• Advertise with us
  • Pricing
  • Submit News
Instagram Twitter Facebook Telegram Youtube Linkedin
EdaFace Newsfeed
EdaFace Newsfeed
  • News

    Main News

    • Crypto News
    • Bitcoin and BTC
    • Altcoin News
    • Security & Hacks
    • ICO & Token Sales
    • Interviews & Profiles

    Information

    • Press Release
    • Research Report
    • Regulations, Law & Policy
    • Community/Guest Post
    • Events & Conferences
    • Tutorials & Guides

    Market

    • Technical Analysis
    • Price Analysis
    • Cryptocurrency Price Prediction
    • DeFi (Decentralized Finance)
    • Mining & Staking

    Other Categories

    • NFTs & Digital Art
    • Opinion & Editorials
    • Tech Innovations
  • Price Analysis
  • Cryptocurrencies
    • Coin Ranking
    • Trending
    • EDA Token
  • Exchanges
    • Spot
    • Derivatives
    • DEX
    • EDA Plantation
  • Verification Centre
    • Rug Pull Check
    • Blockchain Ecosystem
    • EDA Token
  • MarketPlaces
    • NFT Marketplace
    • Digital Literature
    • Digital Mall
    • P2P Market
    • Metaverse
  • EDA Academy
More
  • News
  • Price Analysis
  • Cryptocurrencies
    • Coin Ranking
    • Trending
    • EDA Token
  • Exchanges
    • Spot
    • Derivatives
    • DEX
    • EDA Plantation
  • Verification Centre
    • Rug Pull Check
    • Blockchain Ecosystem
    • EDA Token
  • MarketPlaces
    • NFT Marketplace
    • Digital Literature
    • Digital Mall
    • P2P Market
    • Metaverse
  • EDA Academy
Reading: $500 million blow to Kelp protocol from North Korea-linked attackers
Share
Sign In
EdaFace Newsfeed
EdaFace Newsfeed
  • EdaFace Home
  • Edaface News
    • EdaFace News
    • Advertisement
    • Pricing
    • Submit News
  • News
    • Price Analysis
  • Cryptocurrencies
    • Coin Ranking
    • Trending
    • EDA Token
  • Exchanges
    • Spot
    • Derivatives
    • DEX
    • EDA Plantation
  • Verification Centre
    • Rug Pull Check
    • Blockchain Ecosystem
    • EDA Token
  • MarketPlaces
    • NFT Marketplace
    • Digital Literature
    • Digital Mall
    • P2P Market
    • Metaverse
  • EDA Academy
  • Contact Us
  • EdaFace Home
  • Edaface News
    • EdaFace News
    • Advertisement
    • Pricing
    • Submit News
  • News
    • Price Analysis
  • Cryptocurrencies
    • Coin Ranking
    • Trending
    • EDA Token
  • Exchanges
    • Spot
    • Derivatives
    • DEX
    • EDA Plantation
  • Verification Centre
    • Rug Pull Check
    • Blockchain Ecosystem
    • EDA Token
  • MarketPlaces
    • NFT Marketplace
    • Digital Literature
    • Digital Mall
    • P2P Market
    • Metaverse
  • EDA Academy
  • Contact Us
EdaFace Newsfeed > Latest News > Security & Hacks > $500 million blow to Kelp protocol from North Korea-linked attackers
Security & Hacks

$500 million blow to Kelp protocol from North Korea-linked attackers

vitalclick
Last updated: April 20, 2026 10:34 pm
2 days ago
Share
SHARE

Contents
Suspicious Vulnerabilities and Attack MethodSpillover Effect and Decentralization DiscussionsCritical Support Layers on Target

In recent weeks, the major attacks carried out repeatedly by North Korea-related hacker groups in the crypto world have attracted attention. After the crypto trading platform Drift was recently targeted, a major cyber attack has now been carried out on the restaking protocol called Kelp using similar methods. Kelp is known as an important protocol in the decentralized finance (DeFi) ecosystem, which works integrated with LayerZero’s cross-chain infrastructure.

Suspicious Vulnerabilities and Attack Method

It turned out that the attack was carried out by abusing deficiencies and uncontrolled aspects in the basic operating logic of the system, rather than breaking traditional encryption or stealing keys. Attackers manipulated the resources that provide data to the infrastructure running the Kelp protocol, causing the system to confirm transactions with incorrect inputs. Fundamentally, how the mechanism works has not been changed; The authority and control weaknesses inherent in the system were exploited.

It was understood that the use of only a single auditor in the protocol’s cross-chain message verification process made the attack possible. This approach can provide quick and simple verification of transactions; but it creates a serious vulnerability in terms of security. Therefore, experts recommend requiring more independent and multiple verification mechanisms.

It is stated that in the Kelp case, the main security vulnerability stems from over-reliance on the system’s verification mechanism. It is emphasized that “The person who signs does not mean that he is telling the truth, the signature only shows who wrote it.”

