
State-sponsored North Korean hackers are seemingly behind the $290 million crypto-heist that impacted the KelpDAO DeFi mission on Saturday.
The assault reportedly additionally impacted the lending protocols Compound, Euler, and Aave, with the latter saying a freeze and blocking new deposits or borrowing utilizing rsETH as collateral.
KelpDAO is a decentralized finance (DeFi) mission constructed round liquid restaking on the Ethereum community. It accepts person ETH deposits, restakes them, and returns a liquid token named ‘rsETH,’ that represents the restaked place.
The rsETH token is supposed to assist customers maintain incomes restaking yield, whereas it stays usable throughout DeFi, together with cross-chain by way of LayerZero, an inter-blockchain communication protocol and interoperability layer.
On April 18, KelpDAO introduced that it detected “suspicious cross-chain exercise” involving rsETH, forcing it to pause rsETH contracts throughout the Ethereum mainnet and L2s.
The mission launched an investigation with the assistance of LayerZero, Unichain, and different companions.
Blockchain exercise confirmed that round 116,500 rsETH had been stolen, round $293 million in USD worth, and went by Twister Money to cover the hint.
In keeping with extra particulars that LayerZero shared in the present day, the assault focused the verification layer (DVN) used to validate cross-chain messages for rsETH.
Particularly, the attackers compromised some RPC nodes utilized by the verifier, feeding it falsified blockchain information, whereas concurrently DDoS-ing wholesome RPC nodes to drive the system to depend on the “poisoned” ones.
This allowed a pretend cross-chain message to be accepted as legitimate. The system confirmed transactions that by no means truly occurred on-chain and enabled transferring the rsETH with out authorization.
Primarily based on preliminary analysis of the assault indicators, LayerZero believes that the notorious Lazarus hackers are seemingly chargeable for the heist.
“Preliminary indicators counsel attribution to a extremely subtle state actor, seemingly DPRK’s Lazarus Group, extra particularly TraderTraitor,” said LayerZero.
The protocol additionally famous that the incident was remoted to rsETH and that there’s no broader contagion throughout different apps or belongings.
Whereas the KelpDAO breach constitutes a significant loss up to now this yr by way of the stolen quantity, the Lazarus Group has additionally been linked to a different massive theft, $280 million from the Drift Protocol.
In keeping with a autopsy report, that assault was the results of a six-month-long, rigorously deliberate operation that concerned malicious brokers attending conferences and $1 million deposits into the mission.
AI chained 4 zero-days into one exploit that bypassed each renderer and OS sandboxes. A wave of recent exploits is coming.
On the Autonomous Validation Summit (Might 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls maintain, and closes the remediation loop.


.png)
