KelpDAO exploit: how $292M triggered a $13B DeFi bank run

A $292M breach at KelpDAO wiped $13B from DeFi in 48 hours. Inside the restaking cascade, LayerZero's verifier gap, and Lazarus's fingerprints.

KelpDAO exploit: how $292M triggered a $13B DeFi bank run
Photo by Liana S on Unsplash

Editorial digest April 20, 2026
Last updated : 10:01

The numbers tell two stories that refuse to reconcile. On one side, a single exploit at KelpDAO drained roughly $292 million in rsETH over the weekend, per CryptoSlate's reporting. On the other, total value locked across decentralized finance bled out by somewhere between $10 billion and $13 billion in the forty-eight hours that followed, according to CoinDesk. The ratio matters. When a breach one-fortieth the size of the response triggers that response, the problem is no longer the breach. It is the architecture that amplified it.

This is the week DeFi discovered, again, that composability cuts both ways.

How does a single exploit drain $292 million from a restaking bridge?

The attack, as reconstructed by LayerZero and reported by CoinDesk, targeted the verifier setup KelpDAO had configured for its cross-chain messaging. LayerZero allows protocols to move assets and instructions between chains by running a network of verifiers that confirm transactions. The defensible version of the system uses multiple independent verifiers β€” no single compromise is supposed to be sufficient. Kelp, according to LayerZero's own post-mortem, had not followed that recommendation.

The attackers compromised two RPC nodes that Kelp's verifier relied on, then DDoS'd the remaining nodes to prevent any disagreement on what messages were being passed. With the check disabled, the attackers minted or extracted around 116,500 rsETH β€” Kelp's liquid restaking token β€” from the bridge, a haul worth $292 million at the time, per CryptoSlate. CoinDesk reports LayerZero has attributed the intrusion to Lazarus, the North Korean state actor long documented as the most prolific thief in crypto.

Two things follow from this. First, the vulnerability was not in LayerZero's protocol per se β€” it was in Kelp's decision to ignore defense-in-depth guidance. Second, the fact that a documented state actor walked through a configuration gap in one of the most-used messaging layers in crypto is not reassuring for any protocol with a similar setup. One can reasonably assume Lazarus is already probing the next one.

Why did a $292M breach erase $13 billion from DeFi?

Because rsETH is not a token that sits quietly in a wallet. It is collateral.

KelpDAO issues rsETH to users who deposit ETH into its liquid restaking system, which then routes that ETH through EigenLayer to harvest additional yield. The resulting rsETH circulates β€” across chains via LayerZero, across lending protocols as collateral, across yield aggregators as a base asset. When the legitimate supply of rsETH is suddenly inflated by a $292 million unauthorized mint, every downstream protocol holding rsETH as collateral is exposed to a token whose peg, solvency, and price are all in question simultaneously.

The response was textbook bank-run behavior. CoinDesk's aggregate figure of a $13 billion DeFi wipeout over two days, and CryptoSlate's $10 billion estimate, both capture the same dynamic: users did not wait to see which protocols were exposed. They withdrew from everything that touched rsETH, then everything that might touch rsETH, then everything that might be exposed to the protocols exposed to rsETH. This is composability in reverse β€” the property that lets capital flow frictionlessly into yield also lets fear flow frictionlessly out.

The most telling detail in CoinDesk's reporting is that, even as TVL collapsed by double-digit percentages across lending and yield protocols, token prices held up comparatively well. That gap β€” between locked value fleeing and market prices staying anchored β€” suggests the withdrawals were not speculative liquidation. They were deliberate, rational de-risking by sophisticated holders who understood exactly how exposed the stack had become.

Is Aave's $8 billion outflow a bank run or prudent risk management?

It is both, and the distinction matters less than DeFi defenders would like.

Cointelegraph reports Aave's TVL fell by $8 billion in the twenty-four hours following the Kelp breach, with the AAVE token down nearly 20% to $89.5. Decrypt places the figure at $6.2 billion in withdrawals and notes that users actively struggled to pull funds from the lending protocol during the peak of the panic.

Aave's architecture is not broken. The protocol's smart contracts did what they were designed to do: honor withdrawals as long as liquidity was available, allow interest rates to spike as utilization rose, and remain solvent. But a lending protocol that functions correctly during stress still transmits that stress. When users see a correlated-asset contagion unfolding, the rational play is to withdraw first and assess later β€” exactly the logic that turns a mild liquidity event into a stampede in traditional finance.

