● LIVE

KelpDAO Was Drained for $292 Million. DeFi Is Still Standing. Here Is Why.

Mohana Priya By Mohana Priya
14 Min Read

KelpDAO, a liquid restaking protocol built on LayerZero’s cross-chain infrastructure, lost $292 million on April 9, 2026, in what became the largest single DeFi exploit of the year. The attacker, attributed by LayerZero to TraderTraitor, a subunit of North Korea’s Lazarus Group, drained 116,500 rsETH tokens representing approximately 18 percent of the protocol’s total circulating supply. What happened next is the story that matters more than the exploit itself. Rather than collapsing, DeFi’s coordination layer activated. Aave froze relevant markets. Arbitrum’s Network Security Council froze $71 million of attacker funds. A cross-protocol bailout fund assembled within 72 hours. Twenty-five days later, KelpDAO is rebuilding. The DeFi ecosystem’s response to a $292 million attack tells you more about where the sector is headed than the attack itself does.

Key Highlights

  • KelpDAO lost $292 million on April 9, 2026, in the largest DeFi exploit of 2026, attributed to North Korea’s TraderTraitor
  • The attacker exploited a cross-chain message verification vulnerability in the rsETH LayerZero bridge to mint unbacked rsETH tokens
  • The attacker deposited 89,567 rsETH on Aave as collateral and borrowed $190.86 million in wrapped ETH before Aave froze markets
  • Arbitrum’s Network Security Council froze 30,766 ETH worth approximately $71 million, recovering roughly 25 percent of stolen funds
  • Aave, Lido, EtherFi, Stani Kulechov, and other ecosystem participants coordinated a cross-protocol bailout fund within 72 hours
  • Wrapped ETH was stranded across 20 chains as a result of the bridge architecture, complicating recovery
  • KelpDAO has published a full recovery plan with a proposed rsETH recapitalization mechanism and a revised bridge architecture

How the Exploit Actually Worked

KelpDAO’s rsETH is a liquid restaking token. Users deposit ETH or liquid staking tokens like stETH into KelpDAO and receive rsETH, which represents their staked position while remaining usable across DeFi protocols as collateral or in liquidity pools. The bridge attack exploited the mechanism by which rsETH is verified and minted across different blockchain networks.

LayerZero’s cross-chain messaging system requires that a message sent from one chain be verified by a decentralized verifier network before the receiving chain acts on it. The KelpDAO exploit found a flaw in the verification logic for a specific message type related to rsETH minting. By crafting a malicious cross-chain message that passed the verification check while containing fabricated collateral data, the attacker caused KelpDAO’s contracts on the receiving chain to mint rsETH tokens without receiving the corresponding ETH backing.

The attacker then moved immediately to a secondary extraction step: depositing the freshly minted and unbacked rsETH on Aave as collateral to borrow real wrapped ETH. The 89,567 rsETH deposit generated $190.86 million in wrapped ETH borrowing capacity at prevailing loan-to-value ratios. That wrapped ETH was then extracted before anyone could freeze the Aave markets involved.

The complication of funds stranded across 20 chains reflects the architecture of the KelpDAO bridge. When wrapped ETH flows across LayerZero bridges, each hop creates an intermediary state. The attacker’s extraction created mid-flight balances that were technically in transit across multiple chains simultaneously, making the total funds picture more complex than a single-chain exploit.

The Coordination Response

What distinguishes the KelpDAO aftermath from earlier DeFi exploits is the speed and coordination of the ecosystem response. Within six hours of the exploit detection, Aave’s guardian multisig froze rsETH-related markets on all Aave deployments, preventing additional borrowing against the compromised collateral. The freeze was a unilateral protective action within Aave’s existing governance framework that did not require a community vote.

Within 24 hours, Arbitrum’s Network Security Council voted to freeze on-chain assets associated with the attacker’s known addresses. The Network Security Council is a multisig body with the authority to take emergency protective actions on the Arbitrum network. The freezing of 30,766 ETH worth approximately $71 million represents the largest single exercise of that council’s emergency powers. The action recovered roughly 25 percent of the total stolen value.

The cross-protocol bailout fund that assembled within 72 hours drew contributions from Aave, Lido, EtherFi, and direct contributions from Stani Kulechov and other prominent DeFi figures. The fund is structured to compensate KelpDAO depositors who suffered losses proportionally to their deposit size. Full compensation is not achievable from the bailout fund alone, but combined with the Arbitrum recovery it reduces user losses from 100 percent of stolen funds to a meaningfully smaller fraction.

What Held and What Failed

The KelpDAO exploit revealed a specific failure at the bridge verification layer while simultaneously revealing that DeFi’s coordination capabilities are substantially more developed than they were during earlier major exploits. In 2022, when the Ronin Bridge lost $625 million, the protocol team discovered the exploit six days after it occurred. In 2026, KelpDAO’s exploit was detected within hours and a coordinated multi-protocol response was operational within 24 hours.

What held in the KelpDAO case is the emergency governance infrastructure that the DeFi ecosystem has built since 2022. Aave’s guardian system, Arbitrum’s Network Security Council, and the informal coordination networks among major DeFi protocol founders represent a genuine security layer that did not exist at the protocol level three years ago. That infrastructure is not sufficient to prevent exploits, but it demonstrably limits their damage when they occur.

