Back to Blog

Newsletter - April 2026

Code Auditing
April 30, 2026
4 min read
Key Insights

Top 3 DeFi Incidents in April

KelpDAO: ~$290M

On April 18, 2026, KelpDAO’s rsETH LayerZero OFT bridge was exploited for approximately $290M.

The root cause was KelpDAO’s insecure 1-of-1 DVN configuration, which reduced cross-chain message verification to a single point of failure. After compromising RPC infrastructure trusted by the LayerZero Labs DVN, the attacker forced the sole verifier to attest to a fabricated cross-chain message. As a result, 116,500 rsETH were released on Ethereum without any corresponding source-side event on Unichain.

This incident was not caused by a flaw in the LayerZero protocol itself, but by a broader operational security failure spanning bridge configuration and infrastructure trust assumptions. Because KelpDAO relied on only one DVN, there was no independent verifier to challenge the forged message. At the same time, the attacker poisoned the RPC nodes used by that DVN and DDoS’d the remaining healthy nodes, forcing the verifier into a failover state where it depended entirely on attacker-controlled data. Once the fake message was attested, the Ethereum-side rsETH adapter executed as designed and released the funds, which were then quickly dispersed and laundered across multiple wallets and chains.

This incident highlights that bridge security cannot rely solely on protocol correctness. Projects should adopt multi-DVN configurations with independent verifiers, treat sudden RPC node outages during verification as attack signals rather than routine availability issues, and harden the infrastructure that feeds source-chain data to verifier networks.

For a detailed analysis, read our deep-dive post:

https://blocksec.com/blog/the-decentralization-dilemma-cascading-risk-and-emergency-power-in-the-kelp-dao-crisis

Drift Protocol: ~$285M

On April 1, 2026, Drift Protocol on Solana was exploited for approximately $285M.

The root cause was not a smart contract vulnerability, but a failure in the protocol’s governance and authorization process. At the time, Drift used a 2-of-5 multisig setup for high-privilege actions, meaning any two of five authorized signers could approve critical administrative changes. These actions were also not subject to any timelock. Once enough approvals were collected, they could be executed immediately. Compounding this risk was Solana’s durable nonce mechanism, which allowed pre-signed transactions to remain valid for a long time instead of expiring quickly like ordinary transactions. This gave the attacker time to collect malicious signatures in advance and wait for the right moment to use them. After inducing two of the five signers to approve malicious governance transactions, the attacker later submitted those transactions to take over admin control of the protocol. With that access, the attacker listed a fake collateral asset called CarbonVote Token (CVT), manipulated its Oracle price, loosened withdrawal restrictions, and used the fake collateral to drain large amounts of real assets through the Drift Vault.

This incident exposed three major weaknesses in Drift’s governance design. First, the attacker was able to separate signature collection from execution because the stolen approvals did not expire quickly. Second, the lack of a timelock meant the admin takeover became effective immediately, leaving almost no time for detection or intervention. Third, the admin role was too powerful: once compromised, it allowed the attacker to create a new collateral market, change oracle settings, and relax withdrawal controls, all of which directly enabled the theft.

This incident shows that governance security is not just about protecting private keys. Protocols also need to secure the full signing and approval process, add delays to high-privilege actions, limit the use of long-lived pre-signed transactions, and reduce the scope of what a single admin takeover can do.

For a detailed analysis, read our deep-dive post:

https://blocksec.com/blog/drift-protocol-incident-multisig-governance-compromise-via-durable-nonce-exploitation

Rhea Finance: ~$18.4M

On April 16, 2026, the Burrowland protocol of Rhea Finance on NEAR was exploited for approximately $18.4M due to a business logic flaw in its margin-trading module. Notably, as of April 23, 2026, all stolen funds had been recovered.

