Stylized room with figures analyzing data charts
Crypto

Lazarus-linked Kelp exploit turns cross-chain misconfig into DeFi collateral contagion

More than $500 million was siphoned across the Drift and Kelp incidents in just over two weeks.

By AI Newsbot7 min read

A Lazarus-linked exploit of Kelp’s cross-chain/restaking setup landed less than three weeks after a social-engineering hit on Drift, with more than $500 million siphoned across both incidents in just over two weeks. The Kelp breach is now stressing downstream DeFi venues because the impacted assets were reused as collateral, turning a single failure into a broader balance-sheet problem.

Key Takeaways

  • More than $500 million was siphoned across the Drift and Kelp incidents in just over two weeks.
  • The Kelp breach didn’t require cracked keys or broken encryption. Attackers manipulated inputs so the system approved transactions that never happened.
  • Cross-chain message approval hinged on a single verifier, and LayerZero later recommended multiple independent verifiers.
  • Losses spread beyond Kelp because the impacted assets were posted as collateral across DeFi, including lending markets such as Aave.

Two Weeks, $500M+: Drift to Kelp and the Return of DeFi Contagion

The sequence matters more than the individual headlines. Less than three weeks after North Korea-linked hackers used social engineering to hit crypto trading firm Drift, hackers tied to the same state-linked ecosystem appear to have executed another major exploit involving Kelp, a restaking protocol integrated with LayerZero’s cross-chain infrastructure.

The combined damage is already the point: more than $500 million siphoned across the Drift and Kelp incidents in just over two weeks. That pace is what changes trader behavior. When losses cluster this tightly, desks stop treating exploits as isolated operational noise and start treating them as a market-structure variable, especially when the compromised assets can be rehypothecated across venues.

Security experts framed the Drift-to-Kelp sequence as something more organized than one-off hacks and consistent with a sustained, state-driven campaign tied to the financial needs of a sanctioned state. Alexander Urbelis, CISO and general counsel at ENS Labs, put it bluntly: “This is not a series of incidents. It is a cadence,” adding, “You cannot patch your way out of a procurement schedule.”

What stands out here is the tactical shift. Drift was social engineering. Kelp reads like infrastructure exploitation, aimed at the assumptions inside the stack’s plumbing. That’s the layer that tends to be hardest to monitor in real time and easiest to misconfigure, while still sitting under large pools of value.

How Kelp Was Tricked: When Signed Messages Carry False Data

The Kelp exploit is a clean example of why “secure” can be the wrong question. The breach did not involve breaking encryption or cracking keys. The system “worked the way it was designed to,” but attackers manipulated the data feeding into the system and forced it to rely on compromised inputs. The result was that Kelp approved transactions that never actually occurred.

Urbelis summarized the failure mode in a line traders should internalize: “The security failure is simple: a signed lie is still a lie,” and, “Signatures guarantee authorship. They do not guarantee truth.” In desk terms, the message had valid provenance, but the content was poisoned. The system verified who sent the message, not whether the message was true.

David Schwed, COO at blockchain security firm SVRN, framed it as architecture and configuration, not cryptography: “This attack wasn’t about breaking cryptography,” he said. “It was about exploiting how the system was set up.”

The practical implication is second-order. If the dominant failure mode is “message-truth” rather than key compromise, then risk assessment shifts away from just custody hygiene and toward the integrity of cross-chain inputs, validation design, and the operational reality of how integrations are configured.

The Single-Verifier Weak Point and LayerZero’s Post-Exploit Guidance

One configuration choice sits at the center of the Kelp incident: cross-chain message validation relied on a single verifier, effectively one checker approving messages. That setup is faster and simpler to deploy, but it removes a critical safety layer that would exist with multiple independent verifiers.

After the exploit, LayerZero recommended using multiple independent verifiers to approve transactions, likening it to requiring multiple signatures on a bank transfer. That recommendation is more than a best practice footnote. It’s an admission that verifier design is a first-order risk variable, because a single verifier turns a cross-chain integration into a single point of failure.

