LayerZero Apologizes Over Kelp DAO Exploit Response and Single-Verifier Setup

LayerZero said a Lazarus Group-linked attack and DDoS disrupted one app tied to the Kelp DAO exploit, and acknowledged fault for relying on a single-verifier setup now being replaced with multi-DVN verification.

Summary

LayerZero Labs apologized over both its handling of the Kelp DAO exploit response and a security incident it said involved a Lazarus Group attack on its internal RPC plus a DDoS on an external RPC provider. The company said the disruption affected one app, about 0.14% of LayerZero apps and 0.36% of asset value, while user assets remained safe. LayerZero also acknowledged fault for relying on a single-verifier setup, describing it as a security weakness, and said it will end its 1/1 DVN service in favor of default routes using at least 3/3 or 5/5 multi-DVN verification. According to LayerZero, more than $9 billion has crossed the protocol since April 19.

Terms & Concepts
  • DVN (Decentralized Verifier Network): A verification system used by LayerZero to validate cross-chain messages; multi-DVN setups require approvals from multiple verifier networks.
  • RPC (remote procedure call): A blockchain access interface that lets applications send requests to a network, such as reading data or submitting transactions.
  • DDoS (distributed denial-of-service attack): A cyberattack that floods a service with traffic to disrupt availability and block normal user access.