
{"id":153635,"date":"2026-04-21T08:00:28","date_gmt":"2026-04-21T08:00:28","guid":{"rendered":"https:\/\/mycryptomania.com\/?p=153635"},"modified":"2026-04-21T08:00:28","modified_gmt":"2026-04-21T08:00:28","slug":"crypto-community-slams-layerzero-more-verifiers-wont-stop-the-next-290m-hack","status":"publish","type":"post","link":"https:\/\/mycryptomania.com\/?p=153635","title":{"rendered":"Crypto Community Slams LayerZero: More Verifiers Won\u2019t Stop The Next $290M Hack"},"content":{"rendered":"<p>LayerZero is facing heavy criticism for its response to the recent $290 million KelpDAO exploit after the omnichain interoperability protocol blamed Kelp\u2019s 1-of-1 verifier configuration for the incident.<\/p>\n<h2>LayerZero Blames KelpDAO For $290M Exploit<\/h2>\n<p>Over the weekend, liquid restaking protocol KelpDAO was the victim of an attack that drained over $290 million in rsETH from the project after malicious actors exploited a weakness in the protocol\u2019s LayerZero-powered bridge.<\/p>\n<p>Two days later, LayerZero addressed the incident, which became the largest DeFi hack of 2026, just weeks after Drift Protocol\u2019s $285 million <a href=\"https:\/\/www.newsbtc.com\/news\/285m-solana-protocol-drift-largest-exploit-2026\/\" target=\"_blank\" rel=\"noopener\">exploit<\/a> shocked the industry.<\/p>\n<p>LayerZero attributed the \u201chighly sophisticated attack\u201d to North Korea\u2019s Lazarus Group, claiming that it was a crypto infrastructure attack rather than a protocol exploit, and affirming that \u201cthere is zero contagion to any other cross-chain assets or applications.\u201d<\/p>\n<p>They explained that the protocol is built on a \u201cfoundation of modular, application-configurable security,\u201d using Decentralized Verifier Networks (DVNs), independent entities responsible for verifying the integrity of cross-chain messages.<\/p>\n<p>The malicious actors allegedly poisoned downstream RPC infrastructure by \u201ccompromising a quorum of the RPCs the LayerZero Labs DVN relied upon to verify transactions.\u201d<\/p>\n<p>Per the post, the attackers swapped binaries for a custom payload to forge messages and used DDoS attacks to force failover to the poisoned nodes, triggering the DVN into confirming fake transactions.<\/p>\n<p>Based on this, LayerZero <a href=\"https:\/\/www.newsbtc.com\/news\/layerzero-soars-zero-debut-institutional-backing\/\" target=\"_blank\" rel=\"noopener\">placed<\/a> responsibility on KelpDAO for using a 1-of-1 verifier configuration instead of the multi-DVN recommendations: \u201cThis incident was isolated entirely to KelpDAO\u2019s rsETH configuration as a direct consequence of their single-DVN setup.\u201d<\/p>\n<h2>Crypto Community Criticizes \u2018Lack Of Accountability\u2019<\/h2>\n<p>The crypto community reacted to the post-mortem, sharing its <a href=\"https:\/\/www.newsbtc.com\/news\/crypto-winter-trading-volume-lowest-since-2023\/\" target=\"_blank\" rel=\"noopener\">concerns<\/a> about LayerZero\u2019s response and criticizing the protocol for placing all responsibility only on Kelp\u2019s security setup.<\/p>\n<p>\u201cImagine building a bridge and vehicles pays to cross, the bridge collapsed and you said it\u2019s their fault for crossing the bridge. A classic clownery act from Bunch of clowns with zero accountability,\u201d X user Saint <a href=\"https:\/\/x.com\/thesaint_\/status\/2046111507969188093?s=20\" target=\"_blank\" rel=\"noopener\">wrote<\/a>.<\/p>\n<p>Others <a href=\"https:\/\/x.com\/ditto_\/status\/2046092665079656925?s=20\" target=\"_blank\" rel=\"noopener\">questioned<\/a> why LayerZero included a \u201c1-of-1\u201d configuration if the purpose of a DVN is customizable\/modular security. \u201cIf the system allows this option, it\u2019s not the fault of the customer who chose it\u2014it\u2019s a fundamental design flaw by the system that permitted it,\u201d user Ditto wrote.<\/p>\n<p>\u201cAt the end of the day, the fact remains that the DVN RPC was compromised. DVN is a LayerZero product, and they are the ones who sold it to these teams,\u201d he continued.