The uncomfortable implication is that Aave's role as the venue of record for DeFi lending makes it the natural shock absorber when anything upstream breaks. It absorbs the volatility without itself failing, which is the good news. The bad news is that every time a KelpDAO-style event occurs upstream of Aave, the protocol's users experience what is functionally a bank run, even when the underlying code is operating exactly as intended. The problem is structural, not technical.

What did the Iran-Hormuz shock add to an already-fragile weekend?

Timing. And timing, in a liquidity cascade, is the whole game.

According to CoinDesk, Bitcoin traded at $74,335 after Iran reimposed controls on the Strait of Hormuz over the weekend β€” a 1.6% pullback against a 5.7% jump in Brent crude and a 1.2% decline in European equity futures. Cointelegraph reports Bitcoin briefly broke below $74,000 as Iran threatened retaliation for a US military seizure of an Iranian cargo ship, then β€” per separate CoinDesk reporting β€” fell to around $76,000 when Iran reversed the Hormuz reopening on Saturday afternoon. One of the largest short liquidations of 2026 wiped out $593 million in bearish positions overnight.

For DeFi, the geopolitical shock did something the KelpDAO breach could not do on its own: it correlated the weekend's panic with macro fear. Bitcoin's move was, by historical standards, muted β€” far less dramatic than oil's β€” which suggests crypto's macro beta is softening as the asset class matures. But softer macro beta does not help when the internal correlation across DeFi protocols is approaching one. Users withdrawing from Aave did not need to believe in an oil shock to panic. They only needed to see that the people around them were panicking for any reason at all.

Why does Ledger's CTO call 2026 "DeFi's worst year for hacks"?

Because the Kelp exploit is not an outlier. It is a pattern.

CoinDesk's analysis of the Kelp incident quotes Ledger's CTO describing 2026 as shaping up to be DeFi's worst year for hacks, and the surrounding week supports the claim. Cointelegraph reports that hackers impersonated the eth.limo team to hijack the domain through a social engineering attack on EasyDNS that the registrar's CEO, Mark Jeftovic, publicly described as highly sophisticated. CoinDesk separately reports a breach at Vercel β€” triggered by a compromised AI coding tool β€” that may have exposed API credentials used by the frontend layer connecting web3 wallets to backend services across a wide swathe of applications.

Read together, the three incidents describe a single attack surface: the parts of the crypto stack that are not on-chain. A cross-chain messaging verifier. A domain registrar. A frontend hosting platform's CI/CD pipeline. None of these can be secured by audited smart contracts. All of them sit upstream of the contracts and decide what data, what instructions, and what interfaces users ever see. The industry's historical obsession with on-chain auditing has not been wrong β€” it has been insufficient. The off-chain perimeter is where the attacks actually land.

What should survive this week, and what should not?

Three positions are worth holding after this weekend.

First, the "multi-verifier recommendation" dynamic is a governance failure, not a technology failure. LayerZero offered the right default. Kelp did not adopt it. Any protocol whose security model depends on downstream integrators following guidance they are not forced to follow has a security model that will eventually fail. The lesson is not that cross-chain messaging is broken β€” it is that optional safety is not safety. Enforcement belongs at the protocol layer.

Second, restaking's composability is a feature that has outrun its risk management. Liquid restaking tokens like rsETH are sold as yield enhancements but function as systemic risk multipliers, because they travel through the ecosystem as collateral. Every protocol that accepts rsETH is underwriting Kelp's operational security, whether its risk team has priced that exposure or not. The industry needs a language for this that is sharper than "composability risk" β€” something closer to the re-hypothecation discussions that followed 2008 in traditional finance.

Third, the contrast with this week's other major blockchain headline is worth registering. The Defiant reports that Mizuho, Nomura, and Japan's central clearing house are launching a Canton-based proof-of-concept to bring Japanese government bonds on-chain for collateral management. This is the exact problem DeFi is theoretically solving β€” programmable, composable collateral β€” approached from the opposite direction. Permissioned infrastructure. Institutional operators. Cleared counterparties. If DeFi's public-chain model cannot demonstrate that $292 million of opportunistic theft does not trigger $13 billion of withdrawals, the institutional version will eat its lunch on the high-value use cases, and leave the retail yield-chasing to whoever is left.

The bet this week is not whether DeFi recovers the TVL it just lost. It will. The bet is whether the post-mortem conversations inside the major protocols reach the same conclusion the Canton pilots have already reached: that composability without enforceable security guarantees is not a product. It is a liability waiting for its next catalyst. Lazarus, as always, is reading along.