← Back to blog
DeFi Security · Incident Report

$292 Million Stolen in 80 Minutes: Inside the Kelp DAO Exploit and the DeFi Bank Run That Followed

The smart contracts worked perfectly. The DVN config, the multisig, and the RPC nodes did not. Here's what actually broke — and why Aave lost $6.6B in a day because of a dropdown menu.

· · 16 min read
Kelp DAO hack + Aave bank run — cover illustration, April 2026

On Saturday, April 18, at 10:20 AM Pacific Time, an attacker started a DDoS against a set of RPC nodes in a data center most crypto users have never heard of.

Eighty minutes later, $292 million in rsETH had been drained from Kelp DAO's cross-chain bridge. Within 24 hours, Aave had lost $6.6 billion in deposits. Within 48 hours, $13.2 billion had vanished from DeFi.

The smart contracts were fine. Every line of code worked exactly as designed.

This is the story of what actually broke, why it matters, and what it tells us about where DeFi risk actually lives. I ran this through AI detective swarms that cross-reference on-chain data, infrastructure configurations, and protocol governance records against the public narrative. Here is what the data says.


The Setup: One Lock on a $292 Million Door

Kelp DAO is a liquid restaking protocol. It wraps staked ETH into a receipt token called rsETH and distributes it across chains using LayerZero's cross-chain messaging infrastructure. At its peak, Kelp held over $1 billion in TVL.

LayerZero 1-of-1 vs multi-DVN verifier configuration diagram
Kelp's 1-of-1 DVN vs a recommended multi-verifier setup

LayerZero's security model is built on Decentralized Verifier Networks, or DVNs. When a message crosses from one blockchain to another, DVNs independently verify that the message is legitimate. The design philosophy is redundancy: multiple independent verifiers must agree before a cross-chain transaction is confirmed.

The key word is "multiple."

Kelp ran a 1-of-1 DVN configuration. One verifier. One entity responsible for checking whether every cross-chain message to and from the rsETH bridge was real. LayerZero Labs was that sole verifier.

LayerZero had warned Kelp about this. Their public integration checklist recommends multi-verifier setups with redundancy. According to LayerZero's post-incident statement, they communicated directly with Kelp about DVN diversification. Kelp chose not to change the configuration.

One lock. $292 million behind it.


The Attack: 80 Minutes, Start to Finish

The attackers, preliminarily attributed to North Korea's Lazarus Group and its TraderTraitor subunit, had done their homework.

Kelp DAO $292M exploit attack timeline — 4 stages across 80 minutes
Source: Daniil Kozin — reconstructed timeline of the Kelp DAO exploit, 18 Apr 2026

They identified the specific RPC nodes that LayerZero's DVN relied on to verify Kelp's bridge transactions. RPC nodes are the infrastructure layer that connects blockchain validators to applications. They are the eyes and ears of the verification system.

The attack unfolded in four stages:

Stage 1: Reconnaissance. The attackers mapped LayerZero's DVN infrastructure and identified which RPC nodes serviced Kelp's bridge verification. They gained access to the node list and identified two independent nodes running on separate clusters.

Stage 2: Node poisoning. The attackers compromised two RPC nodes and swapped the binary software running on them with malicious versions. These modified nodes were designed to deliver a forged cross-chain message to the DVN while reporting honest data to any other IP addresses making RPC requests. This meant the nodes looked clean to outside monitors but fed false data specifically to LayerZero's verifier.

Stage 3: DDoS and failover. At 10:20 AM Pacific on Saturday, the attackers launched a distributed denial-of-service attack against the clean, uncompromised RPC nodes. Traffic logs LayerZero shared show the DDoS running between 10:20 AM and 11:40 AM. With the legitimate nodes knocked offline, LayerZero's DVN was forced to rely on the poisoned nodes for transaction verification.

Stage 4: The drain. The poisoned nodes fed the DVN a fabricated cross-chain message instructing Kelp's bridge to release 116,500 rsETH to an attacker-controlled address. The DVN, receiving what it believed was verified data from its RPC infrastructure, confirmed the transaction. The bridge executed. $292 million moved to the attacker's wallet.

Kelp's emergency pauser multisig froze the protocol's core contracts 46 minutes after the drain, at 18:21 UTC. Two follow-up drain attempts at 18:26 and 18:28 UTC both reverted, each carrying the same LayerZero packet attempting another 40,000 rsETH worth roughly $100 million. Had the freeze been slower, the total loss could have exceeded $390 million.

This is now the largest DeFi exploit of 2026, overtaking the Drift Protocol hack from earlier the same month.


The Laundering: How Stolen rsETH Became Aave's Problem

Stealing $292 million in rsETH was step one. The attacker still needed to convert it into something usable.

