Crypto Times Logo Black
Google News Follow Banner
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • DeFi News
    • Blockchain News
    • Industry
  • Exclusive
  • Opinion
  • Learn
    • Explained
    • How To
    • Insights
  • Podcasts
  • More
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
The Crypto TimesThe Crypto Times
  • All News
  • Market
  • Bitcoin
  • Ethereum
  • Altcoins
  • Regulations & Policies
  • Blockchain
  • DeFi
  • Industry
  • Exclusive
  • Opinion
Search
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • Blockchain
    • DeFi
    • Industry
    • Exclusive
    • Opinion
  • Learn
    • Explained
    • How To
    • Insights
  • Quick Links
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
    • AI Policy
    • Sponsored & Advertorial Policy
  • Podcasts
Follow US
© 2026 By Crypto Times. All Rights Reserved.
DeFi News

LayerZero Says “We Own That” After $292M Kelp DAO Hack, Admits Security Mistake

Three weeks after the $292 million Kelp DAO exploit, LayerZero admitted its single-verifier setup was a mistake, apologized for its response, and announced security upgrades as major partners migrate to Chainlink’s CCIP.

Written By:
Dishita Malvania

Last updated: 41 minutes ago
Published 41 minutes ago
Share
Last updated: 41 minutes ago
Published 41 minutes ago
LayerZero Says “We Own That” After $292M Kelp DAO Hack, Admits Security Mistake
Show AI Summary
LayerZero’s team takes responsibility for the $292 million Kelp DAO exploit, admitting its Decentralized Verifier Network was insufficient
Kelp DAO’s configuration choices were initially blamed, but LayerZero now acknowledges its own system design was inadequate for large transactions
LayerZero’s leadership concedes poor communication over the past three weeks, impacting user trust amidst migrations to rival Chainlink’s CCIP

LayerZero has issued a notable reversal in its response to the $292 million Kelp DAO exploit, acknowledging that its Decentralized Verifier Network (DVN) should never have been used as the sole verifier for high-value cross-chain transactions.

Three weeks after the April 18 attack, the omnichain interoperability protocol admitted that its initial post-mortem failed to address the core concern raised by critics: that allowing a single verifier to secure hundreds of millions of dollars created a critical point of failure. In its first response, LayerZero maintained that the protocol had “functioned exactly as intended” and placed responsibility on Kelp DAO’s configuration choices.

In a new blog post published Friday and shared on X, LayerZero softened that stance, accepting that the system design was inadequate for transactions of that scale and conceding that its earlier explanation did not fully reflect what mattered most to users who lost funds. 

The update also disclosed a previously unreported operational security lapse involving one of the company’s multisig signers, who used a production hardware wallet for a personal trade several years ago.

“We’ve done a terrible job on comms over the past three weeks,” the team wrote in the opening lines of the post, before adding that the company had wanted to lead with a comprehensive post-mortem but should have led with directness instead.

The directness, however overdue, arrives at what is arguably the worst possible moment for the protocol, with two of its largest integrators having already announced migrations to Chainlink’s CCIP, the rival cross-chain messaging standard. 

At the same time, more than $700 million in tokenized bitcoin in the process of being moved off LayerZero’s rails entirely, even as the multi-party recovery effort set up to make affected users whole has had to lean on a contested governance vote from the Arbitrum DAO and a courtroom ruling on Friday simply to keep its funding pipeline intact.

What actually happened

According to the post, LayerZero’s internal RPC nodes, which the LayerZero Labs DVN relied on to read source-chain state, were compromised by North Korea’s Lazarus Group. 

Attackers poisoned the data feeds on those nodes while simultaneously launching a DDoS attack against LayerZero’s external RPC providers, forcing the DVN to fall over to compromised infrastructure and attest to transactions that never actually occurred on the source chain.

The protocol had earlier attributed the attack to TraderTraitor, a Lazarus subgroup known for targeting crypto infrastructure.

LayerZero said the exploit impacted a single application, representing roughly 0.14% of total applications on the network and approximately 0.36% of the value of assets using the protocol. The team noted that more than $9 billion has moved across LayerZero since April 19.

The concession that matters

The most significant shift in the new post is LayerZero’s acknowledgement of its own role in the incident. “We believe developers should choose their own security configurations, but we made a mistake by allowing our DVN to act as a 1/1 DVN for high-value transactions,” the company wrote. “We didn’t police what our DVN was securing, which created a risk we simply didn’t see. We own that.”

The framing matters because LayerZero’s initial incident statement had placed blame on Kelp DAO’s configuration, describing the 1-of-1 DVN setup as a decision made against guidance. Kelp DAO publicly disputed that account, citing LayerZero’s own documentation, quickstart guides, and developer examples as evidence that the single-verifier configuration was effectively the platform’s default onboarding path.

A Dune analysis cited by Kelp at the time found that47% of roughly 2,665 active LayerZero OApp contracts were running the same configuration at the time of the attack.

A three-and-a-half-year-old multisig incident

The blog post also disclosed a previously unreported operational security incident. Roughly three and a half years ago, one of LayerZero’s multisig signers used their production hardware wallet to execute a personal trade, when they had intended to use a separate personal device.

“This is obviously not ok,” the team wrote. The signer was removed from the multisig, wallets were rotated, and the company added localized anomaly detection software to each signing device.

The disclosure lands amid ongoing scrutiny of LayerZero’s multisig operational security. Onchain researchers and Chainlink community liaison Zach Rynes had flagged evidence that production multisig keys had been used for unrelated DEX activity, including what appeared to be a swap for the memecoin McPepes on Uniswap. LayerZero CEO Bryan Pellegrino said the transactions were OFT testing by former signers who have since been removed from the multisig.

What LayerZero is changing

LayerZero outlined a series of changes already in motion:

The LayerZero Labs DVN no longer services 1/1 DVN configurations. Defaults on all pathways are being migrated to a 5/5 setup where possible, with a floor of 3/3 on chains where only three DVNs are available. 

The team is also developing a second DVN client written in Rust for client diversity, and has reconfigured its RPC setup to allow DVNs to select granular quorums across internal, dedicated-external, and shared-external RPC providers.

On the signing side, LayerZero said it plans to raise its own multisig threshold from 3-of-5 to 7-of-10 across all chains where its custom-built multisig OneSig is supported. OneSig, introduced last year, allows signers to download transactions, then merklize and hash them locally before signing the root, preventing the backend from slipping in unauthorized transactions.

The team also said every OneSig signer has built a private security checker that runs on their specialised signing machine, with criteria kept private from the company and other signers to avoid a single point of compromise.

A new platform called Console is also in development, intended to give asset issuers a unified place to configure, deploy, and manage cross-chain security, with automated anomaly detection for unknown DVNs, ownership changes, block confirmation changes, and unsafe defaults.

Migrations and recovery pressure

The apology arrives at an awkward moment for LayerZero. Two major protocols have moved their cross-chain infrastructure off LayerZero in the weeks since the exploit, both citing security concerns and both migrating to Chainlink’s CCIP, the cross-chain interoperability protocol that requires 16 independent node operators to validate cross-chain transactions.

Kelp DAO announced its departure earlier this week, becoming the first major protocol to leave LayerZero following the hack. Solv Protocol followed shortly after, announcing the migration of more than $700 million in tokenized bitcoin off LayerZero infrastructure.

The DeFi United recovery initiative, formed in the immediate aftermath of the exploit, has raised more than $300 million in ETH and stablecoins. LayerZero contributed 10,000 ETH, split between a 5,000 ETH outright donation and a 5,000 ETH loan to Aave, the largest DeFi lending protocol, which faces an estimated $124 million to $230 million in bad debt tied to the incident.

The Arbitrum DAO voted to release 30,766 frozen ETH to the recovery effort, and a judge on Friday allowed the transfer to proceed despite a restraining notice filed by North Korea terrorism victims and creditors seeking to seize the funds.

What comes next

LayerZero said an official post-mortem will follow once its external security partners complete their review. In the meantime, the team is recommending that all applications pin their configurations rather than rely on defaults controlled by LayerZero Labs, set block confirmations high enough to make reorganisation effectively impossible, configure DVNs to include at least two parties (with three to five preferred), and consider running their own DVN as a required verifier.

Whether the directness of this apology is enough to slow the pace of migrations remains an open question. The protocol’s core architectural argument, that applications can fully own their security end-to-end, is not what’s being tested. What’s being tested is whether issuers trust the defaults and the team behind them. That’s a harder thing to rebuild.

Also Read: 40+ DeFi Protocols Shut Down in 2026: Inside the $770M Hack Crisis Reshaping Crypto

Disclaimer: The information researched and reported by The Crypto Times is for informational purposes only and is not a substitute for professional financial advice. Investing in crypto assets involves significant risk due to market volatility. Always Do Your Own Research (DYOR) and consult with a qualified Financial Advisor before making any investment decisions.

Follow The Crypto Times on Google News to Stay Updated!      Google News
Google News Banner

Share This Article
Whatsapp Whatsapp LinkedIn Telegram Copy Link
Dishita Malvania - Senior crypto journalist at The Crypto Times
By Dishita Malvania
Follow:
Dishita Malvania is a Crypto Journalist with 3 years of experience covering the evolving landscape of blockchain, Web3, AI, finance, and B2B tech. With a background in Computer Science and Digital Media, she blends technical knowledge with sharp editorial insight. Dishita reports on key developments in the crypto world—including Litecoin, WazirX, Solana, Cardano, and broader blockchain trends—alongside interviews with notable figures in the space. Her work has been referenced by top digital media outlets like Entrepreneur.com, The Independent, The Verge, and Metro.co, especially on trending topics like Elon Musk, memecoins, Trump, and notable rug pulls.

Latest News

What Does Bitcoin Become in a World Questioning the Dollar?
What Does Bitcoin Become in a World Questioning the Dollar?
40+ DeFi Protocols Shut Down in 2026 Inside the $770M Hack Crisis Reshaping Crypto
40+ DeFi Protocols Shut Down in 2026: Inside the $770M Hack Crisis Reshaping Crypto
TON Leads Crypto Staking Returns as Telegram Ecosystem Expands
TON Leads Crypto Staking Returns as Telegram Ecosystem Expands
TeraWulf Earns More From AI Computing Than Bitcoin Mining in Q1
TeraWulf Earns More From AI Computing Than Bitcoin Mining in Q1
US Senator Warren Flags Meta’s Stablecoin Project Potential Risk
US Senator Warren Flags Meta’s Stablecoin Project Potential Risk

Find Us on Socials

You may also like

1inch Pushes Intent-Based Swaps to Combat MEV Exploits

1inch Pushes Intent-Based Swaps to Combat MEV Exploits

Solv Shifts $700M BTC Assets to Chainlink CCIP Over Bridge Risks

Solv Shifts $700M BTC Assets to Chainlink CCIP Over Bridge Risks

Aave Escalates Recovery Push After rsETH Exploit Liquidations

Aave Escalates Recovery Push After rsETH Exploit Liquidations

TrustedVolumes Exploit Drains $5.9M Through 1inch Liquidity System

TrustedVolumes Exploit Drains $5.9M Through 1inch Liquidity System

The Crypto Times Logo PNG

Providing real-time, accurate Crypto reporting. Your trusted source for Crypto News and Research.

Stay Updated

All News
Exclusive
Opinions
Learn
Podcasts

Company

About Us
Our Authors
Editorial Policy
AI Policy
Advertorial Policy

Get In Touch

Contact Us
Career

Find Us on Socials

X-twitter Linkedin Telegram Youtube Instagram

© 2026 The Crypto Times | A BITROCK TECHNOLOGIES L.L.C. Company.

DMCA.com Protection Status
  • Terms and Conditions
  • Disclaimer
  • Privacy Policy
  • Cookie policy
Do Not Sell or Share My Personal Information