Start now →

$290M Kelp DAO Hack: When Reality Itself Was Faked

By Khushi · Published April 28, 2026 · 4 min read · Source: Cryptocurrency Tag
EthereumWeb3Security
 $290M Kelp DAO Hack: When Reality Itself Was Faked

🚨 $290M Kelp DAO Hack: When Reality Itself Was Faked

KhushiKhushi4 min read·Just now

--

Press enter or click to view image in full size
Source: Community illustration (Twitter)

A $290M exploit. No smart contract bug. No key leak — just a system that believed something that never happened.
Everything on-chain looked completely valid.

On April 18, 2026, a massive exploit hit Kelp DAO, draining nearly $292 million (116,500 rsETH).

There was:

The system worked perfectly — on completely fake data.

🌐 What is Kelp DAO

Kelp DAO is a DeFi protocol that allows users to:

This rsETH can be:

To move assets between chains, Kelp DAO uses LayerZero.

🌉 What is LayerZero

LayerZero is a system that allows different blockchains to communicate.

Instead of moving tokens directly, it:

👉 Think of it like a messaging bridge between two cities.

⚙️ How the system SHOULD work

  1. Tokens are burned on Chain A
  2. A message is verified
  3. Tokens are released on Chain B

👉 Core rule:

Funds released must ALWAYS match funds burned.

💀 What actually happened

This wasn’t a contract hack.
It was a trust-layer attack on infrastructure.

Step 1: Single point of failure

Kelp DAO used:

👉 Meaning:

Only ONE entity had to approve cross-chain messages

Step 2: Attackers targeted infrastructure (not code)

They attacked:

Not:

Step 3: Reality was manipulated

Attackers:

👉 Result:

Step 4: Fake burn → real money

The system saw:

So it did:

👉 116,500 rsETH (~$292M) sent to attacker wallets

🕵️‍♂️ Who Was Behind the Attack?

The exploit has been attributed to the Lazarus Group, a well-known state-linked hacking group associated with North Korea.

Lazarus is not a random hacker collective. It is widely believed to be:

💰 Why they target DeFi

Unlike typical hackers who exploit systems for fun or reputation, Lazarus operates with a clear objective:

Generate funds at scale

These funds are believed to be used to:

⚠️ Pattern across attacks

The Kelp DAO exploit follows a pattern seen in many Lazarus-linked incidents:

🧠 Why this matters

This wasn’t just a technical failure.

It was a state-level adversary exploiting structural weaknesses in DeFi infrastructure.

That changes the threat model completely:

🔚 One-line takeaway

You’re not just defending against hackers anymore — you’re defending against nation-state level attackers.

🧨 Why this attack is dangerous

Every transaction:

👉 Nothing looked suspicious on-chain

This wasn’t a bug — it was a false reality attack

⚠️ The core failure: Broken invariant

Every bridge depends on this rule:

Assets released = Assets burned

Here:

👉 Result:

💸 What attackers did with funds

Once they received rsETH, they moved fast:

Press enter or click to view image in full size
On-chain positions showing rsETH used as collateral to borrow ETH — a key step in extracting real value from the exploit.

Affected protocols:

🧯 Immediate impact

📉 DeFi fallout

Press enter or click to view image in full size
Protocol-level response: rsETH markets paused to stop further contagion across DeFi lending systems.

Example:

👉 Why?

Because:

The collateral (rsETH) was broken
But borrowed ETH was real

💣 Result: Bad debt

Protocols were left with:

🧠 Why traditional security failed

Because:

👉 Problem wasn’t transactions
👉 Problem was truth itself

🛡️ Lessons from the attack

1. Single verifier = guaranteed failure

1-of-1 validation is not decentralization

2. Off-chain infrastructure is critical

RPC nodes can become attack surfaces

3. Cross-chain systems need invariant checks

Not just transaction monitoring

4. “Valid” does not mean “correct”

Systems must verify reality, not just signatures

⚡ One line takeaway

The attacker didn’t hack the protocol —
they hacked the system that decides what is real.

🔚 Closing

The Kelp DAO exploit is one of the clearest examples of how modern DeFi systems can fail.

Not because code is broken —
but because trust is misplaced.

And in cross-chain systems,
that mistake can cost hundreds of millions.

This article was originally published on Cryptocurrency Tag and is republished here under RSS syndication for informational purposes. All rights and intellectual property remain with the original author. If you are the author and wish to have this article removed, please contact us at [email protected].

NexaPay — Accept Card Payments, Receive Crypto

No KYC · Instant Settlement · Visa, Mastercard, Apple Pay, Google Pay

Get Started →