Here is what happened next:

The attacker deposited the stolen rsETH into Aave V3 as collateral. On Aave, you can deposit assets and borrow against them. The protocol does not know or care where the collateral came from. It checks the price feed and the collateral ratio.

Against the $292 million in rsETH collateral, the attacker borrowed approximately $196 million in wrapped ETH (WETH). Then they withdrew.

Aave now holds $292 million in rsETH collateral that underpins the stolen funds. That rsETH is still technically "there," but its value depends on Kelp's bridge being functional and the underlying ETH being recoverable. With the bridge frozen and the exploit unresolved, the collateral is effectively worthless for redemption purposes.

The result: approximately $196 million in bad debt sitting on Aave's balance sheet.

Aave's Umbrella safety mechanism, an automated bad-debt backstop using asset-and-network-specific staking vaults, holds an estimated $80 million to $100 million. That leaves a potential shortfall of $96 million to $116 million.

The waterfall for covering this deficit works in stages: aWETH Umbrella stakers absorb the first slice through automatic slashing, WETH suppliers take a pro-rata haircut, stkAAVE holders face deeper slashing if governance activates it, and the DAO treasury funds a repayment proposal for any remainder.

Starting at 18:52 UTC on April 18, Aave's Guardian initiated immediate freezes on rsETH and wrsETH markets across all deployments. Compound Finance, Euler, SparkLend, and Fluid followed with their own freezes.


The Bank Run: $6.6 Billion in 24 Hours

The $196 million in bad debt was damaging. What happened next was devastating.

Aave V3 TVL drop from $26.4B to under $20B in 24 hours
Source: DeFiLlama — Aave TVL, 18–20 April 2026
All-DeFi TVL chart — $13.2B outflow in 48 hours across nine protocols
Source: DeFiLlama — total DeFi TVL, 18–20 April 2026

When "Aave" and "bad debt" appeared in the same headline, the information cascade began.

Depositors across every Aave market, on every chain, in every pool, started withdrawing. Not just from rsETH-related markets. From everything.

Within 24 hours, Aave's TVL dropped from $26.4 billion to under $20 billion. A $6.6 billion outflow. Some trackers measuring over 48 hours recorded $8.4 billion in total withdrawals.

That is a 33x overreaction to the actual bad debt figure.

The mechanics of the bank run are textbook, and that is exactly the problem. As large holders withdrew first, utilization rates on remaining pools spiked. Higher utilization means higher borrowing rates. Higher borrowing rates incentivize more withdrawals. This feedback loop is why the TVL drop was orders of magnitude larger than the actual loss.

Stablecoin pools were hit hardest. USDC and USDT lending pools on Aave V3 reached 100% utilization. Over $5.1 billion in stablecoins became effectively inaccessible. Depositors could see their funds on the dashboard but could not withdraw.

The USDT pool, holding $2.87 billion, had approximately $2,540 available for withdrawal at one point. Not $2,540 million. Two thousand five hundred forty dollars. In a pool holding nearly three billion.

Users trapped in these pools resorted to workarounds: borrowing against their own locked deposits at steep losses, converting to GHO or DAI through secondary markets, or simply waiting. An additional $300 million in forced borrowing hit Aave as stranded users tried to extract whatever liquidity they could. Many accepted 10-25% haircuts.

Meanwhile, bots monitored the pools and front-ran every small liquidity window that opened, absorbing new deposits before human users could react.

Total DeFi TVL dropped $13.2 billion in two days. From $99.5 billion to $86.3 billion. The contagion spread across nine protocols. Euler, Sentora, and Aave recorded double-digit percentage TVL drops.

No FDIC. No lender of last resort. No phone number to call.


The Other $285 Million: Drift Protocol

The Kelp exploit did not happen in isolation. Seventeen days earlier, on April 1, DeFi had already absorbed its previous "largest hack of 2026."

Drift Protocol vs Kelp DAO — attack vector, loss, chain, attribution
Two April 2026 exploits, one attribution: DPRK / Lazarus Group

Drift Protocol, the largest decentralized perpetual futures exchange on Solana, was drained of $285 million in 12 minutes.

The technical vector was entirely different from Kelp, but the root cause was the same: human and operational failure, not code failure.

The Drift attack began six months before the exploit. In the fall of 2025, individuals presenting as a quant trading firm approached Drift contributors at a major crypto conference. They expressed interest in protocol integration. A Telegram group was formed. Over the following months, the same individuals continued meeting Drift contributors face-to-face at industry events across multiple countries, building relationships and trust.

The social engineering campaign culminated in a technical exploit using Solana's "durable nonces" feature. Durable nonces allow transactions to be pre-signed and executed later without expiring. The attackers convinced Drift Security Council multisig signers to pre-sign transactions that appeared routine but carried hidden authorizations for critical administrative actions.

