Targeted_Comm
Relay_Station / Zone_39
TECH 09.05.2026

Layerzero Infrastructure Compromised in KelpDAO Exploit Linked to Lazarus Group

A sophisticated attack against Layerzero Labs' internal infrastructure, including a coordinated denial-of-service operation, enabled North Korean threat actors to poison critical data sources, impacting the KelpDAO decentralized finance protocol and leading to an associated $292 million exploit. The cross-chain communication protocol revealed the breach, detailing how internal Remote Procedure Calls (RPCs) became a compromised 'source of truth' for its Decentralized Verifier Network. This incident, confirmed by Layerzero Labs on May 9, 2026, underscores the persistent and evolving threat sophisticated cyber groups pose to foundational Web3 infrastructure.

Layerzero Labs disclosed that the attackers, identified as elements of the Lazarus Group, simultaneously launched a Distributed Denial of Service (DDoS) attack against the firm's external RPC provider. This multi-pronged assault aimed to both manipulate data and disrupt the reliability of external communication channels, creating a window for the core infrastructure compromise. The synchronized nature of these attacks highlights a growing tactical maturity among state-sponsored hacking operations targeting the digital asset space.

The primary vector involved poisoning the integrity of internal RPCs. These RPCs are fundamental communication endpoints that allow various components of a blockchain system, including Layerzero's verifier network, to request and exchange data. By compromising these internal data feeds, the attackers could feed manipulated or false information into the system, directly influencing the cross-chain messages and validations processed by Layerzero's protocol. This effectively allowed the threat actors to control a critical link in the chain of trust for cross-chain asset transfers.

The immediate fallout, Layerzero Labs noted, was contained to a specific segment of its ecosystem. The incident directly impacted a single application, representing a mere 0.14% of Layerzero's total deployed applications and approximately 0.36% of the total value locked (TVL) on the protocol. While the percentage figures appear small, the linked KelpDAO exploit's magnitude, reportedly totaling $292 million, casts a long shadow on the potential cascading effects of such an infrastructure compromise across interconnected DeFi systems.

In response to the breach, Layerzero Labs has initiated a migration of all default configurations to a more stringent 5/5 Decentralized Verifier Network (DVN) setup. This shift aims to enhance cross-chain security by requiring five independent verifiers to attest to the validity of a transaction before it is finalized, thereby significantly increasing the difficulty for a single point of failure or compromise to affect the entire system. This structural change represents a direct technical countermeasure to the RPC poisoning vulnerability exploited in the recent attack.

The company also issued an apology for a three-week communication silence following the initial breach, acknowledging the community's need for transparency during security incidents. This period of limited information undoubtedly fueled speculation and concern across the wider Web3 ecosystem, particularly among projects relying on Layerzero's cross-chain capabilities for interoperability and asset transfer. Restoring trust in the underlying infrastructure of decentralized applications remains paramount following such events.

The incident serves as a stark reminder that even protocols designed for decentralized security are vulnerable to highly coordinated attacks that target conventional infrastructure components, such as RPC endpoints and DNS. The intertwining of traditional IT security practices with novel blockchain architecture presents a complex challenge, one where an attack on a single point in the broader system can have widespread decentralized financial repercussions. As cross-chain interoperability becomes increasingly vital to the Web3 landscape, the resilience of foundational bridging technologies against nation-state-level threats will define the robustness of the entire ecosystem. The shift to more distributed DVN setups is a necessary evolution, but will it be sufficient to deter the evolving tactics of groups like Lazarus, or will the next vector emerge from an unforeseen seam in the expanding fabric of Web3 infrastructure?

Signals elevate this to HOT_INTEL priority.

// Related_Intel

More_Signals

‹ Return_to_Terminal

Traffic_Nodes

0

Mobile_Relay / Zone_37