The article details a massive $290 million exploit involving kelp dao and layerzero, directly impacting protocols that use these services for cross-chain communication. layerzero's announcement to stop signing messages for single-verifier setups will force a broad migration, potentially causing network congestion and uncertainty for other projects relying on layerzero. this event erodes trust in cross-chain infrastructure, leading to a high price impact on tokens associated with affected chains and layerzero itself.
The exploit itself, coupled with the ensuing blame game and the forced migration of protocols using single-verifier setups, creates significant uncertainty and a potential loss of user funds. this will likely lead to a bearish sentiment and downward price pressure on related cryptocurrencies as investors become more risk-averse.
While the immediate impact might be sharp, the long-term effect will stem from the erosion of trust in cross-chain messaging protocols like layerzero. it will take time for layerzero to implement new security measures, for other protocols to migrate, and for the market to regain confidence in the security of these systems. this could affect the adoption and valuation of related tokens for an extended period.
Tech Share Share this article Copy link X icon X (Twitter) LinkedIn Facebook Email Kelp DAO claims LayerZero’s 'default' settings are what actually caused the massive $290 million disaster The liquid restaking protocol said the compromised verifier was LayerZero's own infrastructure, and the setup it was faulted for running was LayerZero's onboarding default. By Francisco Rodrigues , Shaurya Malwa | Edited by Aoyon Ashraf Updated Apr 20, 2026, 2:49 p.m. Published Apr 20, 2026, 2:41 p.m. Make preferred on (Getty Images) What to know : Kelp DAO is disputing LayerZero's account of a $290 million rsETH bridge exploit, claiming that the compromised single-verifier setup relied on LayerZero’s own infrastructure and defaults rather than an outlier configuration it chose against advice. Some security researchers say LayerZero’s public documentation and deployment code promote single-source verification across major chains, undercutting the firm’s claim that Kelp ignored guidance to adopt multi-verifier redundancy. Kelp claims the attack was limited to the LayerZero-powered bridge and not its core restaking contracts, while LayerZero has responded by vowing to stop signing messages for any application using a single-verifier setup, forcing a broad migration. The popular Spiderman meme showing three identical superheroes pointing fingers at each other is having its crypto moment today. Kelp DAO is set to push back on LayerZero's post-mortem of Sunday’s $290 million exploit, which essentially blames Kelp, a L2 source familiar with the matter told CoinDesk. Kelp plans to dispute the cross-chain messaging firm's claim that it ignored repeated warnings to move away from a single-verifier setup. CoinDesk has reviewed and verified the memo Kelp plans to publish. Kelp is a liquid restaking protocol that takes user-deposited ether, routes it through a yield-generating system called EigenLayer, and issues a receipt token, rsETH, in exchange. LayerZero is the cross-chain messaging infrastructure that moves rsETH between blockchains, using entities called DVNs (decentralized verifier networks) to verify whether a cross-chain transfer is valid. On Saturday, attackers drained 116,500 rsETH, worth about $290 million, from Kelp's LayerZero-powered bridge by poisoning the servers that LayerZero's verifier relied on to check transactions. Kelp, the source said, is planning on saying the DVN that was compromised via what it calls a "sophisticated state-sponsored attack” was LayerZero's own infrastructure, not a third-party verifier. Attackers compromised two of LayerZero's own servers that check whether cross-chain transactions are legitimate, then flooded the backup servers with junk traffic to force LayerZero's verifier onto the compromised ones. All of that infrastructure was built and run by LayerZero, not Kelp, the source claimed. The source contested LayerZero's framing of the "1/1 configuration" as a fringe choice made against guidance. LayerZero's post-mortem said KelpDAO chose a 1-of-1 DVN setup despite expressing recommendations to configure multi-DVN redundancy. A "1/1 configuration" means only a single validator must sign off on a cross-chain message for the bridge to act on it, leaving the system with no second check to catch a compromised or forged instruction. A multi-validator