The root cause was that the protocol treated a user-supplied swap output declaration as if it accurately represented the amount that would actually be returned by the DEX. However, a malicious user could construct a circular swap path that recycled intermediate outputs within the route, artificially inflating the declared final output and manipulating the protocol’s accounting. As a result, the protocol’s solvency and leverage checks relied on a fabricated value rather than the real amount received. This flaw was rooted in the verify_token_out() function, which incorrectly counted certain intermediate outputs as part of the final result even though they were later reused within the swap path.

After circumventing these checks, the attacker routed borrowed assets out of the protocol through attacker-controlled fake pools, while the protocol received only a negligible amount of value in return. The attacker then withdrew liquidity from these pools to extract the funds. By repeating this process, the attacker ultimately drained approximately $18.4M from Burrowland.

This incident shows that margin-trading protocols should not treat user-declared swap outputs as trusted input. Protocols need to ensure that solvency checks are based on the actual received value, reject swap paths that can recycle intermediate assets, and prevent accounting logic from being manipulated by circular routing.

For a detailed analysis, read our deep-dive post:

https://blocksec.com/blog/venus-thena-donation-attack

The information above is based on data as of 00:00 UTC, April 29, 2026.

This concludes the April security incidents brief. For more in-depth analysis of blockchain security incidents and Web3 security trends, you can explore our resources.

You can learn more in our Security Incidents Library.

Stay informed and stay secure!

Sign up for the latest updates
~$7.04M Lost: GiddyDefi, Volo Vault & More | BlockSec Weekly
Security Insights

~$7.04M Lost: GiddyDefi, Volo Vault & More | BlockSec Weekly

This BlockSec weekly security report covers eight attack incidents detected between April 20 and April 26, 2026, across Ethereum, Avalanche, Sui, Base, HyperLiquid, and MegaETH, with total estimated losses of approximately $7.04M. The highlighted incident is the $1.3M GiddyDefi exploit, where the attacker did not break any cryptography or use a flash loan but simply replayed an existing on-chain EIP-712 signature with the unsigned `aggregator` and `fromToken` fields swapped out for a malicious contract, demonstrating how partial signature coverage turns any historical signature into a generic permit. Other incidents include a $3.5M Volo Vault operator key compromise on Sui, a $1.5M Purrlend privileged-role takeover, a $413K SingularityFinance oracle misconfiguration, a $142.7K Scallop cross-pool index injection, a $72.35K Kipseli Router decimal mismatch, a $50.7K REVLoans (Juicebox) accounting pollution, and a $64K Custom Rebalancer arbitrary-call exploit.

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026

This BlockSec weekly security report covers four attack incidents detected between April 13 and April 19, 2026, across multiple chains such as Ethereum, Unichain, Arbitrum, and NEAR, with total estimated losses of approximately $310M. The highlighted incident is the $290M KelpDAO rsETH bridge exploit, where an attacker poisoned the RPC infrastructure of the sole LayerZero DVN to fabricate a cross-chain message, triggering a cascading WETH freeze across five chains and an Arbitrum Security Council forced state transition that raises questions about the actual trust boundaries of decentralized systems. Other incidents include a $242K MMR proof forgery on Hyperbridge, a $1.5M signed integer abuse on Dango, and an $18.4M circular swap path exploit on Rhea Finance's Burrowland protocol.

The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis
Security Insights

The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis

This BlockSec deep-dive analyzes the KelpDAO $290M rsETH cross-chain bridge exploit (April 18, 2026), attributed to the Lazarus Group, tracing a causal chain across three layers: how a single-point DVN dependency enabled the attack, how DeFi composability cascaded the damage through Aave V3 lending markets to freeze WETH liquidity exceeding $6.7B across Ethereum, Arbitrum, Base, Mantle, and Linea, and how the crisis forced decentralized governance to exercise centralized emergency powers. The article examines three parameters that shaped the cascade's severity (LTV, pool depth, and cross-chain deployment count) and provides an exclusive technical breakdown of Arbitrum Security Council's forced state transition, an atomic contract upgrade that moved 30,766 ETH without the holder's signature.

Best Security Auditor for Web3

Validate design, code, and business logic before launch. Aligned with the highest industry security standards.

BlockSec Audit