Scan to download
BTC $78,022.44 +2.07%
ETH $2,389.86 +2.66%
BNB $642.01 +0.68%
XRP $1.45 +0.49%
SOL $88.22 +2.61%
TRX $0.3333 +1.43%
DOGE $0.0975 +2.00%
ADA $0.2550 +1.72%
BCH $468.77 +5.31%
LINK $9.51 +0.82%
HYPE $40.57 -0.63%
AAVE $93.63 -0.49%
SUI $0.9667 +1.11%
XLM $0.1794 -1.14%
ZEC $317.87 -0.08%
BTC $78,022.44 +2.07%
ETH $2,389.86 +2.66%
BNB $642.01 +0.68%
XRP $1.45 +0.49%
SOL $88.22 +2.61%
TRX $0.3333 +1.43%
DOGE $0.0975 +2.00%
ADA $0.2550 +1.72%
BCH $468.77 +5.31%
LINK $9.51 +0.82%
HYPE $40.57 -0.63%
AAVE $93.63 -0.49%
SUI $0.9667 +1.11%
XLM $0.1794 -1.14%
ZEC $317.87 -0.08%

The process of the KelpDAO attack analyzed by Slow Fog

2026-04-20 13:15:43
Collection

According to SlowMist founder Yu Xian (@evilcos), the core of the KelpDAO theft incident, which involved approximately $290 million, was a targeted poisoning attack on the downstream RPC infrastructure of LayerZero DVN (Decentralized Validator Network).

The specific attack steps were: first, obtaining the list of RPC nodes used by LayerZero DVN, then breaching two independent clusters and replacing the op-geth binary file; using selective deception techniques to return forged malicious payloads only to DVN while returning real data to other IPs; simultaneously launching DDoS attacks on the unbreached RPC nodes, forcing DVN to failover to the poisoned nodes, completing the forged message verification, and then the malicious binary self-destructing and clearing logs. This ultimately led to LayerZero DVN issuing validations for "transactions that never occurred."

app_icon
ChainCatcher Building the Web3 world with innovations.