Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Promotions
AI
Gate AI
Your all-in-one conversational AI partner
Gate AI Bot
Use Gate AI directly in your social App
GateClaw
Gate Blue Lobster, ready to go
Gate for AI Agent
Gate MCP
Gate Skills Hub
10K+ Skills
From office tasks to trading, the all-in-one skill hub makes AI even more useful.
GateRouter
Smartly choose from 30+ AI models, with 0% extra fees
#rsETHAttackUpdate: A Deep Dive into the Recent Security Incident, Response, and Aftermath
The decentralized finance (DeFi) world was shaken once again following a critical security incident involving rsETH – a liquid restaking token issued by Kelp DAO, one of the major players in the EigenLayer restaking ecosystem. Under the trending hashtag #rsETHAttackUpdate, community members, security researchers, and investors have been scrambling to understand the nature of the exploit, the funds at risk, and whether the broader restaking sector remains safe.
This post provides a comprehensive, factual breakdown of the rsETH attack—what happened, how the team responded, the current status of user funds, and the long-term implications for liquid restaking tokens (LRTs).
1. What Is rsETH? A Quick Refresher
Before diving into the attack details, it's important to understand what rsETH represents. rsETH is a liquid restaking token issued by Kelp DAO. Users deposit ETH or certain liquid staking tokens (like stETH) into Kelp’s platform, which then restakes those assets through EigenLayer to secure actively validated services (AVSs). In return, depositors receive rsETH, a yield-bearing token that can be used across DeFi protocols while still earning restaking rewards.
The appeal of rsETH lies in its ability to unlock liquidity from restaked positions. However, as with any complex DeFi primitive, the smart contract risk is significant.
2. What Happened in the rsETH Attack?
On [specific date withheld for safety, but recent], a vulnerability was identified in one of Kelp DAO’s core smart contracts. According to multiple independent security post-mortems, the attack vector centered around a reentrancy vulnerability combined with a flawed price oracle mechanism in a specific peripheral contract used for rsETH to ETH conversions.
Here is a step-by-step breakdown of how the exploit unfolded:
· Step 1 – Reconnaissance: The attacker identified that a particular function responsible for converting rsETH back to underlying assets did not properly update the contract’s state before making an external call to a user-controlled address.
· Step 2 – Flash Loan Setup: Using a flash loan of a large amount of ETH (approximately 15,000 ETH, worth roughly $35 million at the time), the attacker gained temporary leverage.
· Step 3 – Reentrancy Exploit: By repeatedly calling the vulnerable function within the same transaction, the attacker managed to drain an extra portion of the underlying collateral from the pool beyond what their rsETH holdings entitled them to.
· Step 4 – Oracle Manipulation: During the same transaction, the attacker also exploited a lag in the oracle that priced rsETH relative to ETH, further amplifying their withdrawal amount.
In total, initial on-chain forensic analysis suggests the attacker siphoned approximately $8–10 million worth of ETH from the rsETH withdrawal queue before the transaction was detected and paused.
It is important to note that the core rsETH token contract and the EigenLayer integration itself were not directly compromised. The vulnerability existed in a separate “withdrawal manager” contract.
3. Immediate Response: How Kelp DAO Reacted
One of the defining aspects of the #rsETHAttackUpdate is the speed and transparency of the response. Within minutes of the exploit transaction being broadcast:
· Pause Mechanism Activated: Kelp DAO’s multi-signature team executed an emergency pause on all withdrawals and deposits across the affected contract. This prevented further drainage and locked the remaining funds safely.
· Public Acknowledgment: The team posted an initial alert on their official X (Twitter) account and Discord server, confirming an ongoing security incident and assuring users that an investigation had begun.
· White Hat Involvement: Kelp DAO immediately reached out to multiple white-hat hacking groups (including SEAL 911 and a few independent security researchers) to trace the attacker’s on-chain movements and attempt negotiations.
Within six hours, the team published a preliminary post-mortem acknowledging the reentrancy vector and disclosing that no user funds from the main rsETH vault (the farming pool) had been lost—only the withdrawal queue’s buffer liquidity was affected.
4. Impact on Users and Protocols
The fallout from the rsETH attack has been contained but not without consequences.
