North Korea Accused of 292 Million Dollar Kelp DAO Crypto Heist as Interoperability Security Failures Spark Industry Blame Game

The decentralized finance (DeFi) sector has been rocked by its largest security breach of 2026, as hackers successfully siphoned more than $292 million in cryptocurrency from Kelp DAO, a prominent liquid restaking protocol. The exploit, which occurred over a tumultuous weekend in mid-April, has not only resulted in massive financial losses for liquidity providers but has also ignited a high-stakes dispute between Kelp DAO and LayerZero, the interoperability protocol through which the funds were moved. On Monday, LayerZero representatives publicly attributed the attack to state-sponsored actors from North Korea, specifically pointing to the "TraderTraitor" hacking collective, a group long associated with the Hermit Kingdom’s efforts to fund its regime through digital asset theft.
The Kelp DAO heist now stands as the most significant crypto exploit of the year, narrowly surpassing the $285 million theft from the Drift exchange earlier this month. As the industry grapples with the aftermath, the incident highlights persistent vulnerabilities in cross-chain architecture and the sophisticated methods employed by state-level cybercriminals to exploit "single points of failure" in complex DeFi ecosystems.
Anatomy of the Exploit: Bridges and Configurations
The breach centered on Kelp DAO’s integration with the LayerZero bridge, a critical piece of infrastructure designed to allow different blockchain networks to communicate and transfer assets seamlessly. Kelp DAO, which allows users to earn yields on idle cryptocurrency through "liquid restaking," utilized this bridge to move wrapped Ether (wETH) and other assets across approximately 20 different chains.
According to technical post-mortems provided by security researchers, the hackers targeted a specific weakness in how Kelp DAO had configured its security parameters within the LayerZero environment. LayerZero’s protocol allows developers to choose their own "Oracle" and "Relayer" configurations—the mechanisms that verify whether a cross-chain message is legitimate. In this instance, Kelp DAO reportedly utilized a configuration that did not require multiple independent verifications before a transaction was finalized.
By exploiting this lack of multi-party consensus, the attackers were able to inject fraudulent transaction data into the bridge. The system, seeing that the (insufficient) security requirements were met, authorized the release of hundreds of millions of dollars in tokens. These assets were then rapidly dispersed across multiple blockchains and sent through various "mixing" services to obscure their origin, making recovery efforts exceptionally difficult.
The North Korean Connection: Identifying TraderTraitor
In the hours following the discovery of the missing funds, LayerZero’s security team issued a statement on social media platform X, identifying North Korea as the primary suspect. The company cited "preliminary indicators" and on-chain behavioral patterns that mirror previous operations conducted by the TraderTraitor group.
TraderTraitor is a designation used by cybersecurity firms and the U.S. government to describe a series of North Korean state-sponsored campaigns targeting the cryptocurrency industry. These groups, often operating under the umbrella of the Lazarus Group, typically utilize a mix of social engineering, sophisticated malware, and deep technical knowledge of smart contracts to execute high-value thefts.
The attribution is supported by the speed and precision of the laundering process. Historically, North Korean hackers have demonstrated a unique ability to move stolen assets through "peel chains" and cross-chain swaps with a level of automation that suggests a well-funded, state-level infrastructure. This latest heist follows a record-breaking 2025, during which North Korean hackers were estimated to have stolen over $2 billion in digital assets. Since 2017, the total value of cryptocurrency attributed to North Korean theft has surpassed $6 billion, a sum that the United Nations and various Western intelligence agencies claim is used to fund the country’s ballistic missile and nuclear programs.
The Industry Blame Game: Security Defaults vs. Implementation
The Kelp DAO exploit has triggered a fierce public debate regarding responsibility in the DeFi space. While LayerZero was the first to point the finger at North Korea, Kelp DAO quickly countered by blaming LayerZero’s underlying architecture.

In a formal response, Kelp DAO representatives argued that LayerZero’s "default settings" were inherently unsafe and contributed to the disaster. They contended that infrastructure providers have a responsibility to enforce "secure-by-default" configurations, rather than allowing developers to inadvertently opt into weaker security models.
