Single-DVN setup enabled a $290M exploit as attackers manipulated RPC nodes and bypassed verification safeguards. A major security incident drained roughly $290Single-DVN setup enabled a $290M exploit as attackers manipulated RPC nodes and bypassed verification safeguards. A major security incident drained roughly $290

LayerZero Reveals Attack Path Behind $292M rsETH Exploit

2026/04/21 00:15
3 min di lettura
Per feedback o dubbi su questo contenuto, contattateci all'indirizzo [email protected].

Single-DVN setup enabled a $290M exploit as attackers manipulated RPC nodes and bypassed verification safeguards.

A major security incident drained roughly $290 million from KelpDAO’s rsETH, sending shockwaves across the crypto market. Findings point to a highly coordinated operation, likely linked to Lazarus Group and its subgroup TraderTraitor. LayerZero has now detailed how the breach unfolded, revealing the exact attack path behind the exploit.

LayerZero Reveals Attack Path Behind $292M rsETH Exploit

LayerZero Confirms No Protocol Breach in Exploit

Decentralized platform LayerZero has disclosed new details about the attack that led to the $290 million exploit of KelpDAO’s rsETH on April 18, 2026. Early findings point to a highly coordinated operation linked to North Korea’s Lazarus Group, specifically its TraderTraitor unit.

While the incident raised concerns across the cross-chain sector, LayerZero stressed that damage remained contained. No other assets or applications on the protocol were affected.

According to LayerZero, attackers did not breach the protocol itself or its core infrastructure. Instead, they targeted the downstream RPC systems used by the LayerZero Labs Decentralized Verifier Network (DVN). 

By compromising two independent RPC nodes, the attackers replaced key binaries and introduced malicious behavior designed to mislead verification processes.

Access to the DVN’s RPC list allowed attackers to execute a precise spoofing strategy. Their modified nodes sent forged transaction data exclusively to the DVN while presenting accurate data to all other observers. 

Therefore, internal monitoring tools detected no inconsistencies during the attack window. Once the malicious activity ended, the altered nodes erased traces by deleting logs and disabling compromised systems.

Even with that access, attackers still had to get around the system’s backups. They launched a DDoS attack on the healthy RPC nodes, knocking them offline. That forced the DVN to switch to the compromised nodes. As a result, it approved transactions that never actually happened on-chain.

Law Enforcement Joins Probe Into $290M KelpDAO Exploit

LayerZero clarified that its DVN infrastructure follows a trust-minimized model, combining internal and external RPC providers. However, the rsETH application operated by KelpDAO relied on a single DVN configuration. That setup created a single point of failure, allowing the forged message to pass without independent verification.

Industry guidance from LayerZero has consistently advised integrators to adopt multi-DVN configurations. Such setups require consensus across several independent verifiers, reducing the risk of any single compromised component. In this case, the absence of redundancy meant no additional DVN could challenge the falsified data.

Despite the scale of the exploit, the blockchain confirmed zero contagion across its ecosystem. A full review of integrations showed that all other applications remained unaffected. Modular security design played a key role in limiting the incident to KelpDAO’s rsETH deployment.

In addition, the report includes LayerZero’s internal security measures. Systems operate under strict access controls, device-level monitoring, and segmented environments. 

External security vendors support ongoing oversight, while the company nears completion of its SOC 2 audit. These controls prevented attackers from accessing the DVN itself, restricting the breach to RPC-level manipulation.

Following the incident, all affected RPC nodes have been replaced, and the LayerZero Labs DVN is fully operational again. The company has also taken a firm stance against single-DVN configurations. Applications using such setups will no longer receive verification support moving forward.

Law enforcement agencies across multiple jurisdictions are now involved in the investigation. LayerZero is working alongside partners and security groups, including Seal911, to trace and recover stolen funds.

The post LayerZero Reveals Attack Path Behind $292M rsETH Exploit appeared first on Live Bitcoin News.

Opportunità di mercato
Logo Major
Valore Major (MAJOR)
$0.06274
$0.06274$0.06274
+0.69%
USD
Grafico dei prezzi in tempo reale di Major (MAJOR)
Disclaimer: gli articoli ripubblicati su questo sito provengono da piattaforme pubbliche e sono forniti esclusivamente a scopo informativo. Non riflettono necessariamente le opinioni di MEXC. Tutti i diritti rimangono agli autori originali. Se ritieni che un contenuto violi i diritti di terze parti, contatta [email protected] per la rimozione. MEXC non fornisce alcuna garanzia in merito all'accuratezza, completezza o tempestività del contenuto e non è responsabile per eventuali azioni intraprese sulla base delle informazioni fornite. Il contenuto non costituisce consulenza finanziaria, legale o professionale di altro tipo, né deve essere considerato una raccomandazione o un'approvazione da parte di MEXC.

USD1 Genesis: 0 Fees + 12% APR

USD1 Genesis: 0 Fees + 12% APRUSD1 Genesis: 0 Fees + 12% APR

New users: stake for up to 600% APR. Limited time!