PANews reported on April 20th that, according to CoinDesk , Kelp DAO attributed a recent attack on approximately $ 290 million worth of rsETH cross-chain bridges to a breach of LayerZero 's default " 1/1 " single-validation configuration and its own infrastructure. The attackers compromised two LayerZero servers used for validating cross-chain transactions and launched a DDoS attack on a backup server, redirecting DVN traffic to the compromised node, thereby transferring approximately 116,500 rsETH from Kelp 's LayerZero bridge. Kelp stated that it has maintained communication with LayerZero since July 2024 but has not received any explicit request to change the DVN configuration. Furthermore, LayerZero documentation and GitHub examples use 1/1 as the default, and approximately 40% of access protocols use the same structure. Kelp emphasized that the core restaking contract was unaffected, and this attack was limited to the bridging layer.
Kelp DAO claims that LayerZero's default single-authentication configuration was the real reason for the $290 million bridging vulnerability being compromised.
Share to:
Author: PA一线
This content is for market information only and is not investment advice.
Follow PANews official accounts, navigate bull and bear markets together
Recommended Reading
Kelp DAO's rsETH cross-chain bridge was attacked, resulting in a loss of approximately $292 million.
PANews App
24/7 blockchain news tracking and in-depth analysis.

