Bridges typically work by locking assets on one chain and minting equivalent tokens on another. That process depends on a trusted entity — often called an oracle or validator — to confirm deposits.

In this case, Kelp effectively acted as that verifier. According to Guillemet, the system relied on a single-signer setup, meaning just one entity could approve any transactions.

“It seems the attacker was able to sign a message … allowing him to mint large amount of rsETH,” he said. He added that it remains unclear how that access was obtained.

Michael Egorov, founder of Curve Finance, pointed to the same weakness in the system’s configuration.

“Things can happen when you trust one single party — whoever that would be.”

That setup allowed the attacker to effectively create unbacked tokens, even though no corresponding assets were locked on the source chain.

Once minted, the tokens were quickly deployed. The attacker “immediately deposited them in lending protocols mostly Aave to borrow real ETH against,” Guillemet explained.

That maneuver shifted the problem from a single exploit into a broader market issue. DeFi lending platforms are now left holding collateral that may be difficult to unwind, while valuable and liquid assets are already drained.

“Aave was left with rsETH which cannot be really sold and maxborrowed [sic] ETH, so no one can withdraw ETH,” Curve’s Egorov said.

As a result, Aave and other lending protocols may be sitting on hundreds of millions of dollars in questionable collateral and bad debt, he warned, raising concerns of a potential “bank run” dynamic as users rush to withdraw funds.

Aave saw about a $6 billion drop in assets on the protocol as users yanked their assets following the incident. The token associated with the protocol was down about 15% over the past 24 hours’ trading.

What we still don’t know

Key questions remain around how the validator was compromised. The system relied on LayerZero’s official node, raising uncertainty over whether it was hacked, misconfigured or misled.

“Was it hacked? Was it fooled? We don’t know,” Egorov said.

The attacker’s identity is also unknown, though Guillemet said the scale of the attack suggests a sophisticated actor.

“Clearly not some script kiddies,” he said.

Big blow for trust in DeFi

Beyond the immediate losses, the exploit the episode serves as another reminder that as DeFi grows more interconnected, failures in one layer can quickly cascade across the system.

Egorov argued that non-isolated lending models, where assets share risk across pools, amplify the impact of such events.

He also pointed to shortcomings in how new assets are onboarded to lending platforms, saying configurations like Kelp’s 1-of-1 verifier setup should have been flagged earlier.

However, Egorov said there’s a silver lining. “Crypto is a harsh environment which no bank would have survived — yet we are working with that,” he said. “I think DeFi will learn from this incident and become stronger than before.”

Still, even as incidents like this lead to protocol upgrades and redesigns, they also chip away investor confidence in the broader DeFi sector.

“All in all, the trust into DeFi protocols is eroded by this kind of event,” Guillemet said.

“And 2026 will most likely be the worst year in terms of hacks, again,” he added.

Read more: ‘DeFi is dead’: crypto community scrambles after this year’s biggest hack exposes contagion risks

More For You

Digitally altered photo of a dollar bill (Ryan Quintal/Unsplash, Modified by CoinDesk)

Firms using stablecoins can reshape margins by cutting costs, unlock credit and earn yield, but not every company needs to issue a token, Paxos Labs’ Chunda McCain said.

What to know:

  • Stablecoins are entering a new phase in which companies focus less on basic infrastructure and more on concrete business uses, such as yield and credit, Paxos Labs cofounder Chunda McCain said in an interview.
  • Businesses can tap lower payment costs and new revenue streams by using stablecoins, but not every…

In this article

About the Author

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Stories