DeFi has spent years obsessing over smart contract audits. The KelpDAO exploit on April 18 suggests the industry has been studying for the wrong exam.
Attackers stole 116,500 rsETH, worth approximately $290 to $293 million, by exploiting something far more mundane than a Solidity bug: a centralized verification process and compromised RPC nodes. It’s the largest DeFi hack of 2026, and it didn’t require finding a single flaw in on-chain code.
How the attack actually worked
The attackers compromised KelpDAO’s internal RPC nodes through a technique known as RPC poisoning, feeding the protocol’s bridge fabricated information about a burn event that never actually occurred. The bridge, trusting the data it received, released 116,500 rsETH to the attackers.
The operation also involved a DDoS attack, which likely served as either a distraction or a way to force the system onto compromised fallback infrastructure. The critical vulnerability wasn’t in the smart contracts themselves but in a “1-of-1” verification setup, meaning a single point of confirmation was all that stood between the protocol and catastrophic loss.
The Lazarus Group connection
The hack has been attributed to North Korea’s Lazarus Group, specifically the TraderTraitor sub-group. The attribution is based on infrastructure patterns that resemble previous DPRK-linked exploits.
Rather than hunting for mathematical errors in smart contracts, the attackers identified that the weakest link was the off-chain infrastructure connecting those contracts to the real world. Bridges, by their very nature, must interact with multiple chains and rely on external data sources, making them perennial targets.
The fallout was immediate and severe
Following the exploit, DeFi protocols across the ecosystem scrambled to halt rsETH transactions to contain the damage. Total value locked across DeFi experienced an estimated outflow of $10 to $13 billion as confidence cratered and users pulled funds from protocols with similar architectural patterns.
What this means for investors
Smart contract audits still matter, but they’ve become a necessary-but-not-sufficient condition for security. The attack surface has expanded to include RPC infrastructure, bridge verification mechanisms, operational security practices, and the centralization assumptions baked into supposedly decentralized systems.
For investors evaluating DeFi protocols, the new questions should center on verification architecture. How many independent validators confirm cross-chain transactions? What happens if RPC nodes are compromised? Is there a single point of failure anywhere in the transaction verification pipeline? A “1-of-1” setup, like the one KelpDAO was running, should now be treated as a red flag.





Be the first to comment