On March 27, Drift migrated its Security Council to a new 2/5 threshold configuration with zero timelock, eliminating the delay that would have allowed detection and intervention.

On April 1, the pre-signed transactions executed. The attacker gained admin control, whitelisted a fabricated token called CarbonVote (CVT) with artificially inflated oracle pricing, deposited it as collateral, and drained Drift's core vaults. Twelve minutes from execution to empty.

Drift's TVL collapsed from roughly $550 million to under $250 million. Eleven protocols lost funds or had vaults frozen.

Blockchain forensics firms TRM Labs and Elliptic both attributed the attack to actors linked to the Democratic People's Republic of Korea, potentially marking the 18th North Korean crypto theft of 2026. The group is tracked under multiple cryptonyms: UNC4736, AppleJeus, Citrine Sleet, Golden Chollima, and Gleaming Pisces.


The Pattern: $577 Million, 18 Days, One Country

Two attacks. $577 million combined. Eighteen days apart. Both attributed, with medium to high confidence, to North Korea.

Different chains. Different attack vectors. Same outcome.

Drift was social engineering on Solana. Kelp was infrastructure poisoning on Ethereum's cross-chain layer. The Lazarus Group, and its TraderTraitor subunit specifically, appears to be running parallel operations tailored to different blockchain architectures.

For context: North Korea-linked actors stole $2.02 billion in cryptocurrency in 2025 alone, according to Chainalysis. That was a 51% increase over 2024 and represented nearly 60% of all global crypto theft. The $1.4 billion Bybit hack in February 2025 was the largest single crypto exploit in history at the time.

The Kelp and Drift exploits suggest 2026 is accelerating, not decelerating.

And in both cases, the smart contracts worked perfectly.


What Actually Failed

This is the part that should keep protocol teams awake.

Drift's Solana programs executed exactly as coded. The governance multisig processed valid, properly-signed transactions. The oracle reported the price it was given. Every component did its job.

Kelp's bridge logic had no bugs. LayerZero's DVN verified exactly what its RPC nodes reported. The cross-chain messaging protocol functioned as designed.

The failures were not in the code:

Configuration risk. Kelp ran a 1-of-1 verifier on a bridge holding $292 million. LayerZero recommended otherwise. Kelp chose not to act. There was no protocol-level enforcement requiring a minimum DVN configuration.

Social engineering. Drift's security council members were manipulated over six months of in-person relationship building. The attackers got real humans to pre-sign real transactions that looked routine.

Operational security. Drift migrated to a 2/5 multisig with zero timelock seven days before the exploit. That configuration change eliminated the one safeguard that could have caught the malicious transactions before execution.

Infrastructure dependency. Both attacks targeted the layer beneath the smart contracts. RPC nodes. Multisig signers. Oracle feeds. DVN configurations. The plumbing that protocols depend on but rarely audit with the same rigor they apply to Solidity code.

DeFi has spent five years getting better at smart contract security. Formal verification. Multiple audit firms. Bug bounty programs. The code is genuinely more secure than it was in 2021.

But the industry's operational security is still where traditional banking was in the 1970s. AI detective swarms that scan infrastructure configurations and governance patterns can surface these vulnerabilities systematically. Most protocols are not doing that.

The $292 million was not in the code. It was in a dropdown menu.


What I Am Watching Now

1. Aave's Umbrella mechanism at scale. This is the first real stress test of Aave's insurance backstop at nine-figure scale. The fund holds $80-100 million against $196 million in bad debt. The slashing waterfall (stakers, then suppliers, then AAVE holders, then treasury) has never been activated at this magnitude. If it works, it validates the model. If it falls short, the governance token becomes the backstop of last resort, and every AAVE holder pays.

2. LayerZero enforcement policy. LayerZero warned Kelp. Kelp ignored the warning. The exploit happened. The question now is whether "we recommended a multi-verifier setup" is sufficient, or whether LayerZero needs to enforce mandatory minimum DVN configurations at the protocol level. The answer has implications for every protocol built on LayerZero's messaging layer.

3. DPRK operational tempo. Eighteen attributed crypto thefts in 2026, and the year is not half over. The Lazarus Group is not a lone hacker in a basement. It is a state-sponsored operation with multi-million-dollar budgets, six-month planning cycles, and specialized teams for different blockchain architectures. Social engineering for Solana governance. Infrastructure attacks for Ethereum cross-chain. They are adapting faster than the industry's defenses.

4. DeFi insurance capacity. The combined TVL of all DeFi insurance protocols, Nexus Mutual, Unslashed, InsurAce, all of them, is less than the bad debt from this single exploit. The insurance layer that DeFi was supposed to build as it matured does not yet exist at meaningful scale.

