Single-DVN setup enabled a $290M exploit as attackers manipulated RPC nodes and bypassed verification safeguards. A major security incident drained roughly $290Single-DVN setup enabled a $290M exploit as attackers manipulated RPC nodes and bypassed verification safeguards. A major security incident drained roughly $290

LayerZero Reveals Attack Path Behind $292M rsETH Exploit

2026/04/21 00:15
3 min read
For feedback or concerns regarding this content, please contact us at [email protected]

Single-DVN setup enabled a $290M exploit as attackers manipulated RPC nodes and bypassed verification safeguards.

A major security incident drained roughly $290 million from KelpDAO’s rsETH, sending shockwaves across the crypto market. Findings point to a highly coordinated operation, likely linked to Lazarus Group and its subgroup TraderTraitor. LayerZero has now detailed how the breach unfolded, revealing the exact attack path behind the exploit.

LayerZero Reveals Attack Path Behind $292M rsETH Exploit

LayerZero Confirms No Protocol Breach in Exploit

Decentralized platform LayerZero has disclosed new details about the attack that led to the $290 million exploit of KelpDAO’s rsETH on April 18, 2026. Early findings point to a highly coordinated operation linked to North Korea’s Lazarus Group, specifically its TraderTraitor unit.

While the incident raised concerns across the cross-chain sector, LayerZero stressed that damage remained contained. No other assets or applications on the protocol were affected.

According to LayerZero, attackers did not breach the protocol itself or its core infrastructure. Instead, they targeted the downstream RPC systems used by the LayerZero Labs Decentralized Verifier Network (DVN). 

By compromising two independent RPC nodes, the attackers replaced key binaries and introduced malicious behavior designed to mislead verification processes.

Access to the DVN’s RPC list allowed attackers to execute a precise spoofing strategy. Their modified nodes sent forged transaction data exclusively to the DVN while presenting accurate data to all other observers. 

Therefore, internal monitoring tools detected no inconsistencies during the attack window. Once the malicious activity ended, the altered nodes erased traces by deleting logs and disabling compromised systems.

Even with that access, attackers still had to get around the system’s backups. They launched a DDoS attack on the healthy RPC nodes, knocking them offline. That forced the DVN to switch to the compromised nodes. As a result, it approved transactions that never actually happened on-chain.

Law Enforcement Joins Probe Into $290M KelpDAO Exploit

LayerZero clarified that its DVN infrastructure follows a trust-minimized model, combining internal and external RPC providers. However, the rsETH application operated by KelpDAO relied on a single DVN configuration. That setup created a single point of failure, allowing the forged message to pass without independent verification.

Industry guidance from LayerZero has consistently advised integrators to adopt multi-DVN configurations. Such setups require consensus across several independent verifiers, reducing the risk of any single compromised component. In this case, the absence of redundancy meant no additional DVN could challenge the falsified data.

Despite the scale of the exploit, the blockchain confirmed zero contagion across its ecosystem. A full review of integrations showed that all other applications remained unaffected. Modular security design played a key role in limiting the incident to KelpDAO’s rsETH deployment.

In addition, the report includes LayerZero’s internal security measures. Systems operate under strict access controls, device-level monitoring, and segmented environments. 

External security vendors support ongoing oversight, while the company nears completion of its SOC 2 audit. These controls prevented attackers from accessing the DVN itself, restricting the breach to RPC-level manipulation.

Following the incident, all affected RPC nodes have been replaced, and the LayerZero Labs DVN is fully operational again. The company has also taken a firm stance against single-DVN configurations. Applications using such setups will no longer receive verification support moving forward.

Law enforcement agencies across multiple jurisdictions are now involved in the investigation. LayerZero is working alongside partners and security groups, including Seal911, to trace and recover stolen funds.

The post LayerZero Reveals Attack Path Behind $292M rsETH Exploit appeared first on Live Bitcoin News.

Market Opportunity
Major Logo
Major Price(MAJOR)
$0.06261
$0.06261$0.06261
+0.48%
USD
Major (MAJOR) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

USD1 Genesis: 0 Fees + 12% APR

USD1 Genesis: 0 Fees + 12% APRUSD1 Genesis: 0 Fees + 12% APR

New users: stake for up to 600% APR. Limited time!