Lookonchain APP

App Store

rsETH Hack Event Protocol Responses Overview: Multi-Party Pause of LayerZero OFT Cross-Chain Bridge, rsETH Still Frozen in Aave

2 hours ago

Saturday, April 20 — The LayerZero cross-chain bridge for rsETH (a liquidity re-staking token from Kelp DAO) was hacked, marking the largest DeFi hack of 2026 to date. The attacker forged LayerZero cross-chain messages to withdraw 116,500 rsETH directly from the bridge contract, then deposited the tokens into Aave and other lending platforms to borrow WETH—creating significant uncollateralized bad debt risk. Below is a roundup of responses from major DeFi protocols to the rsETH hack: Aave has shared an update on the rsETH incident: rsETH on the Ethereum mainnet is fully collateralized. The token remains frozen on Aave V3 and V4, while WETH reserves are frozen in affected markets including Ethereum, Arbitrum, Base, Mantle, and Linea. Aave is actively verifying details and evaluating potential resolutions. Ethena has officially extended the suspension period for its LayerZero OFT cross-chain bridge. Additionally, the protocol released updated reserve proofs confirming its USDe stablecoin maintains a collateralization ratio above 100%. LayerZero stated it has fully grasped the rsETH vulnerability and has been collaborating with the Kelp DAO team on fixes since the hack occurred, while continuously monitoring the situation. All other applications remain secure, and the protocol will publish a comprehensive post-incident analysis report alongside Kelp DAO once all relevant information is compiled. Fluid announced the launch of its aWETH redemption protocol, which enables ETH borrowers to: redeem for wstETH or weETH (restoring liquidity immediately and reducing liquidation risk); redeem in full if they only borrowed ETH; or seamlessly convert ETH collateral to wstETH/weETH while keeping other debts intact. The protocol’s initial capacity is capped at $1 billion worth of ETH. Morpho has temporarily suspended its MORPHO LayerZero OFT cross-chain bridge on Arbitrum until the root cause of the rsETH incident is identified. The protocol noted its smart contracts are secure and operating normally; risk exposure is limited (only ~$1 million worth of ETH was borrowed using rsETH as collateral, spread across two isolated markets out of thousands total). Thanks to Morpho’s fully isolated market design, all other vaults remain unaffected. Curve Finance announced it has suspended its LayerZero infrastructure, impacting: CRV bridging from BNB, Sonic, Avalanche, Fantom, Etherlink, and Kava (bridging from other chains still uses native bridges); and crvUSD quick bridging (L2 slow bridging remains operational). Reserve issued an official update: Its DTF holders are unlikely to be affected. RSR stakers in the Reserve Protocol’s USD3 and eUSD may qualify for "first-loss capital" protection, though the impact is minimal and RSR’s overcollateralization is sufficient to cover any potential losses. ETH+ and bsdETH contain no rsETH collateral, making them zero-risk. As a precaution, Reserve has temporarily paused minting, rebalancing, and RSR unstaking for eUSD and USD3—redemption functionality remains operational. Maple Finance stated all USDT provided on Aave Mantle using syrupUSDT has been withdrawn. Its syrupUSDC and syrupUSDT products are not impacted by the rsETH exploit. Polygon has been actively monitoring the rsETH exploit. The Polygon chain, Agglayer, and entire ecosystem (including Katana and Vaultbridge) have not been impacted by the incident. EtherFi announced its protocol’s liquidity pool remains unaffected by the Kelp rsETH exploit, and pool users will not suffer any fund losses. Hyperliquid’s DeFi project Hyperwave announced it has temporarily suspended all LayerZero bridging of Hyperwave assets as a precautionary measure.
Relevant content

Organization: Reopening the Strait of Hormuz is not difficult, but the full recovery of oil flow may take several years

April 20 — An analyst said intermittent shipping in the Strait of Hormuz underscores the uncertain state of the key global oil and gas chokepoint. One thing is clear, though: even if the conflict subsides, oil flows through the narrow waterway will take months, possibly years, to rebound to pre-conflict levels. The speed of recovery hinges not only on U.S.-Iran diplomatic progress, but also on logistics, tanker insurance availability, freight rates, and whether shipowners are willing to risk transiting the strait. Global tanker fleet rebalancing and a return of Gulf loading operations to pre-conflict levels will be uneven, with at least 8-12 weeks needed even under favorable conditions. (Source: Jinse)

