Targeted_Comm
Relay_Station / Zone_39
TECH 21.04.2026

Arbitrum Security Council Freezes $71 Million in ETH from Kelp DAO Exploit

In an emergency action taken today, the Arbitrum Security Council successfully froze 30,766 ETH, valued at approximately $71 million, linked to the recent $292 million Kelp DAO exploit. This decisive intervention, executed at 11:26 p.m. ET on April 20, involved moving the compromised funds into a secure intermediary wallet, accessible only through a subsequent Arbitrum governance vote. The move follows a sophisticated attack that targeted Kelp DAO's LayerZero-powered bridge, with cybersecurity analysts and law enforcement attributing the heist to North Korea's state-sponsored Lazarus Group.

The initial breach, which occurred on April 18, saw attackers drain 116,500 rsETH (restaked ether) by exploiting a vulnerability in Kelp DAO's '1-of-1 verifier configuration' within the LayerZero Decentralized Verifier Network (DVN) infrastructure. The hackers reportedly compromised two remote procedure calls (RPCs) and launched a distributed denial-of-service (DDoS) attack against others, forcing a failover to the poisoned infrastructure. This enabled malicious instructions to pass as valid, facilitating the initial theft of approximately $292 million.

The Arbitrum Security Council, a 12-member elected body, engaged in extensive technical diligence and deliberation before acting. Nine of the twelve council members voted in favor of the freeze, demonstrating a strong consensus for immediate action to protect user funds. The council emphasized that the technical approach ensured no other chain states or Arbitrum users were affected by the transfer.

This incident highlights the ongoing tension between emergency intervention and the core principles of decentralization in blockchain ecosystems. While the swift action by Arbitrum is lauded for recovering a significant portion of the stolen assets, it inevitably reignites discussions within the Web3 community about the extent of such centralized powers, even when deployed against state-sponsored illicit activities. The ability of a security council to freeze funds, irrespective of their origin, underscores a critical design consideration for Layer 2 networks that aim to balance security with autonomy.

Post-exploit, the attacker initiated laundering activities, moving approximately 75,700 ETH, valued at $175 million, on the Ethereum mainnet after the Arbitrum freeze. On-chain analysis indicates the use of stealth address privacy protocols like UmbraCash in an attempt to obscure the transaction trail. This fund-splitting strategy suggests the exploiter is actively working to prevent further asset seizures.

The broader impact of the Kelp DAO exploit has been considerable. Decentralized non-custodial liquidity protocol Aave, for instance, registered an $8 billion drop in total value. The hackers had deposited stolen funds into Aave v3 as collateral, borrowing wrapped Ether and creating $195 million in debt on the platform. Several partners, including the Arbitrum Security Council itself, immediately froze assets in addresses connected to the heist, prioritizing the prevention of further contagion across the DeFi landscape.

This security incident serves as a stark reminder of the persistent threats within the decentralized finance space and the continuous need for robust security configurations. LayerZero, the cross-chain messaging infrastructure utilized by Kelp DAO, noted that the heist could have been prevented had Kelp DAO implemented a multi-DVN setup, which is considered an industry best practice. The complexity of cross-chain interactions often introduces new vectors for attack, requiring constant vigilance and advanced defensive strategies.

The frozen funds will remain in the intermediary wallet until Arbitrum governance, in collaboration with relevant legal authorities, determines their ultimate disposition. This process is expected to involve further community discussion and voting, shaping a precedent for how decentralized autonomous organizations (DAOs) respond to large-scale security breaches involving state-backed actors. The incident will undoubtedly influence future security frameworks and operational best practices across the Layer 2 ecosystem as protocols seek to fortify against increasingly sophisticated threats.

Signals elevate this to HOT_INTEL priority.

// Related_Intel

More_Signals

‹ Return_to_Terminal

Traffic_Nodes

0

Mobile_Relay / Zone_37