Scan to download
BTC $77,724.74 -0.15%
ETH $2,315.58 -0.53%
BNB $625.92 -0.87%
XRP $1.41 -1.02%
SOL $85.05 -1.21%
TRX $0.3255 +0.64%
DOGE $0.0981 -0.72%
ADA $0.2474 -1.97%
BCH $448.57 -0.82%
LINK $9.31 -1.32%
HYPE $42.28 +2.99%
AAVE $96.00 +0.74%
SUI $0.9283 -1.60%
XLM $0.1671 -2.58%
ZEC $354.82 +1.23%
BTC $77,724.74 -0.15%
ETH $2,315.58 -0.53%
BNB $625.92 -0.87%
XRP $1.41 -1.02%
SOL $85.05 -1.21%
TRX $0.3255 +0.64%
DOGE $0.0981 -0.72%
ADA $0.2474 -1.97%
BCH $448.57 -0.82%
LINK $9.31 -1.32%
HYPE $42.28 +2.99%
AAVE $96.00 +0.74%
SUI $0.9283 -1.60%
XLM $0.1671 -2.58%
ZEC $354.82 +1.23%

The process of the KelpDAO attack analyzed by Slow Fog

2026-04-20 13:15:43
Collection

According to SlowMist founder Yu Xian (@evilcos), the core of the KelpDAO theft incident, which involved approximately $290 million, was a targeted poisoning attack on the downstream RPC infrastructure of LayerZero DVN (Decentralized Validator Network).

The specific attack steps were: first, obtaining the list of RPC nodes used by LayerZero DVN, then breaching two independent clusters and replacing the op-geth binary file; using selective deception techniques to return forged malicious payloads only to DVN while returning real data to other IPs; simultaneously launching DDoS attacks on the unbreached RPC nodes, forcing DVN to failover to the poisoned nodes, completing the forged message verification, and then the malicious binary self-destructing and clearing logs. This ultimately led to LayerZero DVN issuing validations for "transactions that never occurred."

app_icon
ChainCatcher Building the Web3 world with innovations.