<\/p>\n<p>Similarly, Chainlink community manager Zach Rynes <a href=\"https:\/\/x.com\/ChainLinkGod\/status\/2046105500509675918?s=20\" target=\"_blank\" rel=\"noopener\">accused<\/a> the protocol of deflecting responsibility for the compromise of their own DVN node.<\/p>\n<p>He also criticized them for \u201cthrowing KelpDAO under the bus\u201d for trusting LayerZero Labs\u2019 setup that they \u201cwillingly support and only blocked after getting hacked, all while claiming everything worked as designed.\u201d<\/p>\n<p>Meanwhile, Yearn Finance core team developer Artem K <a href=\"https:\/\/x.com\/banteg\/status\/2046124661352644907?s=20\" target=\"_blank\" rel=\"noopener\">noted<\/a> on X that the attack was described as a compromise of an RPC node and RPC poisoning, but that their own infrastructure is what was compromised. \u201cGiven it doesn\u2019t say how the breach has occurred, I wouldn\u2019t rush re-enabling the bridges,\u201d he added.<\/p>\n<p>Wrong Diagnosis, Wrong Fix?<\/p>\n<p>Analyst The Smart Ape also <a href=\"https:\/\/x.com\/the_smart_ape\/status\/2046156224303911011?s=20\" target=\"_blank\" rel=\"noopener\">claims<\/a> that LayerZero made the wrong diagnosis and offered the wrong solution. Notably, the protocol\u2019s post-mortem suggested migrating all applications with 1-of-1 DVN configurations to multi-DVN setups to prevent similar attacks.<\/p>\n<p>However, the analyst pointed out that multi-verifiers won\u2019t stop the next multi-million-dollar attack, asserting that they could fail as all DVNs read chain states from the same handful of RPC providers, which are mostly clustered on AWS or GCP.<\/p>\n<p>If five \u201cindependent\u201d DVNs read from the same three RPC providers, an attacker who poisons those three RPCs will poison all five verifiers simultaneously. \u201cIf all your verifiers get fooled in the same way at the same time, the math collapses back to 1-of-1. Five clones are not five witnesses,\u201d he added.<\/p>\n<p>To solve this, the analyst suggested that every <a href=\"https:\/\/www.newsbtc.com\/news\/iphone-users-warned-crypto-scams-can-trigger-coruna-ios-exploits\/\" target=\"_blank\" rel=\"noopener\">verifier<\/a> runs its own full node on different client software, hosted on different cloud providers, maintained by different ops teams, peered with different subsets of the Ethereum network.<\/p>\n<p>\u201cThe fix isn\u2019t multi-anything. The fix is that verifiers should attest to their own substrate, not just to chain state. until you can audit a DVN\u2019s upstream topology, which RPC providers, which client software, which clouds, which regions, \u2018M-of-N secured\u2019 is marketing copy for a property that hasn\u2019t actually been built. Lazarus didn\u2019t break cryptography on April 18. They broke three servers,\u201d he concluded.<\/p>","protected":false},"excerpt":{"rendered":"<p>LayerZero is facing heavy criticism for its response to the recent $290 million KelpDAO exploit after the omnichain interoperability protocol blamed Kelp\u2019s 1-of-1 verifier configuration for the incident. LayerZero Blames KelpDAO For $290M Exploit Over the weekend, liquid restaking protocol KelpDAO was the victim of an attack that drained over $290 million in rsETH from [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":153636,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-153635","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-discovery"],"_links":{"self":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts\/153635"}],"collection":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=153635"}],"version-history":[{"count":0,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts\/153635\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/media\/153636"}],"wp:attachment":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=153635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=153635"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=153635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}