The $290 Million Kelp DAO Exploit: Lazarus Group Linked to Massive Crypto Heist

Share
Minimalist flat vector illustration: white vault door with a purple neon North Korean star, and a crypto token being pulled out by a purple neon hook on a charcoal grey background.

Blockchain security researchers and protocol developers have identified the North Korean state-sponsored Lazarus Group as the primary suspect in the staggering $290 million theft from Kelp DAO.

SEOUL, KOR — The decentralized finance (DeFi) ecosystem is reeling after a sophisticated exploit targeted Kelp DAO, a leading liquid restaking protocol. Early on Monday, security firms including LayerZero and Chainalysis flagged suspicious outflows totaling approximately $292 million, which were rapidly funneled through privacy-preserving mixers. By Tuesday morning, technical signatures and laundering patterns had led multiple experts to attribute the attack to the Lazarus Group, the elite cyber-offensive unit of the North Korean government.

According to TechCrunch and SecurityWeek, the breach represents one of the largest single-protocol exploits in the history of decentralized finance, highlighting the continued vulnerability of liquid re-staking platforms to high-end nation-state actors.

DeFi Heist Comparison: Lazarus Group Activity

Protocol Target Estimated Loss
Kelp DAO (2026) $292 Million (Suspected LRT Drain)
Ronin Bridge (Historical) $625 Million (Validator Compromise)
Atomic Wallet (Historical) $100 Million (Private Key Theft)

The Anatomy of the Exploit: Social Engineering Meets Smart Contract Manipulation

While the exact technical entry point is still under forensic review, preliminary reports suggest a multi-stage attack that bypassed traditional cold-storage protections.

According to The Record and Security Affairs, the heist likely involved:

  • Sophisticated Phishing: Attackers targeted key protocol developers with highly personalized job offers or malware-laden technical documents, a hallmark of North Korean "Operation Dream Job" campaigns.
  • Privileged Access: By compromising a "hot wallet" or gaining control over a multi-signature key, the hackers were able to authorize massive withdrawals of Liquid Restaking Tokens (LRTs).
  • Automated Laundering: Within minutes of the exploit, the stolen assets were converted into various stablecoins and moved through a series of "hop" wallets to obfuscate the trail.

Decrypt reports that the speed of the exfiltration suggests the use of automated scripts designed specifically to drain Kelp DAO’s specific liquidity pools before emergency pause functions could be activated.

A Sovereign Funding Engine

The Kelp DAO heist is the latest in a long-running series of attacks designed to fund the North Korean regime's nuclear and ballistic missile programs. As noted in recent NCSC and Joint Committee briefings, the UK and U.S. governments view these crypto-heists as a critical pillar of North Korea’s sanctioned economy.


The CyberSignal Analysis

Signal 01 — The DeFi "Sovereign Risk"

This incident is a definitive signal for token theft. As DeFi protocols like Kelp DAO grow in total value locked (TVL), they become high-priority targets for nation-states. The signal for B2B leaders and treasury managers is that restaking protocols, while lucrative, lack the institutional-grade guardrails found in traditional finance. Resilience in 2026 requires moving away from single-factor "human" approval for large transactions and toward immutable "timelock" withdrawals.

Signal 02 — The Industrialization of Social Engineering

This is a high-fidelity signal for threat actors. The Lazarus Group has effectively industrialized the "fake job offer" as a vector for smart contract compromise. Much like the , this heist proves that the weakest link in any "walled garden" is the human with the keys. The signal is that technical audits of code are useless if your developers’ devices are not hardened against targeted vishing and phishing.

Signal 03 — The Laundering Race

This represents a significant signal for threat intelligence. The rapid move to mixers shows that threat actors are winning the "visibility race" against regulators. As we explored in our analysis of , the goal of modern financial malware is no longer just the theft, but the immediate "liquidation" of the asset. For security teams, the signal is that detection must occur at the attempted withdrawal stage, as the "trace-and-recover" model is largely failing against state actors.

Signal 04 — The AI-accelerated dev cycle

This is a critical signal for threat intelligence. Researchers are investigating if the Lazarus Group used to find the specific smart contract flaw in Kelp DAO’s reward distribution logic. The ability for a state actor to rapidly simulate thousands of attack vectors against a new protocol means that "audited" code has a shorter shelf life than ever before.


Sources

Type Source
Primary News TechCrunch: North Korean Heist Report
Technical Intel SecurityWeek: Kelp DAO Exploit Details
Threat Analysis The Record: Lazarus Group Attribution
Protocol Update Decrypt: Kelp DAO Exploit Summary

Read more