Kelp Restores Rseth After Exploit Shock Arabian Post
The liquid restaking protocol, working with Aave and other ecosystem participants, has completed the burn of exploiter-linked rsETH on Arbitrum and begun restoring the token's backing through a staged refill into the LayerZero OFT adapter on Ethereum mainnet. The recovery covers 117,132 rsETH, with funds drawn from the Aave Recovery Guardian and Kelp's own recovery safe.
By May 15, Kelp said rsETH deposits and withdrawals had been restored across mainnet and layer-2 networks, with asset support fully reinstated. The protocol also updated its exchange rate to account for staking rewards accumulated during the suspension period, while related EIGEN rewards became available for users to claim.
The exploit took place on April 18, when attackers manipulated Kelp's cross-chain rsETH route from Unichain to Ethereum. A forged inbound packet was accepted through a configuration that relied on a single decentralised verifier network attestation, allowing 116,500 unbacked rsETH to be released from the Ethereum-side adapter without a corresponding source-side burn.
The attacker then used the unbacked rsETH as collateral on Aave to borrow wrapped Ether, creating a wider liquidity shock. Aave froze rsETH markets after the breach, stressing that its own lending contracts had not been compromised. The damage, however, spread through collateral assumptions that underpin much of decentralised lending, leaving Aave exposed to bad-debt risk and forcing a coordinated recovery campaign.
The burn on Arbitrum marked the first major technical step in repairing the imbalance. The remaining recovery plan centred on refilling the mainnet adapter over about two weeks, reopening withdrawals after the first tranche, and restoring deposits, redemptions, bridging and claims once contracts were reactivated.
See also Strategy deepens bitcoin wagerKelp has introduced tighter security measures following the breach. The bridge setup now requires four independent attestors rather than one, block confirmations have been increased, and layer-2 to layer-2 transfer routes have been deprecated. The protocol has also begun shifting cross-chain operations towards Chainlink's Cross-Chain Interoperability Protocol, reflecting a wider industry push to reduce reliance on fragile bridge configurations.
The incident has intensified scrutiny of operational controls in decentralised finance. Blockchain security specialists have noted that no publicly identified smart-contract bug caused the loss. Instead, the failure centred on cross-chain verification design and infrastructure assumptions, an area that has become a recurring source of large-scale losses across digital asset markets.
LayerZero's role in the incident has drawn particular attention because the exploit involved an rsETH route using its messaging infrastructure. The company has maintained that other integrations were not affected, while Kelp challenged attempts to characterise the breach solely as a configuration issue on its side. The dispute has highlighted a familiar problem in DeFi: responsibility can become blurred when protocol teams, bridge providers, security councils and lending markets all depend on shared infrastructure.
Aave's role has also placed decentralised governance under pressure. Its recovery effort, known as DeFi United, was designed to stabilise affected markets and prevent broader contagion. Recovery assets were routed through a multisignature structure, while liquidated collateral connected to the attacker was sent to recovery-controlled wallets.
Arbitrum became central to the recovery after the attacker moved part of the proceeds onto the network. Its security council froze more than 30,000 ETH, worth around $70 million at the time, before governance approved transferring the assets towards the restitution process. That transfer then encountered legal complications in the United States, where claimants linked to earlier judgments involving North Korea sought to restrict movement of the funds. A court allowed the assets to be transferred to an Aave-managed wallet but barred their sale or further redistribution pending additional approval.
See also SGB opens Solana USDC corridorThe exploit has also revived concerns over state-backed cyber activity targeting DeFi. Several security analysts have linked the attack to North Korea's Lazarus Group, though formal attribution in crypto thefts can remain contested. The methods used in the breach fit a broader pattern of high-value attacks on bridges, validator infrastructure and operational weak points rather than conventional smart-contract flaws.
Arabian Post – Crypto News Network
Legal Disclaimer:
MENAFN provides the
information “as is” without warranty of any kind. We do not accept
any responsibility or liability for the accuracy, content, images,
videos, licenses, completeness, legality, or reliability of the information
contained in this article. If you have any complaints or copyright
issues related to this article, kindly contact the provider above.

Comments
No comment