Layerzero Discloses RPC Poisoning Incident Linked to $292M KelpDAO Hack
Key Takeaways
Lazarus Group attacked Layerzero Labs internal RPCs and poisoned data sources in order to attack the KelpDAO DeFi project.The security breach impacted 0.14% of applications and roughly 0.36% of asset value associated with Layerzero.Layerzero Labs is migrating all defaults to a 5/5 DVN setup to improve cross-chain security.
Layerzero Labs Apologizes for Lazarus Group Security Breach Response
Layerzero Labs issued a candid apology for a three-week communication silence following a security breach involving the Lazarus Group. According to an official update, the attackers poisoned the source of truth for internal Remote Procedure Calls (RPCs) used by the Layerzero Labs Decentralized Verifier Network (DVN).
This sophisticated hit coincided with a Distributed Denial of Service (DDoS) attack against the firm’s external RPC provider. The fallout, according to the report, was contained to a small fraction of the ecosystem. Layerzero noted that the incident impacted a single application, representing 0.14% of total apps and 0.36% of the total value locked on the protocol.
Since April 19, the team detailed that it has been working with external security partners to finalize a comprehensive post-mortem report. The team further admitted to a significant oversight in allowing their DVN to act as a solo verifier for high-value transactions. Layerzero also acknowledged that they failed to police what their DVN was securing, which created a “single point of failure” risk.
To rectify this, the lab is now educating developers on safe configurations and will no longer service 1/1 DVN setups. The disclosure also addressed a bizarre security lapse involving a multisig signer. Three and a half years ago, an individual mistakenly used a multisig hardware wallet for a personal trade.
The signer has since been removed, and the firm has implemented a custom-built multisig solution dubbed “Onesig.” Onesig is designed to prevent unauthorized backend transactions by hashing and merklizing transactions locally on the user’s side. Layerzero noted that it is also increasing its multisig threshold from 3/5 to 7/10 across all chains where Onesig is supported.
This move, the firm explained, is part of a broader effort to harden the protocol against future state-sponsored threats. Despite the breach, the protocol emphasized that more than $9 billion in volume has moved across the network since April 19. Layerzero stressed that it was built with the thesis that applications should own their security end-to-end to avoid systemic risks.
The architecture has facilitated over $260 billion in total transfers to date, according to the blog post. Moving forward, Layerzero recommends that developers pin their configurations instead of relying on defaults. The team also suggests setting block confirmations to levels where reorganizations are nearly impossible.
The team is currently developing a second DVN client written in Rust to foster client diversity. Additional upgrades include a more robust RPC quorum configuration. This, Layerzero detailed, allows DVNs to select granular quorums across internal and external providers. The team is also launching “Console,” a unified platform for asset issuers to manage security and monitor for anomalies.
The Layerzero team remains adamant that the underlying protocol remained unaffected by the RPC poisoning. They maintain that the modular design allowed the rest of the $9 billion in recent traffic to stay secure. The admission of a Lazarus Group-linked attack showcases the realism and the persistent threat facing cross-chain infrastructure today. Layerzero’s message follows a few DeFi projects choosing to leverage Chainlink’s CCIP.
Earlier this week, North Korea’s Foreign Ministry (via state media KCNA) rejected U.S. and international claims linking it to cryptocurrency thefts and cyberattacks. They called the accusations “absurd slander,” “false information,” and a politically motivated smear campaign by the U.S. to tarnish their image.
