The largest DeFi exploit of 2026 has seen $293 million drained from Kelp DAO's LayerZero cross-chain bridge, triggering a $5.4 billion withdrawal panic across the broader ecosystem and exposing critical centralization flaws in modular security.
Another week, another frontier model. As Anthropic’s Claude Opus 4.7 chases enterprise depth and OpenAI turns ChatGPT, GPT‑6 and GPT‑Rosalind into the ambient verbs of digital work and lab science, the contest is no longer IQ scores. It is which unseen layer we quietly let sit beneath institutions.
ShinyHunters has exposed a critical weakness in cloud systems. The McGraw Hill breach shows how misconfigured Salesforce portals enabled large scale data leaks, with no software flaw to fix. This marks a shift toward exploiting common operational gaps rather than rare vulnerabilities.
20th April 2026 Cyber Update: $293M Kelp DAO Bridge Hack Triggers Massive DeFi Contagion
The largest DeFi exploit of 2026 has seen $293 million drained from Kelp DAO's LayerZero cross-chain bridge, triggering a $5.4 billion withdrawal panic across the broader ecosystem and exposing critical centralization flaws in modular security.
The Kelp DAO incident now stands as the largest DeFi exploit of 2026, with attackers extracting around 293 million dollars by compromising its rsETH cross chain bridge on 19 April. The breach targeted Kelp’s integration with the LayerZero messaging stack, allowing a forged cross network message that unlocked 116,500 rsETH, roughly 18 per cent of the token’s supply, without touching the underlying validator set or Ethereum consensus. Because Kelp’s rsETH is a core building block in the restaking trade and is deployed across more than twenty networks, the incident immediately moved from a protocol level loss to a system level event.
Earlier today we identified suspicious cross-chain activity involving rsETH. We have paused rsETH contracts across mainnet and several L2s while we investigate.
Aave and other major lending venues saw a combined multibillion dollar withdrawal wave as users raced to unwind positions, with utilisation on key markets briefly hitting levels that made new borrowing nearly impossible and forced protocols to freeze or restrict rsETH activity.
Why it matters
The hack is not just another bridge failure; it exposes a structural weakness in the way DeFi has embraced “modular” security. Kelp’s deployment relied on a one of one verifier configuration inside a decentralised verifier network, leaving a single node as the effective arbiter of cross chain messages and turning an ostensibly flexible architecture into a single point of failure.
By tricking that verifier, the attacker bypassed the smart contract protections that most users assumed were their ultimate defence and converted a configuration flaw into a nine figure loss. Because rsETH was widely treated as high quality collateral, the break in its backing translated into immediate solvency fears at otherwise uncompromised platforms that had accepted it on trust. The episode therefore highlights that infrastructure risk in messaging layers, bridges and restaking wrappers is now inseparable from credit and liquidity risk in the broader DeFi stack.
Implications for traders and short‑term participants
For active traders, the key shift is that bridge and restaking tokens require a different risk framework to vanilla layer one assets such as bitcoin and ether. The tail risk is no longer just a severe drawdown driven by market sentiment; it includes the possibility that a specific bridge or configuration fails and sends a widely used collateral asset towards zero while contracts are paused and exit routes are blocked. Position sizing, leverage and collateral selection need to reflect that protocols can freeze markets within minutes and that utilisation on lending venues can spike to levels where liquidations become disorderly or impossible to hedge. In practical terms, traders should assume that:
Collateral with complex cross chain dependencies demands a higher risk premium and lower leverage.
Liquidity can evaporate faster in assets tied to restaking and bridging than in base layer coins.
Event driven strategies around governance tokens and “safer” liquid staking or restaking alternatives are likely to proliferate, with sharp repricings around security disclosures and governance votes.
Short term participants who fail to account for these dynamics risk being trapped in positions that cannot be exited or hedged during critical windows, even when they are directionally correct on price.
The Impact of AI on These Areas
Artificial intelligence is now a central force multiplier in both the discovery and exploitation of vulnerabilities in DeFi infrastructure. Modern language models can already parse and interpret complex smart contracts at scale, map their dependencies and identify edge case behaviours that are difficult for human auditors to spot quickly. Combined with automated testing frameworks, AI systems can generate and simulate exploit scenarios across hundreds of protocols in parallel, reducing the time from vulnerability discovery to working exploit code from months to days or even hours. This compresses defenders’ response windows and dramatically increases the volume of potential attack surfaces being probed at any given moment.
On the offensive side, AI tooling lowers the skill threshold for sophisticated attacks. An actor who previously needed deep Solidity expertise and extensive on chain experience can now lean on AI to explain contract logic, propose exploit patterns and even produce transaction payloads that implement those patterns.
When integrated with on chain monitoring and transaction building bots, these systems can run near continuously, scanning for misconfigurations like Kelp’s single verifier design and firing automated exploits the moment a profitable opportunity appears.
On the defensive side, security teams are racing to adopt similar tools for automated auditing, anomaly detection and simulation, but they face additional constraints such as change management, governance and regulatory expectations that attackers do not share. For traders and investors, this AI driven arms race means that the frequency and sophistication of “tail” events is likely to rise, and that risk models must explicitly consider the accelerating pace at which novel infrastructure failures can be found, weaponised and executed.
Get the stories that matter to you. Subscribe to Cyber News Centre and update your preferences to follow our Daily 4min Cyber Update, Innovative AI Startups, The AI Diplomat series, or the main Cyber News Centre newsletter — featuring in-depth analysis on major cyber incidents, tech breakthroughs, global policy, and AI developments.
Sign up for Cyber News Centre
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead.
ShinyHunters has exposed a critical weakness in cloud systems. The McGraw Hill breach shows how misconfigured Salesforce portals enabled large scale data leaks, with no software flaw to fix. This marks a shift toward exploiting common operational gaps rather than rare vulnerabilities.
Booking.com confirms hackers accessed customer names, emails, addresses, and booking details via third-party compromise. Stolen data is already fuelling targeted WhatsApp phishing attacks, exposing deep supply chain vulnerabilities in global travel platforms.
Anthropic’s rapid push into enterprise AI and its $30B raise signal a new phase where autonomous systems drive both productivity and cyber risk. As AI executes tasks at machine speed, markets, governments and workers face a sharper question: who controls the systems now shaping outcomes.
Zero‑day bugs in high‑privilege edge and security tools are being weaponised faster than organisations can patch, compressing response windows for Asia–Pacific defenders and turning shared enterprise stacks into a regional blast radius for attack.
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead. Sign up for free!