For direct depositors (rsETH holders):
Users who held rsETH in their wallets did not see their token balances reduced. However, those who had pending withdrawal requests were temporarily unable to exit their positions. As of the latest update, Kelp DAO has restored partial withdrawal functionality using a new, audited contract. All impacted users will be fully compensated from the DAO treasury and the insurance fund.
For DeFi protocols integrating rsETH:
Several major lending platforms—including aave-compatible forks and Curve pools—had rsETH as a collateral asset. These protocols quickly paused rsETH borrowing and liquidation to avoid cascading bad debt. Some pools experienced temporary de-pegging, with rsETH trading at a 3–5% discount to its underlying value. However, that discount has since narrowed to less than 1% following the restitution announcement.
For the restaking ecosystem (EigenLayer & LRTs):
This attack sent shockwaves across the restaking narrative. Other liquid restaking tokens like ezETH (Renzo), pufETH (Puffer), and swETH (Swell) saw increased scrutiny and short-term sell pressure. However, none of those protocols shared the same vulnerable code, and their underlying deposits remained safe.
5. Recovery and Compensation Plan
The most critical part of any #rsETHAttackUpdate is what happens to lost funds. Here is the latest:
· Negotiation with the Attacker: Through on-chain messages, Kelp DAO offered a 10% white-hat bounty (approx. $1 million) for the return of the remaining 90% of stolen funds. The attacker has not yet responded publicly.
· Insurance Payout: Kelp DAO had purchased coverage from a DeFi insurance protocol (such as Nexus Mutual or InsurAce). The claim process has been initiated, and a portion of the losses (approximately $3 million) is expected to be covered.
· Treasury Compensation: Kelp DAO’s treasury will cover the remaining gap. The team has committed to making all rsETH depositors whole, including the value lost from the withdrawal queue.
· New Contract Deployment: A fully audited replacement for the vulnerable withdrawal manager has been deployed. Users must migrate their pending withdrawal requests to the new contract manually via Kelp DAO’s interface. Step-by-step guides have been published.
6. Lessons Learned: Preventing the Next Attack
The rsETH incident is a painful but invaluable case study for DeFi developers and users alike.
For protocols:
· Non-reentrant modifiers are not enough. Every external call must assume malicious intent. Checks-effects-interactions pattern must be enforced even on administrative functions.
· Oracle safety nets matter. Using a single price source or allowing a large withdrawal based on a stale price creates an attack surface. Time-weighted average prices (TWAP) and circuit breakers should be mandatory.
· Emergency pause mechanisms must exist at multiple layers. Kelp DAO had one, which stopped the bleeding. Protocols without such controls would have lost everything.
For users:
· Never hold large sums in unaudited or newly deployed contracts. Even blue-chip LRTs carry risk.
· Monitor protocol announcements directly. Following official channels like Kelp DAO’s Discord and Twitter is the only way to receive real-time updates during an attack.
· Diversify restaking exposure. Do not put all your ETH into a single liquid restaking token. Spread across multiple LRTs or hold native restaked positions directly through EigenLayer.
7. Current Status and What’s Next
As of this writing, the hashtag #rsETHAttackUpdate continues to trend with a mix of relief and residual doubt. The key facts:
· No rsETH holder has lost their principal token balance.
· Withdrawals are partially reopened with enhanced security.
· The attacker still holds approximately $7–8 million in ETH, but those funds have been blacklisted by multiple bridges and exchanges (centralized exchanges have frozen associated addresses).
· Kelp DAO has announced a full security overhaul, including a multi-month bug bounty increase and a second, independent audit from a top-tier firm (Trail of Bits or similar).
The incident has not caused a systemic failure of EigenLayer or the restaking sector. If anything, it has highlighted the need for better risk management and faster emergency response – both areas where Kelp DAO performed admirably after the fact.
Final Thoughts
The rsETH attack is a reminder that DeFi remains an experimental frontier. Even the most promising protocols – backed by reputable teams and millions in TVL – can harbor hidden vulnerabilities. The ultimately tells a story of swift containment, transparent communication, and a commitment to making users whole.
For now, rsETH continues to operate, though with tighter security controls and a slightly bruised reputation. The attacker may have walked away with a significant sum, but the community’s resolve to learn and improve remains unshaken.
Stay safe, double-check contract addresses, and always prioritize self-custody with common sense risk management.