LayerZero, conversely, maintains that its protocol is a "permissionless" infrastructure designed to offer flexibility. From their perspective, Kelp DAO’s developers failed in their "duty of care" by not implementing the multi-signature and verification layers available within the LayerZero toolkit. This dispute highlights a growing tension in the blockchain industry: the trade-off between the "decentralized" ethos of total developer freedom and the practical need for standardized security guardrails to protect retail investors.
Chronology of the Attack
The timeline of the Kelp DAO exploit reveals a meticulously planned operation that caught the protocol’s guardians off guard:
- Friday evening: The attackers began "probing" the Kelp DAO bridge contracts, testing the responsiveness of the relayer configurations with small, inconspicuous transactions.
- Saturday, 02:00 AM PDT: The primary exploit was triggered. Over the course of three hours, the hackers executed a series of fraudulent calls to the LayerZero bridge, authorizing the withdrawal of $292 million in wrapped Ether and various liquid staking tokens.
- Saturday, 06:00 AM PDT: On-chain monitoring tools flagged anomalous outflows. Kelp DAO developers were alerted and began the process of pausing the protocol’s smart contracts.
- Sunday: Security firms including Chainalysis and Elliptic began tracing the funds. It was discovered that the assets had already been bridged to 20 different chains and were being funneled into automated market makers (AMMs) to be swapped for stablecoins.
- Monday Morning: LayerZero published its findings, officially linking the attack to North Korean actors. Kelp DAO issued its counter-statement, shifting focus to LayerZero’s configuration defaults.
Supporting Data and Historical Context
The scale of this theft is part of a broader, alarming trend in the decentralized finance sector. Security analysts note that bridges have become the "crown jewels" for hackers because they often hold massive amounts of collateral in a single, centralized-but-automated location.
- Year-to-Date Losses: With the Kelp DAO and Drift hacks combined, the DeFi sector has lost over $600 million in April 2026 alone.
- Bridge Vulnerabilities: Historically, some of the largest hacks in crypto history have been bridge-related, including the $625 million Ronin Bridge hack (2022) and the $320 million Wormhole exploit (2022).
- North Korean Dominance: Data suggests that North Korean state-sponsored groups are now responsible for approximately 30% of all stolen funds in the crypto ecosystem annually.
Broader Impact and Regulatory Implications
The $292 million Kelp DAO heist is expected to have lasting repercussions for the DeFi industry, particularly concerning the regulation of "liquid restaking" and cross-chain interoperability.
Firstly, the event is likely to accelerate the push for "security standards" in DeFi. Regulators in the United States and the European Union have already expressed concern over the lack of consumer protection in protocols that manage hundreds of millions of dollars without traditional audits or insurance. This incident provides further ammunition for those advocating for mandatory third-party security audits and minimum-security requirements for protocols that handle public funds.
Secondly, the incident underscores the geopolitical dimension of cryptocurrency security. Because the funds are being used to bypass international sanctions, the U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) is expected to blacklisted the wallet addresses associated with the hack. This will likely lead to further "censorship" at the protocol level, as validators and relayers are forced to block transactions associated with the stolen funds to remain compliant with federal law.
Finally, for the users of Kelp DAO, the immediate future remains uncertain. While the protocol has promised to explore "recovery options," the reality of North Korean hacks is that funds are rarely recovered once they enter the sophisticated laundering pipeline used by the regime. The "wrapped" assets currently stranded across 20 chains may remain de-pegged or illiquid for the foreseeable future, leaving thousands of investors facing significant losses.
As the investigation continues, the industry remains on high alert. The Kelp DAO incident serves as a stark reminder that in the world of decentralized finance, the combination of complex code and high-value targets creates a playground for the world’s most sophisticated cyber-adversaries. The "blame game" between Kelp DAO and LayerZero may eventually be settled in a court of law or through governance votes, but for the broader ecosystem, the lesson is clear: security can never be an afterthought in the race for decentralized yield.




