LayerZero attributes the $292M KelpDAO bridge hack to North Korea's Lazarus Group

icon币界网
Share
Share IconShare IconShare IconShare IconShare IconShare IconCopy
AI summary iconSummary

expand icon
LayerZero has linked the $292 million crypto hack of the KelpDAO cross-chain bridge to North Korea’s Lazarus Group, specifically its TraderTraitor subunit. Attackers drained 116,500 rsETH on Saturday, triggering panic withdrawals across DeFi. The group cited indicators of a "highly sophisticated state actor" and will discontinue support for single-validator systems. Security teams labeled the vulnerability a "single point of failure," noting that the exchange hack enabled funds to be siphoned within minutes via a compromised checkpoint.
CoinDesk reports:

LayerZero stated in a preliminary report that the attack, which stole approximately $292 million from the KelpDAO cross-chain bridge over the weekend, was “likely” carried out by North Korea’s Lazarus group, specifically its TraderTraitor subunit. Analysis Monday.

On Saturday, attackers stole 116,500 rsETH (a liquid staking token backed by staked Ethereum) from the KelpDAO bridge, triggering a wave of withdrawals across platforms. Decentralized finance saw over $10 billion in loan protocol funds exit Avail.

LayerZero stated that the attack exhibits characteristics of a "highly sophisticated state actor," likely North Korea's Lazarus Group, and specifically pointed to its TraderTraitor subunit.

According to reports, North Korea’s cyber operations are managed by the Reconnaissance General Bureau, which oversees several distinct teams, including TraderTraitor, AppleJeus, APT38, and DangerousPassword. Analysis by Samczsun, researcher at Paradigm.

Among these subgroups, TraderTraitor is considered the most sophisticated actor targeting cryptocurrencies within North Korea and has previously been linked to compromises of Axis Infinite Ronin Bridge and WazirX.

LayerZero stated that KelpDAO used a single validator to approve inbound and outbound bridge funds, and added that it had repeatedly urged KelpDAO to adopt multiple validators.

LayerZero states that it will no longer approve any applications still running this setup.

Single point of failure

Observers said the vulnerability revealed how the bridge was built to trust only a single validator.

Shalev Kren, co-founder of the cybersecurity firm Sodot, said this is “a single point of failure,” no matter how much the marketing department tries to spin it. Decrypt

Keren stated that a single compromised checkpoint is sufficient to allow funds to leave the bridge, and no audit or security review can fix this flaw without "eliminating unilateral trust from the architecture itself."

This view has been endorsed by others. According to Haoze Qiu, Head of the Grvt blockchain,“Kelp DAO appears to have accepted a bridge security setup with insufficient redundancy for assets of this scale,” and added that LayerZero “bears responsibility” given that “this breach involved infrastructure related to its validator stack, even if it was not described as a core protocol vulnerability.”

According to analysis by blockchain security firm Cyvers, the attacker stole another $100 million in just three minutes, but was quickly blacklisted, halting their actions. Cyvers Chief Technology Officer Mel Dolev said the attack was launched by deceiving a single communication channel. Decrypt

The attacker compromised the two verification pathways used to check whether withdrawals had genuinely occurred on Unichain, feeding them false "yes" responses, and then took the remaining pathways offline, forcing the validator to rely on the compromised ones.

The vault is fine. The security guard is honest. The door lock mechanism is working normally,” Dolgov said. “The lie was told directly and quietly to the person who verbally opened the vault.”

However, LayerZero, which provided the infrastructure for the flood relief bridge, pointed to Lazarus as the likely culprit, while Cyvers did not reach the same conclusion in its own analysis.

Dolgov said some patterns are consistent with the actions of the Democratic People's Republic of Korea in terms of complexity, scale, and coordinated execution, but no associated wallets have been confirmed.

He also added that the malicious node software was carefully designed to delete itself once the attack ends, erasing binaries and logs to obscure the attacker’s footprint both in real time and after the fact.

At the beginning of this month, attackers drained approximately $285 million from Drift, a perpetuals-based protocol on Solana, and subsequent exploitation was attributed to North Korean agents.

Dolev noted that the Drift hack was "very different in terms of preparation and execution," but both attacks required extensive preparation, deep expertise, and significant resources to succeed.

Savers suspects the stolen funds have been transferred to this Ethereum address, as reported in a separate report. Chainalysis investigator ZachXBT identified the attack address and flagged it alongside four other attack addresses. The funds for these attack addresses originated from... coin mixers. According to ZachXBT, Tornado Cash is currently in high demand.

Disclaimer: The information on this page may have been obtained from third parties and does not necessarily reflect the views or opinions of KuCoin. This content is provided for general informational purposes only, without any representation or warranty of any kind, nor shall it be construed as financial or investment advice. KuCoin shall not be liable for any errors or omissions, or for any outcomes resulting from the use of this information. Investments in digital assets can be risky. Please carefully evaluate the risks of a product and your risk tolerance based on your own financial circumstances. For more information, please refer to our Terms of Use and Risk Disclosure.