configuration (such as 2/3, 3/5, etc.) ensures there is no single point of failure that can approve a forged message on its own. They added that, through a direct communications channel with LayerZero, which has been open since July 2024, they produced no specific recommendation for Kelp to change the rsETH DVN configuration. LayerZero's own quickstart guide and default GitHub configuration point to a 1/1 DVN setup, the source told CoinDesk, adding 40% of protocols on LayerZero are currently using the same configuration. The configuration Kelp ran also appears in LayerZero's own V2 OApp Quickstart , where the sample layerzero.config.ts wires every pathway with one required DVN and no optional DVNs. That’s the same 1/1 structure. Kelp's core restaking contracts were not touched, and the exploit was isolated to the bridge layer, they added. Its emergency pause, 46 minutes after the drain, blocked two follow-up attempts that would have released an additional ~$200 million in rsETH. CoinDesk reached out to LayerZero for comment on the story and didn't hear back by the time of publication. 'Deflecting responsibility' Security researchers are also not buying LayerZero's isolated framing, which pinned the blame on Kelp. Kelp is a liquid restaking protocol. Its core competency is staking infrastructure, EigenLayer integration, and liquid staking token management. When integrating with LayerZero, Kelp relied on LayerZero's documentation, their defaults, and their team's guidance to make configuration decisions, the source claimed. Yearn Finance core team developer Artem K, who is popularly known as @banteg on X, posted a technical review of LayerZero's public deployment code and said that the reference setup ships with single-source verification defaults across every major chain, including Ethereum, BSC, Polygon, Arbitrum and Optimism. That deployment also leaves a public endpoint exposed that leaks the list of configured servers to anyone who queries it. Banteg flagged in his analysis that he can't prove which configuration Kelp used, but noted that LayerZero usually asks new operators to use its default setup, which its post-mortem criticized. Chainlink community manager Zach Rynes put it bluntly on X, alleging that LayerZero was "deflecting responsibility" for its own compromised infrastructure and accused the company of throwing Kelp under the bus for trusting a setup LayerZero itself supported. As such, LayerZero has said it will no longer sign messages for any application running a single-verifier setup, forcing a protocol-wide migration. Read more: 'DeFi is dead': crypto community scrambles after this year's biggest hack exposes contagion risk Exclusive Hack More For You LayerZero blames Kelp's setup for $290 million exploit, attributes it to North Korea's Lazarus By Shaurya Malwa 9 hours ago LayerZero said the attackers compromised two RPC nodes the company's verifier relied on and DDoS'd the rest, with the attack working only because Kelp had ignored multi-verifier recommendations. What to know : LayerZero blamed the $290 million Kelp DAO exploit on Kelp's decision to use a single-verifier configuration, despite prior warnings to adopt a multi-verifier setup. Attackers, whom LayerZero preliminarily linked to North Korea's Lazarus Group, compromised two RPC nodes and used a DDoS attack to force failover, tricking LayerZero's verifier into... Read full story Latest Crypto News Global stablecoin rulemaking slows, prompting BIS to urge cooperation to avoid fragmentation risks 18 minutes ago Tether backs UAE tokenization firm KAIO in $8M funding round to bring Emirati funds onchain 31 minutes ago Coinbase, Bybit said to be working together on tokenization, custody and distribution of U.S. stocks 1 hour ago CoinDesk 20 performance update: AAVE price plummets 22.9% over weekend 1 hour ago Bitmine buys 101,627 ether worth over $230 million, its largest weekly haul of 2026 1 hour ago Strategy buys 34,164 bitcoin for $2.54 billion, third-largest purchase on record 2 hours ago Top Stories Here's how bitcoin's $7.9 billion April options expiry impact prices 4 hours ago LayerZero blames Kelp's setup for $290 million exploit, attributes it to North Korea's Lazarus 9 hours ago 'DeFi is dead': crypto community scrambles after this year's biggest hack exposes contagion risk 21 hours ago A $300 million borrowing spike on Aave signals liquidity crunch after KelpDAO exploit 5 hours ago Previewing Consensus' Policy Summit: State of Crypto 20 hours ago The $292 million Kelp exploit: how it happened, and what it means for DeFi 16 hours ago