KelpDAO Exploit Highlights Risks in DeFi Security

By Patricia Miller

May 16, 2026

3 min read

The KelpDAO exploit reveals major security oversights in DeFi, showcasing vulnerabilities beyond smart contracts.

#What does the KelpDAO exploit reveal about security in DeFi?

The KelpDAO incident highlights a significant oversight in the decentralized finance (DeFi) sector. For years, the focus has primarily been on auditing smart contracts, yet the exploit that occurred on April 18 underscores that weaknesses may lie outside of smart contract code.

Attackers executed an attack that led to the theft of 116,500 rsETH, valued between $290 million to $293 million. This breach demonstrates that a centralized verification process and compromised remote procedure call (RPC) nodes can be the true vulnerabilities. Instead of relying on coding errors within Solidity, the attackers leveraged a more straightforward method to exploit the system.

#How did the attack unfold?

The methodology behind the attack consisted of compromising KelpDAO’s internal RPC nodes. Through a tactic known as RPC poisoning, the attackers misled the protocol’s bridge into authorizing a burn event that never occurred. They fed fake information into the system, and as a result, the bridge released the substantial amount of rsETH to the attackers without detecting the manipulation.

In addition, a distributed denial-of-service (DDoS) attack was part of the strategy, likely serving to distract or manipulate the system into falling back on the compromised infrastructure. The inherent flaw was not within the smart contracts themselves but in KelpDAO's verification setup. The reliance on a single point of verification facilitated catastrophic losses.

#What’s the connection to the Lazarus Group?

The breach has been linked to North Korea’s Lazarus Group, specifically its TraderTraitor sub-group. The attribution stems from recognizable infrastructure patterns common in previous exploits tied to North Korea. The attackers shifted focus away from the smart contract's code to the off-chain infrastructure vital for execution. Bridges, which have to interact across multiple chains and depend on external data, are consistently at risk, making them attractive targets for malicious actors.

#How did the DeFi ecosystem react?

Following the attack, DeFi protocols quickly moved to freeze rsETH transactions in an attempt to limit the fallout. The overall value locked within the DeFi ecosystem saw a substantial outflow estimated between $10 billion and $13 billion as trust diminished. Users withdrew funds from various protocols sharing similar structural attributes, highlighting the precarious nature of these decentralized systems.

#What should investors consider post-attack?

While smart contract audits remain crucial, they are no longer sufficient for ensuring security. Investors must broaden their perspective on risk. The security vulnerabilities now extend into RPC infrastructure, bridge verification protocols, and operational security practices.

Investors exploring DeFi projects should inquire about the verification architecture in place. Key questions may include: How many independent validators are involved in cross-chain transactions? What protocols are in place if RPC nodes fail? Are there any single points of failure within the transaction verification pipeline? The existence of a “1-of-1” setup, similar to KelpDAO’s, should raise significant concerns about a protocol's robustness.

Assessing the overall security landscape in DeFi safeguards not only your investment but enhances the resilience of the protocols overall. The KelpDAO exploit serves as a compelling reminder that in the rapidly evolving world of DeFi, understanding potential vulnerabilities is critical for making informed decisions.

Explore more on these topics:

Important Notice And Disclaimer

This article does not provide any financial advice and is not a recommendation to deal in any securities or product. Investments may fall in value and an investor may lose some or all of their investment. Past performance is not an indicator of future performance.