5. Cross-chain configuration auditing. Before this weekend, how many DeFi users checked their protocol's DVN configuration before depositing? How many even knew what a DVN was? The Kelp exploit exposes a class of risk that is invisible to standard due diligence. AI detective swarms that scan infrastructure configurations need to become standard tooling, not edge cases.


What This Means for DeFi Users

If you have funds in any DeFi lending protocol, here is what I updated in my own framework after April:

Check signer counts. How many people need to sign off before your protocol can move funds or change parameters? If the answer is "one" anywhere in the stack, that is your single point of failure.

Check verifier configurations. If your protocol uses cross-chain messaging (LayerZero, Wormhole, Axelar), ask what DVN or guardian configuration they run. A 1-of-1 setup should be a dealbreaker for any significant allocation.

Cap single-protocol exposure. No more than 15% of liquid portfolio in any single DeFi protocol. The 33x overreaction ratio in the Aave bank run means that even a small bad debt event can freeze your entire position.

Understand utilization risk. In a lending protocol, 100% utilization means 0% liquidity. You cannot withdraw. The "liquid" in DeFi is conditional on everyone not withdrawing at the same time. Sound familiar? That is exactly how banks work. Except banks have deposit insurance.

Separate bridge risk from smart contract risk. If your position involves cross-chain assets (wrapped tokens, bridged stablecoins, liquid restaking tokens on non-native chains), you carry bridge risk on top of protocol risk. These are different risk surfaces and need independent evaluation.


The Bigger Picture

DeFi is not dead. The "DeFi is dead" takes flooding crypto Twitter this weekend are as premature as they were in 2022.

But the narrative that DeFi has "matured" took a serious hit this month. Two state-sponsored attacks draining $577 million in 18 days, neither exploiting smart contract bugs, both exploiting the human and operational layers that protocols build on top of, reveals something uncomfortable:

The industry is auditing the locks while leaving the keys on the counter.

Code audits are necessary but not sufficient. Infrastructure audits, governance audits, configuration audits, operational security audits, social engineering resistance, all of these need the same rigor and investment that smart contract security receives today.

Until that happens, April 2026 will not be the last time we watch $13 billion leave DeFi in two days because of a dropdown menu.

Frequently asked questions

How did the Kelp DAO hack actually happen?

The attackers DDoS'd the clean RPC nodes that LayerZero's DVN relied on, and swapped in two poisoned RPC nodes that fed the verifier a forged cross-chain message. The DVN confirmed it, Kelp's bridge released 116,500 rsETH (~$292M) to the attacker's wallet, and the protocol was frozen 46 minutes later. No smart-contract bug — a configuration and infrastructure failure.

Why did Aave lose $6.6 billion in 24 hours if only $196M was the bad debt?

The stolen rsETH was deposited on Aave as collateral and used to borrow ~$196M in WETH. Once that bad debt hit the news, every Aave depositor started withdrawing — across every market, not just rsETH. Utilization spiked to 100% on stablecoin pools, rates exploded, and $6.6B left in 24h. The TVL drop was ~33x the actual loss.

Is Aave insolvent after the Kelp exploit?

No. Aave's Umbrella safety module holds $80–100M against roughly $196M in bad debt. The shortfall waterfall goes: Umbrella stakers slashed → WETH suppliers haircut pro-rata → stkAAVE slashed if governance activates → DAO treasury. AAVE holders are the backstop of last resort, but the protocol is not insolvent.

Who attacked Kelp DAO?

LayerZero and on-chain forensics firms attribute the attack, with medium-to-high confidence, to North Korea's Lazarus Group (and specifically its TraderTraitor subunit). The same cluster is credited with the $285M Drift exploit 17 days earlier.

Should I pull my money from Aave or other DeFi lenders?

Not a blanket answer. What matters is concentration: don't hold more than ~15% of your liquid portfolio in any single DeFi protocol, understand that 100% utilization means 0% liquidity even if the dashboard shows your balance, and separate bridge risk from protocol risk. If a cross-chain protocol you use runs a 1-of-N verifier setup, treat that as a single point of failure.

What is a DVN and why does it matter?

A DVN (Decentralized Verifier Network) is the service that confirms a cross-chain message on LayerZero is legitimate. A 1-of-1 DVN means one entity verifies everything — a single point of failure. Multi-DVN setups (e.g. 3-of-5) require independent verifiers to agree, which is what LayerZero had recommended to Kelp before the exploit.


Sources and data

Disclaimer: Informational analysis, not investment advice. I do not hold positions in any protocol discussed. Figures are reconstructed from public sources linked above; refer to each source for the authoritative version.
Daniil Kozin

Daniil Kozin

I review DeFi protocols and tokenized-asset projects the way I'd do diligence on my own money. No paid coverage.

Read more · Blog · X · LinkedIn