The Day a $292M KelpDAO Bridge Exploit Turned Into a $14B DeFi Stress Test

Tuesday, 21/04/2026 | 19:13 GMT by Jared Kirui
  • Analysts place this hack, which wiped out $14 billion in DeFi value in two days, in the same category as the Ronin and Nomad bridge failures.
  • The incident has intensified calls for more robust, possibly semi‑isolated lending architectures.
Bitcoin hacker (shutterstock)

On April 18–19, an attacker drained 116,500 rsETH from Kelp DAO’s LayerZero-based bridge, roughly 18% of the token’s supply and about $292–293 million at the time. The bridge held reserves backing rsETH on more than 20 networks, so the exploit instantly created doubts about whether wrapped rsETH on those chains still had real backing behind it.

Singapore Summit: Meet the largest APAC brokers you know (and those you still don't!)

According to DeFiLlama data, the Kelp DAO exploit landed in a market that was already near the psychological $100 billion milestone for total value locked, and it erased almost $14 billion from that figure within a day. Between April 18 and 19, DeFi’s aggregate TVL fell from about $99.5 billion to roughly $85.21 billion.

Hack Shakes DeFi, Wipes $14B TVL

The technical root cause looks simple on paper: Kelp ran a 1‑of‑1 verifier configuration for LayerZero’s Decentralized Verifier Network. Only one verifier needed to sign off on cross‑chain messages, so once the attacker controlled that view of the world, they effectively controlled the bridge.

According to several post‑mortems, the attacker compromised two RPC nodes that fed data to the verifier and then used a DDoS attack to knock clean nodes offline, forcing a failover to their poisoned infrastructure. From there, they injected a forged cross‑chain message that tricked the system into releasing 116,500 rsETH to their address, all without breaking a single line of on‑chain code.

Read more: If DeFi Had This in 2022, Maybe It Wouldn’t Have Collapsed

From an analytical standpoint, this hack sits in the same family as earlier bridge failures such as Ronin and Nomad, where central checkpoints and initialization assumptions became high‑value targets. The common pattern is not a single vulnerable contract but an architecture that treats critical verification as a convenience feature rather than a hardened security boundary.

Source: DefiLlama

Lending Models Under Pressure

The story did not end at the bridge. The attacker rapidly moved the stolen rsETH into Aave as collateral and borrowed large amounts of ETH against it, while opening positions on other lending markets.

Investors reacted quickly. On‑chain data and market reports show that more than $5.4 billion exited Aave in short order as users reduced risk, with total value locked dropping even more sharply over 48 hours.

ETH utilization on Aave briefly spiked to 100%, and AAVE’s token price fell around 10% as traders priced in both the immediate hole and future governance decisions around recapitalization. From a market‑structure perspective, this looks less like a one‑off exploit and more like a stress test of the non‑isolated lending model where one asset’s failure can ripple across an entire pool.

He pointed to Aave v4’s planned “hub‑and‑spoke” architecture—closer to semi‑isolated markets—as a potential compromise between composability and safety. The underlying analytical point is that lending protocols may no longer afford to assume that all whitelisted collateral assets share roughly the same risk profile, especially when some sit on complex, cross‑chain restaking rails.

A Security Reckoning in an AI Age

The Kelp DAO exploit lands in a month where crypto platforms have already lost hundreds of millions of dollars to hacks, piling onto a multi‑year trend of bridge‑centric incidents.

Whether or not AI played a direct role in this particular hack, the pattern of rapid, multi‑venue attacks suggests defenders can no longer rely on slow human review and ad‑hoc configuration choices to keep up. For DeFi builders, the practical takeaway is less about any single tool and more about assuming that motivated attackers can see the system almost as clearly as its designers.

The public blame game between Kelp DAO and LayerZero underscores another uncomfortable reality: responsibility for security in composable finance is shared, but accountability often fragments once something breaks.

Kelp says it followed LayerZero’s defaults and common practice; LayerZero says it warned against single‑verifier setups and now promises to stop signing messages for such configurations. For users and institutional participants, this dispute matters less than the broader lesson: default settings on critical infrastructure are de facto risk decisions, not neutral technical details.