The debate that followed is also telling. Some ecosystem participants pushed back on the framing, arguing that LayerZero’s default setup was a single verifier. Critics countered that if a configuration is unsafe, it should not be shipped as an option. Schwed’s critique was direct: “If you’ve identified a configuration as unsafe, don’t ship it as an option,” adding, “Security that depends on everyone reading the docs and getting it right is not realistic.”

This is where decentralization marketing collides with implementation reality. Schwed said, “A single verifier is not decentralized,” adding, “It’s a centralized decentralized verifier.” Urbelis broadened the point: “Decentralization is not a property a system has. It is a series of choices,” and, “And the stack is only as strong as its most centralized layer.”

For traders, that’s the map. The weakest assumption is often not the chain’s cryptography. It’s the human and configuration layer where “optional” becomes “common,” and common becomes systemic.

Signals Traders Can Track as Cross-Chain Plumbing Gets Hardened

The immediate question is whether the ecosystem responds with enforceable hardening or with documentation and hope.

First signal: whether Kelp and other LayerZero integrations move from single-verifier setups to multiple independent verifiers following LayerZero’s recommendation. The direction of travel matters because it changes the probability distribution of future failures from “one compromised checker breaks the system” toward “attackers must defeat redundancy.”

Second signal: further disclosures of losses or restrictions tied to impacted assets being used as collateral on lending markets, including Aave. The Kelp fallout did not stay contained because the assets were used across multiple platforms. Schwed described the composability risk as balance-sheet fragility: “These assets are a chain of IOUs,” and, “And the chain is only as strong as the controls on each link.” When one link breaks, protocols that were never directly exploited can still end up holding the bag.

Third signal: additional exploit reports in cross-chain or restaking infrastructure that extend the Drift + Kelp two-week sequence. The campaign framing hinges on cadence. Another incident in the same plumbing layer would reinforce the interpretation that attackers are systematically targeting the stack’s assumptions.

Fourth signal: clarity from ecosystem participants on whether single-verifier configurations were defaults versus optional choices, and whether unsafe configurations remain available. That governance and product decision determines whether the next failure is a rare edge case or a repeatable playbook.

This Campaign Is Targeting the Stack’s Weakest Assumptions, Not Its Strongest Cryptography

I’m not treating this as a story about “bridges are risky” in the abstract. The specific pattern is more actionable: Drift was a social-engineering hit, then Kelp was a structural exploit where valid signatures carried false data and a single verifier became the choke point. That’s a shift from stealing access to exploiting assumptions.

The market consequence is the contagion channel. The Kelp incident spread because the impacted assets were reused across DeFi, including as collateral on lending markets like Aave, which are now dealing with losses. That’s the part traders feel. Not the exploit itself, but the downstream impairment when collateral quality is questioned and positions built on that collateral become unstable.

I’m watching this through three scenarios.

Scenario one: hardening becomes real. Integrations migrate to multiple independent verifiers, and ecosystem participants remove or strongly gate configurations that are acknowledged as unsafe. In that world, the Kelp exploit becomes a forcing function. Confirmation would be concrete moves away from single-verifier setups and clear statements that unsafe configurations are no longer offered as a casual option.

Scenario two: hardening stays cosmetic. LayerZero’s recommendation exists, but single-verifier deployments remain common because they are “faster and simpler to set up,” and the burden stays on teams to read docs perfectly. That keeps the same single-point-of-failure topology in production. Confirmation would be continued ambiguity over defaults and ongoing availability of the weaker configuration.

Scenario three: the cadence continues and the plumbing stays the target. Security experts already framed Drift + Kelp as organized and sustained, and Urbelis’ “cadence” line is the tell. Confirmation would be another exploit in cross-chain or restaking infrastructure that again leverages known design choices and weak configurations rather than novel cryptographic breaks.

My core thesis is simple: this is a campaign optimized to exploit message-truth and configuration weak points, and it becomes market-relevant the moment contaminated assets are accepted as collateral across DeFi. The thesis is confirmed if single-verifier configurations persist while collateral-linked losses keep propagating beyond the directly exploited protocol.

Sources