KelpDAO and LayerZero Face $292 Million Infrastructure Breach Linked to Lazarus Group

The decentralized finance (DeFi) ecosystem was rocked on April 18, 2026, as KelpDAO, a leading liquid restaking protocol, suffered a sophisticated infrastructure exploit resulting in the theft of approximately $292 million in assets.

By Keisha Williams | April 18, 2026

In what security analysts are calling the largest cryptocurrency exploit of 2026 to date, KelpDAO’s LayerZero bridge was compromised, leading to the unauthorized withdrawal of 116,500 rsETH. Unlike many historical DeFi hacks that target vulnerabilities within smart contract code, this breach targeted the protocol’s off-chain infrastructure, specifically its Remote Procedure Call (RPC) nodes and verification mechanisms. According to data from Chainalysis, the attack has been tentatively linked to the North Korean-backed Lazarus Group, a state-sponsored hacking collective notorious for high-profile crypto heists.

The Anatomy of an Infrastructure Hijack

The exploit began with a coordinated Distributed Denial of Service (DDoS) attack against KelpDAO’s external verification nodes. While the network was distracted by the traffic surge, the attackers successfully compromised internal RPC nodes. This allowed them to feed fraudulent data to the LayerZero verification network, tricking the Ethereum mainnet contract into believing that a legitimate withdrawal request had been authorized. By the time the protocol’s security parameters triggered an emergency pause, approximately $292 million worth of liquid restaked tokens had already been transferred to attacker-controlled wallets.

Security firm Blocsys noted that the attackers utilized “advanced spoofing techniques” to bypass the multi-signature requirements that usually safeguard such large transfers. The precision of the attack suggests a long-term reconnaissance phase, during which the perpetrators likely identified weak points in the protocol’s node management software. This shift from smart contract exploitation to infrastructure-level attacks highlights a new and more dangerous frontier for blockchain security in 2026.

Contagion Effects and the Lido Exposure

The impact of the KelpDAO breach resonated throughout the restaking and liquid staking sectors. Lido Finance, the largest player in the Ethereum staking space, reported that its EarnETH vault had roughly 9% exposure to the exploited rsETH tokens. While Lido’s core staking products (stETH and wstETH) remain fully collateralized and unaffected, the news sent a wave of caution through the DeFi community. In response, Lido governance participants have already proposed a $5.8 million allocation from the protocol treasury to cover potential shortfalls and maintain confidence in the EarnETH product line.

Other liquid restaking protocols saw a temporary spike in withdrawals as users moved to de-risk their portfolios. The incident has raised critical questions about the security of modular blockchain architectures, where dependencies between different layers—such as execution, consensus, and data availability—can create hidden “choke points” for attackers to exploit. As of April 18, KelpDAO has suspended all bridge operations while it works with law enforcement and cybersecurity firms to track the movement of the stolen funds.

Institutional Response and Market Resilience

Despite the severity of the hack, the broader Ethereum market showed remarkable resilience. Whale accumulation continued unabated throughout the day, with on-chain data showing wallets holding between 10,000 and 100,000 ETH adding 7.6 million ETH to their balances since early April. Standard Chartered analysts maintained their $4,000 price target for Ethereum, suggesting that institutional investors view such security incidents as “maturation pains” rather than fundamental flaws in the technology.

The institutional perspective appears to be shifting toward “infrastructure-hardened” solutions. Following the hack, several major custodial services announced enhanced “air-gapped” verification layers for their bridge participation. The industry is increasingly looking toward AI-driven security agents that can detect anomalous node behavior in real-time, potentially preventing similar infrastructure hijacks before they can be fully executed.

The Lazarus Group and Geopolitical Implications

The attribution of the attack to the Lazarus Group adds a complex geopolitical layer to the event. Regulators in the U.S. and EU have already begun citing the KelpDAO exploit as evidence for the need for stricter Anti-Money Laundering (AML) and “Know Your Node” (KYN) requirements. Reports emerged on April 18 that the stolen funds are being routed through a series of privacy-preserving protocols and cross-chain mixers, a hallmark of North Korean cyber-operations designed to evade international sanctions.

This event coincides with reports that other sanctioned nations, such as Iran, are increasingly utilizing cryptocurrency for strategic purposes, including the demand for crypto-based tolls in the Strait of Hormuz. As blockchain technology becomes more deeply integrated into the global financial system, the stakes for securing its underlying infrastructure have never been higher. The KelpDAO exploit serves as a stark reminder that as DeFi protocols grow in value, they become increasingly attractive targets for state-sponsored actors.

Related: Solana Faces Critical Test: Will $80 Support Hold Amid Market Turbulence? | DeFi Security Crisis 2026: $606M Lost in Lazarus Group Exploits as Institutional Demand Keeps Bitcoin at $78,000

The cryptocurrency market remains highly volatile. This article is for informational purposes only and does not constitute financial advice.

6 thoughts on “KelpDAO and LayerZero Face $292 Million Infrastructure Breach Linked to Lazarus Group”

  1. ddos as a smokescreen to compromise RPC nodes is next level. Lazarus really treats these heists like military operations. 116k rsETH gone before the emergency pause even kicked in

  2. 292 million and it wasnt even a smart contract bug. infrastructure layer attacks are way scarier because you cant just audit your way out of them. RPC node security needs a complete rethink

    1. 0xForensics.eth

      the spoofing techniques to bypass multi-sig verification is the detail that worries me most. if Lazarus can fake verification data at the RPC level, no amount of on-chain security matters

  3. another bridge, another nine figure exploit. how many times does this need to happen before protocols stop relying on centralized verification layers for cross-chain messaging

    1. ^ exactly. LayerZero was supposed to solve this with decentralized oracles and relayers. clearly the implementation matters more than the architecture when your RPC layer gets owned

  4. Pingback: Aave Navigates $230 Million Bad Debt Crisis as “DeFi United” Rallies to Stabilize Protocol After Kelp DAO Exploit – Bitcoin News Today

Leave a Comment

Your email address will not be published. Required fields are marked *

BTC$78,409.00+0.2%ETH$2,308.54+0.2%SOL$83.88+0.2%BNB$617.21+0.2%XRP$1.39+0.2%ADA$0.2488+0.4%DOGE$0.1080+0.2%DOT$1.22+1.2%AVAX$9.06-0.3%LINK$9.12+0.5%UNI$3.23+0.9%ATOM$1.89-0.1%LTC$55.00-0.8%ARB$0.1190-2.5%NEAR$1.28-0.9%FIL$0.9212+0.7%SUI$0.9183+0.1%BTC$78,409.00+0.2%ETH$2,308.54+0.2%SOL$83.88+0.2%BNB$617.21+0.2%XRP$1.39+0.2%ADA$0.2488+0.4%DOGE$0.1080+0.2%DOT$1.22+1.2%AVAX$9.06-0.3%LINK$9.12+0.5%UNI$3.23+0.9%ATOM$1.89-0.1%LTC$55.00-0.8%ARB$0.1190-2.5%NEAR$1.28-0.9%FIL$0.9212+0.7%SUI$0.9183+0.1%
Scroll to Top