Recent exploits targeting Drift and Kelp protocols, resulting in over $500 million in losses within weeks, suggest a major shift in cyberattack patterns. What once appeared to be isolated incidents now looks more like a coordinated, state-driven strategy, likely linked to North Korea–affiliated groups.
From Social Engineering to Infrastructure-Level Attacks
Unlike earlier attacks that relied heavily on phishing or stolen credentials, recent exploits show a clear evolution. Hackers are no longer just targeting users—they are targeting the underlying infrastructure of DeFi systems.
In the Kelp incident, attackers did not break encryption or steal private keys. Instead, they manipulated trusted data inputs, allowing the system to approve transactions that never actually occurred.
In simple terms:
the system verified who sent the message—but not whether the message was true.
The Real Problem: Design Choices, Not Code Bugs
Security experts emphasize that this was not a sophisticated new exploit, but rather the exploitation of known design weaknesses.
A key issue was Kelp’s reliance on a single validator to approve cross-chain messages. While this setup improves speed and simplicity, it removes critical security layers.
This highlights a deeper problem in DeFi:
security is often optional, not enforced.
As one analyst put it:
“If a configuration is unsafe, it should not be a default option.”
Contagion Risk: One Failure Can Spread Across DeFi
The impact of such attacks is rarely contained.
Because DeFi assets are interconnected across multiple platforms, vulnerabilities can spread quickly. In this case, affected assets were used as collateral on other platforms like lending protocols, creating broader financial stress.
This exposes a structural reality:
DeFi is not a set of isolated apps—it is a chain of interdependent risk.
When one link breaks, others follow.

The Illusion of Decentralization
Perhaps the most important takeaway is the gap between theory and reality.
Many systems marketed as “decentralized” still rely on centralized components—whether it’s validators, data providers, or cross-chain infrastructure.
True decentralization is not a feature—it is a set of design decisions.
And in many cases, those decisions prioritize efficiency over security.
Final Take: The Biggest Risk Is Already Known
These attacks reveal a critical shift in the threat landscape.
The danger is no longer unknown vulnerabilities, but known weaknesses that remain unaddressed. As attackers become more sophisticated and organized, especially at the state level, the cost of ignoring these risks is rising rapidly.
In today’s DeFi market, the weakest layer is not code—it’s architecture.