HomeIntelligenceBrief
🔓 BREACH BRIEF🔴 Critical🔓 Breach

North Korean Hackers Steal $290 M from Crypto Platform Kelp via LayerZero Supply‑Chain Exploit

A $290 million cryptocurrency theft from Kelp was linked to a supply‑chain breach of LayerZero’s verification network. The incident demonstrates the danger of relying on a single third‑party verifier and the need for diversified security controls in crypto infrastructure.

🛡️ LiveThreat™ Intelligence · 📅 April 21, 2026· 📰 therecord.media
🔴
Severity
Critical
🔓
Type
Breach
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
3 recommended
📰
Source
therecord.media

North Korean Hackers Steal $290 M from Crypto Platform Kelp via LayerZero Supply‑Chain Exploit

What Happened — Over a weekend, approximately $290 million in cryptocurrency was transferred out of the Kelp platform. Investigation traced the theft to a supply‑chain compromise of LayerZero’s Decentralized Verifier Network (DVN), which was the sole verifier for Kelp’s rsETH token. North Korean‑linked group TraderTraitor forged rsETH tokens and used them as collateral to borrow real assets, completing the heist.

Why It Matters for TPRM

  • A single‑point‑of‑failure third‑party verifier enabled a multi‑billion‑dollar loss, highlighting the risk of over‑reliance on one infrastructure provider.
  • The attack leveraged sophisticated “message‑poisoning” and DDoS tactics that evaded traditional monitoring, underscoring gaps in vendor security controls.
  • Supply‑chain attacks on crypto infrastructure can cascade across multiple downstream services, amplifying third‑party exposure.

Who Is Affected — Crypto‑exchange and DeFi platforms that integrate LayerZero’s DVN services; broader blockchain‑as‑a‑service (BaaS) providers and their downstream users.

Recommended Actions

  • Audit all integrations with LayerZero or similar DVN services; enforce multi‑DVN redundancy.
  • Validate that vendors employ robust monitoring, anomaly detection, and DDoS mitigation for critical verification paths.
  • Update contractual security clauses to require diversified third‑party dependencies and regular security assessments.

Technical Notes — The attackers exploited a misconfiguration where Kelp relied on a single DVN, allowing forged rsETH messages to pass unchecked. No specific CVE was cited; the vector was a supply‑chain compromise of LayerZero’s verification infrastructure combined with DDoS on backup systems. Source: The Record

📰 Original Source
https://therecord.media/crypto-north-korea-theft-kelp

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.