Breaking · Exploit Analysis · DeFi Security

The KelpDAO Exploit:
$293.7M Drained via
LayerZero Bridge Attack

On April 18, 2026, an attacker drained 116,500 rsETH — approximately $293.7 million — from KelpDAO's LayerZero-powered cross-chain bridge. The largest DeFi exploit of 2026. This is the full technical breakdown: what happened, how it worked, why every security layer failed, and what pre-transaction detection looks like in practice.

$293.7M
Total drained
116,500
rsETH stolen
18%
of rsETH supply
46 min
To pause contracts
Section 01

What Happened in the KelpDAO Exploit?

Quick Answer

On April 18, 2026 at 17:35 UTC, an attacker exploited a validation flaw in KelpDAO's LayerZero OFT bridge, draining 116,500 rsETH — approximately $293.7 million, roughly 18% of rsETH's entire circulating supply. The attacker then deposited stolen tokens as collateral on Aave V3, Compound V3, and Euler — borrowing over $236M in WETH and creating irrecoverable bad debt. It is the largest DeFi exploit of 2026.

KelpDAO is a liquid restaking protocol on Ethereum. Users deposit liquid staking tokens (stETH, cbETH) into KelpDAO's rsETH adapter and receive rsETH — a tradeable receipt usable as collateral across DeFi while earning EigenLayer staking rewards. rsETH is deployed across 20+ networks, with LayerZero's OFT standard handling cross-chain movement.

The attack was first flagged by on-chain investigator ZachXBT via Telegram at ~19:44 UTC, listing six attacker wallet addresses. Security firm Cyvers independently confirmed the hack. KelpDAO's emergency multisig paused core contracts at 18:21 UTC — 46 minutes after the drain. Two follow-up attempts at 18:26 and 18:28 UTC (targeting another ~$100M) were blocked by the pause.

KelpDAO is the largest DeFi exploit of 2026 — surpassing the Drift Protocol's $285M hack on April 1, later linked to North Korea-affiliated actors.


Section 02

How the KelpDAO Attack Worked — Step by Step

The attacker executed a multi-phase operation planned at least 10 hours in advance, exploiting the trust assumptions of LayerZero's cross-chain messaging layer.

01
Wallet funding via Tornado Cash (~07:00 UTC)~10 hours before the exploit, the attacker funded wallets through Tornado Cash's 1-ETH pool — standard obfuscation to obscure gas fund origins.
02
Reconnaissance and off-chain simulationThe attacker mapped the validation logic of the lzReceive function on LayerZero's EndpointV2 contract. Off-chain simulation confirmed the exploit path before any on-chain activity began.
03
Bridge message spoofing (17:35 UTC)The attacker called lzReceive on EndpointV2 with a crafted cross-chain message — tricking KelpDAO's bridge into releasing 116,500 rsETH to an attacker-controlled address.
04
Collateral exploitation on lending marketsStolen rsETH deposited as collateral on Aave V3, Compound V3, and Euler. Over $236M in WETH borrowed against it — creating $290M+ in bad debt that cannot be liquidated normally.
05
Cross-chain exit (Ethereum + Arbitrum)Funds swapped and moved across Ethereum and Arbitrum. KelpDAO paused at 18:21 UTC. Two follow-up attempts blocked. Aave froze rsETH markets on V3 and V4.

The attacker began preparing 10 hours before the exploit fired. Every monitoring system was silent for the entire preparation window.


Section 03

Attack Flow Diagram

The five-phase attack chain, from wallet funding to cross-chain exit.

KelpDAO exploit — attack chain · April 18, 2026
PHASE 01 Wallet Funding Tornado Cash ~07:00 UTC 10h before PHASE 02 Recon & Sim Off-chain only lzReceive study No on-chain trace PHASE 03 — EXPLOIT Bridge Spoof lzReceive called EndpointV2 17:35 UTC $293.7M drained PHASE 04 Lending Exploit Aave / Compound Euler deposits $236M WETH PHASE 05 Cross-chain Exit ETH + Arbitrum Paused 18:21 UTC +46 min after drain APRIL 18, 2026 · 07:00–18:28 UTC

Phases 01 and 02 leave no on-chain trace. Every monitoring system was silent through the entire preparation window. By the time any alert fired, the attacker was already at phase 04.


Section 04

What Is a Zero-Day Attack in DeFi?

Direct Answer

A zero-day attack in DeFi is an exploit targeting a previously unknown vulnerability — one with no existing signature, blacklist entry, or audit finding. The KelpDAO exploit qualifies: the specific lzReceive message spoofing technique had never been used in a prior attack. No detection system had a pattern to match against it.

In DeFi, zero-days include any novel transaction behavior — a spoofed cross-chain message, an untested code path, an edge-case permission flow — that existing tools have no behavioral model for.

Why DeFi zero-days are especially dangerous

  • Smart contracts are immutable — no patch can be deployed after discovery
  • Transactions are irreversible — no rollback once funds move on-chain
  • Composability amplifies damage — stolen rsETH became collateral on three protocols within minutes
  • Restaking multiplies exposure — the same capital staked into EigenLayer, wrapped as rsETH, deployed as collateral; each layer inherits risk from below
  • Bridges are single points of failure — the rsETH bridge backed the token across 20+ networks simultaneously

Section 05

Why Traditional Security Couldn't Stop the KelpDAO Exploit

Direct Answer

Every major security category failed by structural design. Audits can't predict novel cross-chain attacks post-deployment. Signature detection required a prior example that didn't exist. Blacklists had no entry for fresh Tornado Cash wallets. Post-transaction monitoring triggered 2+ hours after $293.7M was already gone.

