#KelpDAOFacesAttack

*KelpDAOFacesAttack* refers to security incidents where Kelp DAO, a liquid restaking protocol on Ethereum, was targeted. There have been two main ones:

*1. Recent rsETH minting bug — April 2026*

Kelp DAO paused operations after discovering a *crypto bug* in its fee contract

*What happened:*

- A bug caused *excess rsETH minting* — the protocol created more rsETH liquid restaking tokens than it should have

- This could disrupt rsETH’s balance and peg

- *Response*: Kelp DAO paused deposits/withdrawals to stop the issue from worsening and fix the bug

This was a protocol-level smart contract bug, not an external hack.

*2. DNS hijacking attack — July 2024*

Attackers compromised Kelp DAO’s website/domain to steal user funds

*How it worked:*

1. Attackers impersonated the Kelp team and convinced *GoDaddy customer support* to bypass 2-FA

2. They changed nameservers to route users to malicious app code that phished wallets

3. Malicious dApp showed wallet transactions trying to steal user funds

*Resolution:*

- Kelp team locked the domain within 30 min and restored access within 4 hours

- dApp was fully safe again in 5 hours

- Some users reported lost funds and Kelp provided support

*What is Kelp DAO?*

A prominent liquid restaking protocol on Ethereum. Users deposit ETH → get *rsETH* liquid restaking tokens. It integrates with EigenLayer and offers “Gain Vaults” for L2 airdrop rewards.

*Bottom line*: “KelpDAOFacesAttack” covers both a recent smart-contract minting bug and a 2024 domain hijack/phishing attack. The team paused services both times and restored functionality quickly.

$BTC

BTC
BTC
77,549.97
-0.64%

$BNB $sol

BNB
BNB
636.52
-0.18%
SOL
SOL
86.3
+0.44%