10 minutes ago

LayerZero Strategic Partner Wallet Conducts Unlock Distribution of 1.21 Million ZRO to 52 Addresses

On April 20th, Ember Group monitoring shows that a wallet linked to LayerZero’s “strategic partner” distributed unlocked ZRO tokens to 52 addresses half an hour ago. Total distribution: 1.21 million ZRO (~$1.97 million). The largest single transaction—855,000 ZRO (~$1.42 million)—was sent to Binance. Notably, LayerZero, the cross-chain bridge exploited by hackers in yesterday’s rsETH incident, saw its ZRO token drop 18% yesterday.

10 minutes ago

A certain whale withdrew 98,032 wstETH and 3,000 cbBTC from Aave

April 20th: Per LookOnChain monitoring, a crypto whale—who previously acquired 163,405 ETH (~$440 million) and 4,000 cbBTC (~$296 million) via over-the-counter (OTC) trades—withdrew 98,032 wstETH (~$272 million) and 3,000 cbBTC (~$221.6 million) from Aave. Due to the KelpDAO rsETH cross-chain bridge exploit, the whale was unable to withdraw ETH. Instead, they swapped 7,438 aEthWETH (~$16.83 million) for 1,930 stETH and 5,272 ETH, incurring a $540,000 (~237 ETH) loss. As of now, the whale still holds 10,000 ETH (~$22.8 million) on Aave.

10 minutes ago

EasyDNS has admitted responsibility for the hijacking of eth.limo, citing the company's first social engineering attack in its 28-year history.

April 20 — The Ethereum Name Service (ENS) gateway eth.limo was briefly hijacked at its domain registrar Friday night, according to The Block. In a post-incident analysis report released Saturday, the project team attributed the breach to a social engineering attack. Per the post-incident report and a separate blog post by Mark Jeftovic, the attacker impersonated an eth.limo team member on April 17 at 7:07 p.m. Eastern Time to trick domain registrar EasyDNS into initiating an account recovery process. Timeline details: - 2:23 a.m. April 18: The attacker switched eth.limo’s domain servers to Cloudflare, triggering an automatic downtime alert that notified the eth.limo team. - 3:57 a.m.: Domain servers were switched back to Namecheap. - 7:49 a.m.: EasyDNS restored the team’s account access. Eth.limo is a free, open-source reverse proxy service that lets users access ENS-linked content (hosted on IPFS, Arweave, or Swarm) by appending “.limo” to any .eth domain — enabling ac

10 minutes ago

Meme Coin TROLL Market Cap Surges Above $20 Million, 24-hour Growth Rate Reaches 33%

April 20th – Per GMGN monitoring (link: https://gmgn.ai/sol/token/i_m4TE56o8_5UUH9RTDiSpq6HKS6bp4NdU9PNJpXRXuiw6ShBTBhgH2), Solana-based meme coin TROLL saw a sharp surge in market cap this morning. It jumped from $16.6 million, breaking above $22 million, and is now trading around $21 million—representing a 33% 24-hour gain, with $2.4 million in trading volume over the same period. BlockBeats notes that meme coins are highly volatile, often driven by market sentiment and hype, with no underlying value or use case. Investors should be aware of the associated risks.

10 minutes ago

Matrixport-affiliated Whale Reappears Bullish, Opens $100 Million ETH Long Position

April 20th — Per HyperInsight monitoring (https://t.me/HyperInsight), the largest ETH whale at Matrixport added to their bullish positions in the past 3 hours. They opened a long position of ~44,000 ETH (total value: $101 million) at an average entry price of $2,289. In the past half-hour, one address (0xa5b...) partially closed some long positions at $2,291, locking in a modest $120,000 profit. The position was previously valued at ~$10.02 million. The other sub-address (0x6c8...) still holds a ~$91 million ETH long position, with an unrealized loss of $480,000 (-10%). Addresses: 0x6c8512516ce5669d35113a11ca8b8de322fd84f6 0xa5b0edf6b55128e0ddae8e51ac538c3188401d41

10 minutes ago