Scan to download
BTC $79,110.98 -2.49%
ETH $2,228.32 -1.92%
BNB $668.43 -1.67%
XRP $1.44 -3.47%
SOL $89.19 -3.28%
TRX $0.3512 -0.35%
DOGE $0.1127 -3.15%
ADA $0.2616 -3.27%
BCH $426.40 -2.35%
LINK $10.08 -3.49%
HYPE $43.27 -7.48%
AAVE $92.60 -5.68%
SUI $1.09 -7.81%
XLM $0.1549 -4.29%
ZEC $509.34 -7.47%
BTC $79,110.98 -2.49%
ETH $2,228.32 -1.92%
BNB $668.43 -1.67%
XRP $1.44 -3.47%
SOL $89.19 -3.28%
TRX $0.3512 -0.35%
DOGE $0.1127 -3.15%
ADA $0.2616 -3.27%
BCH $426.40 -2.35%
LINK $10.08 -3.49%
HYPE $43.27 -7.48%
AAVE $92.60 -5.68%
SUI $1.09 -7.81%
XLM $0.1549 -4.29%
ZEC $509.34 -7.47%

The process of the KelpDAO attack analyzed by Slow Fog

2026-04-20 13:15:43
Collection

According to SlowMist founder Yu Xian (@evilcos), the core of the KelpDAO theft incident, which involved approximately $290 million, was a targeted poisoning attack on the downstream RPC infrastructure of LayerZero DVN (Decentralized Validator Network).

The specific attack steps were: first, obtaining the list of RPC nodes used by LayerZero DVN, then breaching two independent clusters and replacing the op-geth binary file; using selective deception techniques to return forged malicious payloads only to DVN while returning real data to other IPs; simultaneously launching DDoS attacks on the unbreached RPC nodes, forcing DVN to failover to the poisoned nodes, completing the forged message verification, and then the malicious binary self-destructing and clearing logs. This ultimately led to LayerZero DVN issuing validations for "transactions that never occurred."

app_icon
ChainCatcher Building the Web3 world with innovations.