attackers attributed to Lazarus Group (TraderTraitor) compromise LayerZero RPC nodes and exploit the 1-of-1 DVN bridge configuration, minting and stealing 116,500 rsETH (~$292 million). Core contracts are paused. A subsequent attempted theft of ~$95 million is blocked.

Chainalysis / CoinDesk

2026-04-19

KelpDAO confirms the exploit publicly. rsETH is suspended across 20+ chains. Aave, SparkLend, and Fluid freeze their rsETH and wrsETH markets across 11 instances. DeFi TVL begins a $13 billion decline.

CoinDesk

2026-04-20

LayerZero publishes incident statement attributing the hack to DPRK's Lazarus Group and placing responsibility on KelpDAO's 1-of-1 DVN configuration choice. KelpDAO immediately disputes the account, pointing to LayerZero's own documentation and developer guides as the source of the default configuration.

CoinDesk

2026-04-21

The attacker begins moving stolen funds; approximately $175 million in ETH is routed through THORChain and converted to Bitcoin. Arbitrum Security Council freezes 30,766 ETH (~$71 million) of attacker-linked funds on Arbitrum One.

CoinDesk / Unchained

2026-04-23

Aave rallies DeFi partners to form the 'DeFi United' recovery coalition. Pledges include 5,000 ETH from Stani Kulechov, 5,000 ETH from EtherFi, and a total 10,000 ETH from LayerZero.

CoinDesk

2026-04-27

KelpDAO and Aave jointly request Arbitrum DAO to release the frozen $71 million into the DeFi United recovery pool. Arbitrum governance vote opens and over 90.5% of stakeholders vote in favor.

The Coin Republic / KuCoin

2026-05-01

U.S. District Court for the Southern District of New York issues a restraining order barring Arbitrum DAO from moving the 30,766 ETH, following a petition from families holding unpaid terrorism judgments against North Korea totaling over $877 million.

Unchained Crypto

2026-05-05

KelpDAO publicly states that LayerZero personnel had explicitly reviewed and approved the single-verifier configuration prior to the hack, directly contradicting LayerZero's narrative that Kelp acted against guidance.

CoinDesk

2026-05-06

KelpDAO announces migration of its rsETH bridge infrastructure from LayerZero to Chainlink's Cross-Chain Interoperability Protocol (CCIP).

CryptoTimes

2026-05-07

Solv Protocol announces migration of $700 million in tokenized bitcoin assets from LayerZero to Chainlink CCIP, citing the KelpDAO incident in its security review rationale.

CoinDesk

2026-05-09

A Manhattan federal judge modifies the restraining order, permitting transfer of the 30,766 ETH to an Aave LLC-controlled wallet; Aave agrees to remain bound by the terrorism creditors' claims. LayerZero separately publishes a public apology blog post admitting 'we made a mistake' and accepting responsibility for the 1-of-1 DVN configuration, reversing its prior position. LayerZero announces the end of 1-of-1 DVN support and a new minimum of five verifiers for high-value pathways.

The Block / CoinDesk

Research Gaps

3 open · agent-resolvable

Heuristic next-actions surfaced for researchers and worker agents. Resolving these strengthens the page's evidence base and trust score.

  • [high]
    no regulatory

    No regulatory or sanctions cross-check. Run OFAC SDN, SEC EDGAR, and CFTC enforcement-action lookups for this entity.

  • [med]
    single source

    Only one source has reported on this entity. Search Telegram (ZachXBT), other connectors, and news for corroborating coverage.

  • [med]
    unarchived sources

    Cited sources are not Wayback-archived. Run the archiver to pin their content before they rot.

Provenance

This investigation is cryptographically anchored to the Solana blockchain and source URLs are archived via the Internet Archive. Full audit log →

model: claude-code-investigator

generated: 5/4/2026, 4:05:01 PM

last updated: 5/10/2026, 6:08:41 AM

avoid.net — verified advice for a post-truth world