Spillover Effect and Decentralization Discussions

The effects of the attack were not limited to Kelp. Since assets can be used as hostage on multiple platforms in DeFi protocols, the problem on Kelp has moved to other systems with a domino effect. In this process, infrastructures that provide inter-chain transfer and various platforms used for asset transfer were also damaged. It was reported that major players such as Aave, one of the lending platforms, suffered losses after accepting Kelp-derived assets as hostage, and even a single vulnerability could create a chain wave of stress in the market.



Claims of decentralization have also come to the fore again. It is stated that the presence of a single validator in the system does not fully reflect this feature, although the system is marketed as decentralized. Experts evaluate that, “In reality, decentralization is determined by the choices made; the weakest link can make the entire system fragile.”

A security expert said, “The main issue of this attack is not breaking the encryption, but clearly revealing how the structure was established. A single auditor in the infrastructure is not enough to be decentralized.” He quotes his statement.

Critical Support Layers on Target

It is stated that North Korean hackers have recently focused especially on cross-chain infrastructures and restaking protocols. These infrastructures enable the transfer of large amounts of crypto assets between different systems and play a critical role in the ‘background’ of the ecosystem. These layers, which are often poorly visible, can unintentionally contain large vulnerabilities. Experts say that instead of concentrating on exchanges or software bugs, attacks are now shifting to the interconnection points of the ecosystem, which are described as ‘plumbing’.



According to industry representatives, the attack on Kelp did not present a new security vulnerability, but rather showed the impact of known deficiencies and how they can lead to great risks if precautions are not taken. In particular, it is emphasized that security should be made a mandatory condition rather than a complementary option. In this period when attackers are rapidly developing methods, the fact that known vulnerabilities are still not resolved may lead to greater losses.

One expert said, “It is unacceptable for a protocol to present a setting marked ‘not secure’ as the default. For security, not everyone can be expected to read all the documentation and find the most correct setting.” expresses his opinion.

In total, Drift and Kelp attacks caused losses exceeding $500 million in two weeks. This situation led to both questioning the security culture in the ecosystem and increasing demands for tighter control and transparency in the decentralized finance world.

Disclaimer: The information contained in this content is not investment advice. Please note that cryptocurrencies involve high volatility and therefore risk. It is recommended that you make your investment decisions based on your own research and risk assessments. You can review our Trust Center page for detailed information.

You Might Also Like

He Hacked the SEC Account and Shared Bitcoin, What Was the Penalty?

Cryptocurrency Theft Hit Turkey Too! More than 28 Thousand Devices Are in Danger!

Chrome Extension Nightmare: Trust Wallet Users Lost Millions

$176 million worth of crypto assets moved to different networks in Kelp DAO attack

YubiKey’s Lifetime Vulnerability Revealed, What Does It Do and Why Is It Important?

TAGGED:Security
Share This Article
Facebook Twitter Email Print
Previous Article Bitcoin holds above $76,000, KelpDAO hack hits DeFi market
Next Article $230 million risk in Aave: rsETH gap crisis broke out
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Crypto Live Widget

Follow for Live Updates
Subscribe to our newslettern

Get Newest Articles Instantly!

- Advertisement -
Ad imageAd image
Popular News
Official Launch Announcement – EdaFace NFT Marketplace
Why Ethereum is Poised to Explode to $4,600 Sooner Than You Think!
Five Altcoins With 100x Potential To Buy Now
ETF Approvals, Regulatory Frameworks, and Market Dynamics
Top News, Bitcoin and Altcoin Volatility, Major Hacks, and DeFi Investments

Company

  • Vision
  • Mission
  • LitePaper
  • Whitepaper
  • Core Values
  • Branding
  • Teams
  • Career Listing
  • FAQ
  • Welfare Donations

Products

  • EDA Coin
  • Blockchain Literature
  • EdaFace Dex
  • EdaFace Mall
  • Listing Platforms
  • Newsfeed
  • NFT Marketplace
  • P2P Market
  • Scam Verification Centre
  • School of Crypto

Legal

  • Term of Use
  • Privacy Policy
  • Disclaimers
  • Contact Us
  • Chat Forun

Always Stay Up to Date

Subscribe to our newsletter to get our newest articles instantly!

EdaFace

About US

EdaFace is a user interface aggregator that brings all the various functionalities of the crypto industry onto a single platform! You can advertise, launch and crowdfund your crypto project via EdaFace Launchpad and Newsfeed.

Contact us: [email protected]

Follow us

Instagram Twitter Facebook Telegram Youtube Linkedin

Copyright © 2022 – 2026. EdaFace is a product of Emerging Digital Age (EDA) Pty Ltd. All Rights Reserved.

Join Us!
Subscribe to our newsletter and never miss our latest news, podcasts etc..

Zero spam, Unsubscribe at any time.
EdaFace
Welcome Back!

Sign in to your account

Lost your password?