Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy

This year, the biggest cryptocurrency theft in DeFi occurred, totaling 293 million dollars.

CN
Techub News
Follow
2 days ago
AI summarizes in 5 seconds.

Written by: GoMoon

The biggest DeFi hacking incident of 2026 has arrived! On April 18, Kelp DAO's liquidity re-staking protocol suffered a blow, with hackers stealing 116,500 rsETH in just a few hours, amounting to a staggering $293 million at the time.

After verification by security researchers, it was confirmed that Kelp DAO's smart contract code had no vulnerabilities. The $293 million loss was not due to a coding issue, but rather hidden in an overlooked "configuration parameter," marking it as the biggest security lesson of the year!

How did the hackers operate?

The attack process was unusually smooth, consisting of just three steps:

1. Exploiting configuration loopholes to forge messages: Kelp DAO used a LayerZero cross-chain bridge with a key configuration called the DVN threshold, which selected "1-of-1" — meaning only one verification node was needed to confirm cross-chain messages. The hacker directly breached this sole node, forged false messages, and deceived the Ethereum mainnet into minting rsETH without actual asset backing.

2. Collateralizing to cash out real money: With the batch of fake rsETH, the hacker dispersed it as collateral across the lending protocols Aave V3, Compound V3, and Euler, borrowing over $236 million in WETH (a stablecoin with real backing).

3. Rapid exit to lock down the market: That same day, the hacker absconded with $236 million in WETH, leaving chaos behind. Platforms like Aave and SparkLend hurried to freeze the rsETH market, but Aave V3 alone faced approximately $177 million in bad debts, which ultimately had to be borne by users staking aWETH.

What should alarm us most is not the hackers' clever methods, but the exposure of a "structural blind spot" in the DeFi security industry — configuration layer vulnerabilities that current tools cannot detect!

We typically know that DeFi projects must undergo code audits, using tools like Slither and Mythril to scan for issues like reentrancy attacks and integer overflow. However, Kelp DAO's issue was not in the code itself, but in the DVN configuration parameter filled out during project deployment!

This parameter does not enter the .sol code file, where Slither and Mythril cannot scan for it, and current LLM-assisted audits do not cover it. According to related research, existing code audit tools can detect at most 8%-20% of exploitable vulnerabilities, provided that "the vulnerability is in the code."

Configuration vulnerabilities have become the "invisible killer" of DeFi security! In 2022, the Nomad cross-chain bridge was hacked for $190 million due to initialization errors during deployment; this time, Kelp DAO actively chose a "1-of-1" risky configuration and similarly fell into a trap. Combined, these two types of configuration vulnerabilities have resulted in approximately $482 million in losses, comparable to the scale of losses from key leakage vulnerabilities!

However, the entire industry is currently fixated on code logic vulnerabilities, training audit tools and optimizing detection models, with no one specifically addressing configuration issues. Just like this time, the "1-of-1" configuration fully complies with LayerZero's rules, meaning it's not considered a violation, yet this "compliant choice" directly led to a fatal risk.

DeFi security has never been about "no vulnerabilities in the code" equating to everything being fine; those small details hidden in configurations and operations are the hidden reefs that should be most carefully watched. I hope this lesson awakens the entire industry, preventing a $293 million tragedy from repeating itself!

免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Selected Articles by Techub News

1 hour ago
In-Depth Interview with Dr. Jiang Guofei, President of Yunfeng Financial: How AI Engines and Web3 Infrastructure Restructure the New Paradigm of Digital Finance?
1 hour ago
Four-dimensional resonance: Hong Kong Web3 Carnival subforum jointly outlines the blueprint for global financial new infrastructure.
1 hour ago
Claude's title restriction cuts privileges, OpenAI takes the opportunity to steadily catch you with Codex.
View More

Table of Contents

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Related Articles

avatar
avatarOdaily星球日报
43 minutes ago
I used AI to analyze 221 contract coins and finally found the only way to trade meme coins.
avatar
avatarTechub News
1 hour ago
In-Depth Interview with Dr. Jiang Guofei, President of Yunfeng Financial: How AI Engines and Web3 Infrastructure Restructure the New Paradigm of Digital Finance?
avatar
avatarOdaily星球日报
1 hour ago
B.AI LLM Service Quick Start Guide: Four Steps to Enjoy Multiple AI Large Model Dialogues and API Access, Log In to Receive 100,000 Free AI Credits.
avatar
avatarTechub News
1 hour ago
Four-dimensional resonance: Hong Kong Web3 Carnival subforum jointly outlines the blueprint for global financial new infrastructure.
avatar
avatarTechub News
1 hour ago
Claude's title restriction cuts privileges, OpenAI takes the opportunity to steadily catch you with Codex.
APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink