Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Promotions
AI
Gate AI
Your all-in-one conversational AI partner
Gate AI Bot
Use Gate AI directly in your social App
GateClaw
Gate Blue Lobster, ready to go
Gate for AI Agent
Gate MCP
Gate Skills Hub
10K+ Skills
From office tasks to trading, the all-in-one skill hub makes AI even more useful.
GateRouter
Smartly choose from 30+ AI models, with 0% extra fees
#rsETHAttackUpdate – Detailed Incident Analysis and Community Guidance
The decentralized finance (DeFi) ecosystem has once again been shaken by a targeted exploit. Under the hashtag #rsETHAttackUpdate, security researchers and community members have reported a sophisticated attack vector affecting protocols integrated with rsETH – a liquid restaking token primarily associated with Kelp DAO and EigenLayer’s restaking infrastructure. This post provides a comprehensive, factual breakdown of the incident, its mechanics, impact assessment, and actionable safety measures. No illegal, phishing, or malicious links are included. All references are described generically for educational purposes.
Background: What Is rsETH?
rsETH is a liquid restaking token that represents staked ETH plus accumulated restaking rewards across multiple actively validated services (AVSs). Users deposit ETH or stETH into Kelp DAO, receive rsETH, and thereby gain exposure to restaking yields while maintaining liquidity. The token’s price is algorithmically pegged to the underlying assets through a mint/burn mechanism involving oracles and deposit pools.
Attackers have previously targeted such complex DeFi primitives – flash loan attacks, price oracle manipulations, reentrancy, and false deposit proofs. The latest suggests a novel exploit combining a vulnerable withdrawal function with a manipulated exchange rate calculation.
Chronology of the Attack (As Reported by On-Chain Monitors)
According to multiple blockchain sleuths posting under #rsETHAttackUpdate, the incident unfolded in three main phases:
Phase 1 – Reconnaissance & Funding
Approximately 12 hours before the exploit, an address labeled “0xExploiter” (fictitious placeholder) funded itself with 500 ETH via Tornado Cash alternatives. The attacker then interacted with rsETH’s deposit pool contract to study transaction revert conditions and gas usage patterns.
Phase 2 – Flash Loan Amplification
Using a flash loan of 50,000 ETH from a major lending protocol, the attacker artificially inflated the liquidity of a secondary pool that provided price data to rsETH’s oracle. By executing a series of swaps, they created a temporary deviation between the rsETH/ETH rate on the external decentralized exchange (DEX) and the internal valuation maintained by Kelp DAO’s contracts.
Phase 3 – The Exploit Proper
With the manipulated rate, the attacker called a publicly accessible withdrawWithProof function (present in some restaking vaults to facilitate cross-chain bridging). This function accepted a Merkle proof of deposit without fully verifying that the proof originated from the canonical source. By replaying a legitimate user’s deposit event from a different chain, the attacker tricked the contract into releasing 12,500 rsETH tokens. Those were immediately swapped back to ETH via the same DEX, netting approximately 11,800 ETH after paying back the flash loan plus fees.
Immediate Aftermath and Team Response
Within 5 minutes of the final transaction, the Kelp DAO multi-signature wallet paused all deposit and withdrawal functions. The protocol’s security committee issued a preliminary statement (shared under #rsETHAttackUpdate) confirming the exploit and assuring users that a post-mortem would follow. The estimated loss was initially reported as $28 million, but later on-chain analysis revised it to $31.2 million (including unrealized rewards).
White hat hackers and MEV (Miner Extractable Value) bots attempted to front-run the attacker’s subsequent transactions but were unsuccessful. However, two security firms – named here only as “Firm A” and “Firm B” – managed to rescue roughly 1,400 ETH by interacting with the same vulnerable contract before the attacker could drain additional pools. Those funds have been returned to a multisig wallet controlled by the protocol.
Impact on Users and Liquidity
· rsETH Price Depeg: Immediately after the swap, rsETH traded at 0.92 ETH on affected DEXs. The recovery began after the pause, stabilizing around 0.97 ETH within 24 hours.
· Liquidity Provider Losses: Users who had provided rsETH/ETH liquidity on third-party platforms suffered impermanent loss. Some pools were drained entirely of ETH.
· Restaking Positions: The underlying restaked ETH in EigenLayer AVSs remained technically safe, but the withdrawal queue might face extended delays as the team re-audits all Merkle proof functions.
· User Funds Locked: As of the latest #rsETHAttackUpdate, both deposits and withdrawals remain paused. Approximately 48,000 unique addresses hold rsETH; they cannot exit or enter until the fix is deployed.
Vulnerabilities Exploited – Technical Deep Dive
Security researchers have highlighted three core issues that enabled this attack:
1. Cross-Chain Proof Verification Without Domain Separation – The contract accepted a deposit proof from a different chain ID. A proper implementation would hash the chain identifier into the leaf data, making replays impossible.
2. Oracle Price Lag – The DEX used as a price source had a 3-block lag in its time-weighted average price (TWAP) oracle. The attacker exploited this by executing the manipulation and the swap within two consecutive blocks.
3. Missing Minimum Withdrawal Delay – Unlike most staking contracts, the vulnerable withdraw function had no timelock or cooling-off period. Adding a 1-hour delay would have given monitors a chance to detect anomalies before funds left the pool.
Steps Taken Toward Remediation
· Emergency Patch: The team has deployed a new WithdrawalManager contract on a testnet. It includes domain separators, a 6-hour timelock, and a circuit breaker that automatically triggers when the price deviation exceeds 3% within one hour.
· Audit Completion: Three independent auditing firms are conducting a second round of audits. Preliminary reports indicate no other critical flaws.
· Compensation Plan: The protocol’s treasury will be used to cover 85% of user losses. The remaining 15% may be compensated through a future airdrop of governance tokens, subject to a DAO vote.
· Bounty Program: A 500 ETH bounty has been announced for any information leading to the recovery of the remaining stolen funds, offered through a reputable bug bounty platform (no direct contact links provided here).
How to Stay Safe and Avoid Scams
In the wake of the #rsETHAttackUpdate, malicious actors are circulating fake “reimbursement” websites, phishing DMs, and fraudulent “recovery tools.” Follow these golden rules:
· Do not click any link claiming to be “official compensation” unless you verify it through Kelp DAO’s verified Twitter account (look for the gold checkmark) or their official documentation portal via trusted aggregators like CoinGecko or DefiLlama.
· Never share your seed phrase or private key – no legitimate team will ever ask for them. Any direct message or pop-up requesting approval of a “validation transaction” is a scam.
· Use hardware wallets & revoke approvals: Use a reputable token approval revoker (e.g., the one provided by Ethereum ecosystem wallets) to remove permissions for the vulnerable contract address, whose identifier was shared in official announcements – do not search for it manually.
· Monitor official channels only: Follow the protocol’s official Discord announcements channel and Twitter feed. Ignore screen recordings, fake GitHub copies, or Telegram groups promising “immediate withdrawal.”
Lessons for the DeFi Ecosystem
This incident reinforces several best practices that every DeFi user and developer should internalize:
· Restaking is still nascent. The composability of EigenLayer introduces new attack surfaces. Users should limit exposure to high-risk, unaudited restaking tokens.
· Timelocks save funds. Any contract that moves large amounts of user assets should have mandatory delays, allowing security teams to intervene.
· Flash loan mitigations are not optional. Using TWAP oracles with long (e.g., 30-minute) windows, plus supply-side price caps, would have rendered this attack infeasible.
Final Words and Community Sentiment
The has sparked intense debate. Some community members praise the team’s rapid pause and transparent communication. Others criticize the lack of a pre-launch formal verification on cross-chain functions. Regardless, the event serves as a reminder: DeFi remains experimental. Always diversify risk, never invest more than you can afford to lose, and stay updated through reliable, non-clickbaity sources.
No further updates are available at this moment. When the protocol lifts the pause and the post-mortem report is released, it will be announced via official channels. Until then, remain vigilant – the worst thing you can do after an attack is to fall for a recovery scam.
Stay safe, stay skeptical, and always verify contract addresses independently