Scan to download
BTC $74,911.48 -0.28%
ETH $2,299.98 -0.60%
BNB $624.61 +0.66%
XRP $1.41 -0.72%
SOL $84.98 +0.09%
TRX $0.3296 -0.56%
DOGE $0.0943 +0.22%
ADA $0.2459 +0.25%
BCH $441.15 -0.27%
LINK $9.21 +0.48%
HYPE $40.86 -5.38%
AAVE $92.42 +0.61%
SUI $0.9415 -0.30%
XLM $0.1687 +0.33%
ZEC $310.08 -4.06%
BTC $74,911.48 -0.28%
ETH $2,299.98 -0.60%
BNB $624.61 +0.66%
XRP $1.41 -0.72%
SOL $84.98 +0.09%
TRX $0.3296 -0.56%
DOGE $0.0943 +0.22%
ADA $0.2459 +0.25%
BCH $441.15 -0.27%
LINK $9.21 +0.48%
HYPE $40.86 -5.38%
AAVE $92.42 +0.61%
SUI $0.9415 -0.30%
XLM $0.1687 +0.33%
ZEC $310.08 -4.06%

The process of the KelpDAO attack analyzed by Slow Fog

2026-04-20 13:15:43
Collection

According to SlowMist founder Yu Xian (@evilcos), the core of the KelpDAO theft incident, which involved approximately $290 million, was a targeted poisoning attack on the downstream RPC infrastructure of LayerZero DVN (Decentralized Validator Network).

The specific attack steps were: first, obtaining the list of RPC nodes used by LayerZero DVN, then breaching two independent clusters and replacing the op-geth binary file; using selective deception techniques to return forged malicious payloads only to DVN while returning real data to other IPs; simultaneously launching DDoS attacks on the unbreached RPC nodes, forcing DVN to failover to the poisoned nodes, completing the forged message verification, and then the malicious binary self-destructing and clearing logs. This ultimately led to LayerZero DVN issuing validations for "transactions that never occurred."

app_icon
ChainCatcher Building the Web3 world with innovations.