What failed is the bridge verification logic itself. The admin key vulnerability in Wasabi Protocol is a governance failure. The cross-chain verification vulnerability in KelpDAO is a cryptographic logic failure. Both categories of failure require different mitigations and reflect different parts of the DeFi security stack. Fixing admin key management does not prevent cross-chain verification exploits. Auditing bridge verification logic does not prevent admin key compromise. The two failure modes require independent remediation efforts.

The rsETH Recapitalization Mechanism

KelpDAO’s published recovery plan proposes a recapitalization mechanism using a portion of future protocol fee revenue to buy back and burn rsETH over a defined period, gradually restoring the token’s 1:1 backing ratio with the underlying assets. The mechanism is similar to the approach used by Euler Finance after its $197 million exploit in 2023, which achieved near-full fund recovery through a combination of negotiation with the attacker and protocol-level buyback programs.

The viability of the KelpDAO recovery depends on whether the protocol can retain sufficient user activity to generate the fee revenue required for recapitalization. Protocols that experience major exploits typically see a sharp decline in total value locked as users withdraw remaining funds. If KelpDAO can retain a meaningful fraction of its pre-exploit TVL, the recapitalization math becomes achievable over a 12 to 24 month horizon.

The broader institutional interest in crypto infrastructure is a relevant factor. Institutional participants evaluating liquid restaking protocols after the KelpDAO exploit will scrutinize bridge architecture specifically. A KelpDAO that implements credible bridge security improvements and maintains protocol continuity may recover institutional confidence faster than protocols that lack a transparent recovery roadmap.

The Lazarus Group Attribution

LayerZero’s attribution of the attack to TraderTraitor, a Lazarus Group subunit, is consistent with the operational profile of the April 9 exploit. TraderTraitor was identified by the FBI and CISA in 2022 as a Lazarus-linked group specializing in social engineering attacks targeting crypto employees. The group’s methodology involves initial access through phishing or fake job offers, followed by long-term presence before executing a high-value extraction.

The sophistication of the cross-chain verification exploit is consistent with an attacker that had prior knowledge of KelpDAO’s bridge architecture at a detailed level. External security researchers have not independently found the specific verification flaw that was exploited, which suggests either an insider knowledge advantage or an unusually thorough external security research effort. TRM Labs’ April 29 report confirming North Korean responsibility for 76 percent of 2026 crypto losses provides the broader context for the KelpDAO attribution.

The diplomatic and law enforcement response to the attribution has been limited. The United States, South Korea, and Japan have all issued joint statements warning about North Korean crypto targeting, but the practical mechanisms for recovering funds or deterring future attacks from a sanctioned state actor remain limited. Blockchain analytics can track funds but converting that tracking into recovery requires legal authority in the jurisdictions where stolen funds eventually surface.

Why DeFi Is Still Standing

The argument that DeFi is “still standing” after a $292 million exploit needs to be specific about what it claims. The argument is not that $292 million losses are acceptable or that the ecosystem is invulnerable. The argument is narrower: DeFi’s coordination infrastructure activated faster and more effectively than the exploit expected, recovered a meaningful portion of funds, and the broader ecosystem did not experience contagion cascading to other protocols.

The contagion containment is the most significant data point. After the KelpDAO exploit, rsETH was frozen on Aave, which prevented the compromised collateral from creating a wave of bad debt that could have propagated to Aave’s non-KelpDAO users. In 2022 and 2023, major protocol exploits created cascading effects through DeFi lending markets because the isolation mechanisms did not exist or were not fast enough. In April 2026, the isolation was fast enough to prevent cascade.

The AI agent infrastructure being built on top of DeFi protocols will need to operate within the same security framework that protected DeFi from cascade in April. Agents that interact with bridged assets or cross-chain liquidity are exposed to the same bridge verification vulnerabilities that KelpDAO revealed. The resilience that the human-governed coordination layer demonstrated needs to be extended to cover automated agent interactions before high-value agent operations become common in cross-chain environments.

The TCB View

DeFi’s response to the KelpDAO exploit is genuinely better than its responses to comparable exploits in prior years. The speed of coordination, the activation of emergency governance mechanisms, and the multi-protocol cooperation to limit user losses all represent real institutional maturity. That should be acknowledged. But maturity is not the same as safety. A financial system that responds well to a $292 million attack is still a financial system that suffered a $292 million attack. The honest assessment is that DeFi has become resilient in a specific way: it can survive major exploits without systemic collapse. It has not become secure in the more basic sense of preventing those exploits from occurring. The KelpDAO attack was the largest DeFi exploit of 2026. Wasabi Protocol was drained just three weeks later. Two of the three April attacks have been attributed to North Korean state actors with an eight-year track record of successfully targeting crypto infrastructure. The coordination response is a necessary condition for DeFi to scale to institutional adoption. It is not a sufficient condition. The sufficient condition is making the attacks sharply harder to execute in the first place, and the April data suggests the DeFi ecosystem is not yet there.

Free Daily Briefing

Get the Daily Briefing

Crypto, AI, and Web3 intelligence. Free, every day.

FREE DAILY NEWSLETTER

The Daily Brief by TCB

Crypto, AI & finance intelligence in 5 minutes. Every weekday morning. Free.

Share This Article
Follow:
Mohana Priya is a staff reporter at The Central Bulletin covering crypto regulation, DeFi policy, and Web3 legal developments. She tracks legislative developments across the US, EU, and Asia, specialising in breaking down complex regulatory frameworks for a general audience.

Free Daily Briefing

Get the Daily Briefing

Crypto, AI, and Web3 intelligence. Free, every day.