LayerZero discloses RPC poisoning by Lazarus Group behind $292M KelpDAO hack, tightens multisig defaults
first published 2026-05-09T13:53:07Z
LayerZero acknowledged it mistakenly allowed a 1/1 DVN configuration that enabled a $292 million exploit tied to North Korean attackers. The firm says its core protocol was not compromised and attributes the attack to internal RPC infrastructure compromise plus DDoS on external RPCs. LayerZero will ban 1/1 DVNs, migrate defaults to 5/5 (or at least 3/3 where only three DVNs exist), removed a historically misused multisig signer, rotated wallets, added device anomaly detection and built a custom multisig (OneSig). Competitors are picking up clients: Kelp moved its rsETH bridge to Chainlink and Solv Protocol is migrating over $700M in tokenized-Bitcoin infrastructure away from LayerZero.
AI Analysis
LayerZero admitted it 'made a mistake' by allowing a 1/1 DVN that facilitated a $292M hack (attributed to North Korean attackers), is changing defaults to stronger 5/5 or 3/3 multisigs, disclosed internal RPC compromise and DDoS vectors, removed a misused multisig signer, rotated wallets and built OneSig, while clients (Kelp, Solv) are moving large assets (rsETH, >$700M) to competitors — facts that reduce confidence and cause client migration.
Expected Investor Sentiment: Bearish
Potential Market Impact: Significant
Source Articles
- LayerZero says it ‘made a mistake’ in $292 Million Kelp exploit - CoinDesk
- Judge Clears $71M ETH Transfer to Aave as rsETH Recovery Enters Final Phase - Bitcoin.com
- Layerzero Discloses RPC Poisoning Incident Linked to $292M KelpDAO Hack - Bitcoin.com
- Why a 2017 Linux bug is now a major concern for the crypto industry - Cointelegraph