Security ApproachStop It?Why It Failed
Smart contract audits✗ NoOne-time code review. Cannot predict novel cross-chain attacks post-deployment.
Signature-based detection✗ NoRequires a prior example. No signature existed for this lzReceive spoofing technique.
Address blacklists✗ NoAttacker used fresh Tornado Cash wallets — no blacklist entry existed.
Post-transaction monitoring✗ NoZachXBT flagged at 19:44 UTC — 2+ hours after the drain.
Emergency pause✗ PartialPaused 46 minutes after the drain. Primary $293.7M already gone.
Web3Firewall✓ YesPre-execution simulation flags the lzReceive anomaly before broadcast. Policy engine blocks before funds move.

Audits tell you what the contract was supposed to do. They cannot tell you what an attacker will make it do via a spoofed cross-chain message months later.

Protect your protocol before the next exploitPre-transaction simulation + behavioral detection, deployed in days.
Request a Demo →

Section 06

Can KelpDAO-Type Exploits Be Prevented?

Direct Answer

Yes — but only with pre-transaction enforcement. The lzReceive call carried clear anomaly signals: a first-time caller, unusual cross-chain message structure, abnormal value transfer — all detectable through behavioral simulation before broadcast. Systems that operate only after execution cannot prevent this by definition.

What pre-transaction prevention actually means

Prevention must happen in the window between a transaction being formed and it being broadcast. In that window a purpose-built system can:

  1. Simulate the transaction — including the lzReceive call — in a sandboxed environment
  2. Score behavioral signals: who is calling, what they're calling, what value moves
  3. Detect deviations from protocol baselines, even for never-before-seen patterns
  4. Enforce Allow / Block / Escalate before the transaction reaches the mempool
Core Problem

You cannot prevent zero-day attacks with historical data alone. The lzReceive spoofing technique had never been used before — no blacklist, no signature, no alert existed. Detection must happen against behavior in real time.

Section 07

How Web3Firewall Prevents These Attacks

Web3Firewall is one of the only systems in Web3 operating as a pre-transaction prevention layer — not a monitor, not an audit, not a blacklist. In the KelpDAO scenario, the lzReceive anomaly would have been flagged at phase 03, before a single token moved.

01

Pre-Broadcast Transaction Simulation

Every transaction — including cross-chain bridge calls — simulated before broadcast. Behavioral anomalies identified in milliseconds.

  • First-time lzReceive callers flagged
  • Abnormal bridge value transfers detected
  • Suspicious multi-step execution paths scored
02

Zero-Day Behavioral Detection

Behavioral baselines built for wallets, contracts, and protocols — deviations detected at runtime, even for attack patterns never seen before.

  • First-time bridge interactions from unknown addresses
  • Gas patterns consistent with exploit transactions
  • Tornado Cash-funded wallet activity flagged on creation
03

Policy Engine — Block Before Execution

Real-time Allow / Deny / Escalate decisions based on custom risk policies per organization, protocol, or contract.

  • Suspicious bridge calls stopped before broadcast
  • High-risk flows quarantined for human review
04

Continuous On-Chain Monitoring

The KelpDAO attacker prepared for 10 hours pre-exploit. Continuous monitoring catches this preparation window.

  • Recon-phase wallet funding detected early
  • Persistent coverage across all monitored addresses

Pre-Transaction

Acts before broadcast, not after damage

🔍

Behavioral, Not Signatures

Catches novel threats with no prior examples

🛡

Enforcement, Not Alerts

Real-time blocking, not post-incident reports

Learn more about Web3Firewall's pre-transaction simulation engine and how it applies to DeFi protocols, exchanges, and custodians.


Section 08

Bottom Line

$293.7 million drained in a single transaction. Audits, blacklists, and monitoring all in place — all irrelevant. Not because they were poorly implemented, but because they were built for a threat model that no longer represents the majority of DeFi attacks.

Reactive DetectionProactive Prevention
Key Takeaway

Without pre-broadcast simulation, behavioral anomaly detection, and policy-based blocking, zero-day DeFi exploits will continue to succeed. With Drift ($285M), CoW Swap, Zerion, Rhea Finance, and Silo Finance all exploited in the same month, KelpDAO is not an edge case — it is the new baseline threat for 2026.

Don't wait for the next post-mortemWeb3Firewall blocks exploit-pattern transactions before they reach the chain.
Book a Demo →
Sources 1. CoinDesk — $292M drained from Kelp DAO (Apr 19, 2026) 2. DL News — Hackers target Kelp DAO in $300M exploit (Apr 19, 2026) 3. Live Bitcoin News — rsETH Bridge Hit by $292M in Suspected LayerZero Attack (Apr 19, 2026) 4. Startup Fortune — KelpDAO Exploit Creates $290M Bad Debt on Aave (Apr 19, 2026) 5. PeckShieldAlert — KelpDAO exploiter deposits into AaveV3, CompoundV3, Euler (Apr 18, 2026) 6. ZachXBT — Telegram, six attacker wallets flagged (~19:44 UTC, Apr 18, 2026)