On April 18–19, an attacker drained 116,500 rsETH from Kelp DAO’s LayerZero-based bridge, roughly 18% of the token’s supply and about $292–293 million at the time. The bridge held reserves backing rsETH on more than 20 networks, so the exploit instantly created doubts about whether wrapped rsETH on those chains still had real backing behind it.

Singapore Summit: Meet the largest APAC brokers you know (and those you still don't!)

According to DeFiLlama data, the Kelp DAO exploit landed in a market that was already near the psychological $100 billion milestone for total value locked, and it erased almost $14 billion from that figure within a day. Between April 18 and 19, DeFi’s aggregate TVL fell from about $99.5 billion to roughly $85.21 billion.

Hack Shakes DeFi, Wipes $14B TVL

The technical root cause looks simple on paper: Kelp ran a 1‑of‑1 verifier configuration for LayerZero’s Decentralized Verifier Network. Only one verifier needed to sign off on cross‑chain messages, so once the attacker controlled that view of the world, they effectively controlled the bridge.

According to several post‑mortems, the attacker compromised two RPC nodes that fed data to the verifier and then used a DDoS attack to knock clean nodes offline, forcing a failover to their poisoned infrastructure. From there, they injected a forged cross‑chain message that tricked the system into releasing 116,500 rsETH to their address, all without breaking a single line of on‑chain code.

Read more: If DeFi Had This in 2022, Maybe It Wouldn’t Have Collapsed

From an analytical standpoint, this hack sits in the same family as earlier bridge failures such as Ronin and Nomad, where central checkpoints and initialization assumptions became high‑value targets. The common pattern is not a single vulnerable contract but an architecture that treats critical verification as a convenience feature rather than a hardened security boundary.

Source: DefiLlama

Lending Models Under Pressure

The story did not end at the bridge. The attacker rapidly moved the stolen rsETH into Aave as collateral and borrowed large amounts of ETH against it, while opening positions on other lending markets.

Investors reacted quickly. On‑chain data and market reports show that more than $5.4 billion exited Aave in short order as users reduced risk, with total value locked dropping even more sharply over 48 hours.

ETH utilization on Aave briefly spiked to 100%, and AAVE’s token price fell around 10% as traders priced in both the immediate hole and future governance decisions around recapitalization. From a market‑structure perspective, this looks less like a one‑off exploit and more like a stress test of the non‑isolated lending model where one asset’s failure can ripple across an entire pool.

He pointed to Aave v4’s planned “hub‑and‑spoke” architecture—closer to semi‑isolated markets—as a potential compromise between composability and safety. The underlying analytical point is that lending protocols may no longer afford to assume that all whitelisted collateral assets share roughly the same risk profile, especially when some sit on complex, cross‑chain restaking rails.

A Security Reckoning in an AI Age

The Kelp DAO exploit lands in a month where crypto platforms have already lost hundreds of millions of dollars to hacks, piling onto a multi‑year trend of bridge‑centric incidents.

Whether or not AI played a direct role in this particular hack, the pattern of rapid, multi‑venue attacks suggests defenders can no longer rely on slow human review and ad‑hoc configuration choices to keep up. For DeFi builders, the practical takeaway is less about any single tool and more about assuming that motivated attackers can see the system almost as clearly as its designers.

The public blame game between Kelp DAO and LayerZero underscores another uncomfortable reality: responsibility for security in composable finance is shared, but accountability often fragments once something breaks.

Kelp says it followed LayerZero’s defaults and common practice; LayerZero says it warned against single‑verifier setups and now promises to stop signing messages for such configurations. For users and institutional participants, this dispute matters less than the broader lesson: default settings on critical infrastructure are de facto risk decisions, not neutral technical details.

About the Author: Jared Kirui
Jared Kirui
  • 2755 Articles
  • 53 Followers
About the Author: Jared Kirui
Jared Kirui is an Editor at Finance Magnates with more than five years of experience in financial journalism. He covers online trading, fintech, payments, and crypto industries with a focus on companies, regulation and compliance, executive moves, trading technology, and market analysis. His work has been featured in other media outlets, including Benzinga, ZyCrypto, The Distributed, and The Daily Hodl. Education: Bachelor of Commerce degree (Finance option), University of Nairobi
  • 2755 Articles
  • 53 Followers

More from the Author

Trending

!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|} !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}