The $292 million Kelp DAO exploit shows why crypto bridges are still one of the industry's weakest links

The $292 million Kelp DAO exploit shows why crypto bridges are still one of the industry's weakest links

Source: CoinDesk

Published:16:01 UTC

BTC Price:$79306.3

#kelpdao #eth #defi

Analysis

Price Impact

High

The exploit of kelp dao, a prominent defi protocol, highlights a significant vulnerability in crypto bridges. these bridges are crucial for interoperability but have become prime targets for hackers, leading to substantial financial losses. the $292 million stolen directly impacts the trust and security perception of the entire cross-chain ecosystem, potentially deterring new users and causing existing ones to withdraw funds, thereby affecting eth and other bridged assets.

Trustworthiness

Low

Price Direction

Bearish

The exploit is likely to create downward pressure on eth and other related tokens. the loss of $292 million from a defi protocol, coupled with the broader implications for bridge security, can lead to a sell-off as investors become risk-averse. reduced confidence in defi and cross-chain functionality may result in a decrease in demand for eth, especially if it's perceived as being heavily exposed to these vulnerabilities.

Time Effect

Long

While the immediate price reaction might be sharp, the long-term impact depends on how effectively the industry addresses these structural issues. if robust solutions and improved security standards are implemented, confidence could be restored. however, without significant changes, the recurring nature of these exploits could lead to a sustained period of reduced trust and potential stagnation in defi growth.

Original Article:

Article Content:

Tech Share Share this article Copy link X icon X (Twitter) LinkedIn Facebook Email The $292 million Kelp DAO exploit shows why crypto bridges are still one of the industry's weakest links The problem is structural and as long as bridges depend on complex systems with shared infrastructure and hidden trust assumptions, they will remain vulnerable. By Margaux Nijkerk | Edited by Nikhilesh De Apr 22, 2026, 4:01 p.m. Make preferred on What to know : Crypto bridge hacks like the $292 million Kelp DAO exploit keep happening because bridges rely on trusted intermediaries and external data sources rather than fully verifying blockchain activity, creating easy opportunities for attackers to manipulate. The problem is structural, not just bugs or mistakes, and as long as bridges depend on complex systems with shared infrastructure and hidden trust assumptions, they will remain vulnerable. The $292 million exploit tied to KelpDAO is the latest in a long line of crypto bridge hacks, underscoring how the systems designed to connect blockchains have become some of the easiest ways to break them. The incident involved KelpDAO’s use of LayerZero’s cross-chain messaging system, a type of infrastructure widely used to move data and assets between blockchains. Bridges are meant to let users move assets from one blockchain to another, like from Ethereum to a different network. But instead of acting as seamless connectors, they have repeatedly turned into weak points, draining billions of dollars over the past few years. So why does this keep happening? Crypto ecosystem leaders say the answer is not just bad code or careless mistakes. The problem is more fundamental; it is in how bridges are built in the first place. The core problem: trusting the middleman To understand the issue, it helps to look at what a bridge actually does. If you move tokens from one blockchain to another, the second chain needs proof that your tokens existed and were locked on the first one. In an ideal world, it would verify that itself. In reality, that is too expensive and complex. “Most bridges don’t fully verify what happened on another chain,” said Ben Fisch, CEO of Espresso Systems. “Instead, they rely on a smaller system to report it. That [second] system becomes the thing you trust.” So instead of independently checking the truth, bridges outsource it, often to small validator groups or external networks like LayerZero or Axelar. That shortcut creates risk. In the Kelp DAO-related exploit, attackers targeted the data feeding into the bridge. “Attackers compromised nodes and fed the system a false version of reality,” Fisch said. “The bridge worked as designed. It just believed the wrong information.” Bridge hacks often look different on the surface. Some involve stolen keys, others faulty smart contracts. But experts say those are symptoms of a deeper issue. The real problem lies in how the systems are designed. “Anything that can go wrong will go wrong, and bridge hacks are a perfect example,” said Sergej Kunz, co-founder of 1inch. “You see code vulnerabilities, centralization issues, social engineering, even economic attacks. Usually it’s a mix.” How bridges work For users, bridges look simple. You click a button and move assets from one blockchain to another. Behind the scenes, the process is more complicated. First, your tokens are locked on the original blockchain. Then a separate system confirms that the tokens are locked. This system usually consists of a small group of operators or validators. Those operators then send a message to the second blockchain saying the tokens were locked so new ones can be issued. If that message is accepted, the second chain creates a new version of your tokens. These are wrapped tokens, like rsETH or WBTC. The problem is that this process depends on trusting whoever sends that message. If attackers compromise that system, they can send a false message and create tokens that were never backed on the original chain. “The worst case is when the system isn’t really checking anything,” Fisch said. “It’s just trusting someone else’s version of events.” When one failure spreads Given how often bridges fail, why has the industry not fixed them? Part of the answer comes down to incentives. “Security is often not the top priority,” Kunz said. “Teams focus on launching quickly, growing users and increasing total value locked.” Building secure systems takes time and money. Many DeFi projects operate with limited resources, making it difficult to invest heavily in audits, monitoring and infrastructure. At the same time, projects are racing to support more blockchains. Each new integration adds complexity. “Every new connection adds more assumptions,” Fisch said. Bridge hacks rarely stay contained. Bridged assets are used across lending protocols, liquidity pools and yield strategies. If those assets are compromised, the damage spreads. “Other platforms may treat a hacked asset as legitimate,” Kunz said. “That’s how contagion happens.” Users are rarely told how a bridge actually works or what could go wrong. There are ways to make bridges safer. Fisch says one key step is removing single points of failure by relying on independent data sources rather than shared infrastructure. In practice, these “data sources” are computers that watch blockchains and report what happened. They might be run by the bridge itself, by outside networks like LayerZero, or by infrastructure providers. But many rely on the same underlying services, meaning a single compromised source can feed bad data across multiple systems. “If everyone is relying on the same source, you haven’t reduced risk,” he said. “You’ve just copied it.” Other approaches include hardware protections and better monitoring to catch misconfigurations early. Some developers are also working on designs that verify data directly using cryptography instead of intermediaries. Kunz believes a more fundamental shift is needed. “As long as we rely on validator-based bridges, these problems will continue,” he said. Read more: North Korea’s crypto heist playbook is expanding and DeFi keeps getting hit Hack More For You The Protocol: Kelp DAO exploited for $292 million By Margaux Nijkerk | Edited by Nikhilesh De 15 minutes ago Also: DPRK hacking crypto, Aave contagion and Coinbase on quantum computing. What to know : Welcome to The Protocol, CoinDesk's weekly wrap of the most important stories in cryptocurrency tech development. I’m Margaux Nijkerk, a reporter at CoinDesk. In this issue: 2026's biggest crypto exploit: $292 million gets drained from Kelp DAO with wrapped ether stranded across 20 chains North Korea’s crypto heist playbook is... Read full story Latest Crypto News Banks seek to slow down implementation of crypto's GENIUS Act on stablecoin oversight 14 minutes ago The Protocol: Kelp DAO exploited for $292 million 15 minutes ago Crypto Long & Short: Protecting the people building DeFi infrastructure 33 minutes ago Trump-linked American Bitcoin shares spike over 12% after announcing more mining power 40 minutes ago Bitcoin breaks Strategy's STRC ex-dividend date slump for the first time in six months 1 hour ago Bitcoin tops $79,000 as crypto rally gathers steam; Circle, Coinbase, Strategy lead 1 hour ago Top Stories Crypto giant GSR launches its first ETF to give investors an easy way to bet on the big 3 tokens 2 hours ago Kraken filed 56 million crypto tax forms for 2025. One-third were below $1 3 hours ago Tron's Justin Sun sues Trump-linked World Liberty Financial over frozen assets 11 hours ago Another DeFi protocol loses millions in hack days after KelpDAO breach 8 hours ago Bitcoin tests $78,000 resistance as short-squeeze risks mount, altcoins rally 6 hours ago A make or break moment: why $79,200 could act as a launchpad or a ceiling for bitcoin 7 hours ago