Crime

The Clock Is Ticking: How the Kelp DAO Attackers Are Moving $175 Million Through Crypto's Privacy Layer

Following Arbitrum's $71 million asset freeze, the Kelp DAO exploiters accelerated their laundering operation, shifting 75,700 ETH worth approximately $175 million to Ethereum mainnet and routing funds through THORChain and Umbra in what blockchain investigators describe as the classic early-stage layering phase of crypto money laundering.

Written By :
MINRK
MINRK
The Clock Is Ticking

1. The Freeze Triggered the Sprint

The laundering timeline accelerated sharply in direct response to Arbitrum's emergency intervention. Within hours of the Arbitrum Security Council freezing 30,766 ETH linked to the Kelp DAO exploit, the attacker moved all remaining funds held on Ethereum mainnet — approximately 75,700 ETH worth around $175 million — across three transactions into a cluster of new wallets. According to data tracked by Arkham and reported by on-chain investigator ZachXBT, the movements included a 25,000 ETH transfer to a freshly created wallet alongside additional transfers of 50,700 ETH and 0.7 ETH to separate addresses. The pattern is consistent with what blockchain security analysts describe as the "layering" phase of crypto money laundering: breaking a large consolidated balance into smaller, harder-to-trace fragments distributed across multiple wallets before routing them through obfuscating infrastructure.

2. THORChain and Umbra: The Tools of Obfuscation

The specific protocols through which the attacker has begun routing stolen funds are well-known to blockchain investigators for their previous use in high-profile DeFi theft laundering operations. ZachXBT identified three THORChain transactions totaling approximately $1.5 million, through which Ether was converted to Bitcoin and transferred cross-chain — a method that exploits the structural privacy of chain-hopping to sever the on-chain trail between the source and destination of funds. A separate transfer of approximately $78,000 was routed through Umbra, a privacy protocol built on Ethereum that uses stealth addresses to obscure the recipient of transactions. Neither protocol enforces Know Your Customer checks, which is precisely why they are favored by sophisticated actors seeking to launder crypto proceeds: once funds enter these pipelines, tracing them requires advanced chain analytics and often produces diminishing certainty over time as assets fragment across wallets and chains.

The Lazarus Group has used THORChain specifically in prior laundering operations, including in the aftermath of the $1.4 billion Bybit exploit in February 2025. The reappearance of that same infrastructure in the Kelp DAO laundering flow reinforces LayerZero's preliminary attribution to Lazarus and its TraderTraitor subunit, whose operational signatures — pre-funded wallets via Tornado Cash, RPC infrastructure compromise, self-destructing malicious binaries, and rapid cross-chain laundering through privacy rails — have become sufficiently documented that their presence constitutes meaningful attribution evidence even absent formal law enforcement confirmation.

3. The Scope of What Remains in Play

Of the approximately $292 million drained from Kelp's bridge on April 18, Arbitrum's emergency action recovered roughly $71 million — approximately 24% of the total. The remaining $221 million was either moved off Arbitrum before the freeze or was never held there. The $175 million on Ethereum mainnet that began moving on Tuesday represents the largest identifiable remaining concentration, with the balance of the stolen value already dispersed across earlier cross-chain movements or consolidated into Bitcoin holdings through THORChain routing. Blockchain analytics firm Chainalysis has estimated that North Korean hackers have stolen a cumulative $6.75 billion in crypto assets since 2022, with annual hauls accelerating. The pattern across those operations consistently shows that funds moved quickly through privacy rails in the days immediately following a theft become extremely difficult to recover — the window for on-chain intervention effectively closes as fragmentation progresses.

4. How Lazarus Launders at Scale

Understanding the Lazarus Group's laundering methodology illuminates why recovery at this stage is unlikely. The group's standard approach — documented across multiple prior operations including Bybit, Harmony Horizon Bridge, and Ronin Network — involves a multi-stage process designed to exhaust the tracing capabilities of blockchain analytics firms. The first stage, which is now underway, involves consolidating stolen assets into ETH and beginning to break the position into smaller sub-wallets. The second stage routes ETH to Bitcoin through cross-chain swaps using non-custodial bridges like THORChain, creating a chain-break that requires separate analytics on a completely different blockchain. The third stage typically involves mixing services or further subdivision into dozens or hundreds of wallets before eventual conversion into fiat through over-the-counter desks in jurisdictions with limited regulatory reach. The self-destructing malicious node software used in the Kelp attack — which wiped binaries and logs immediately after the exploit concluded — was itself designed to complicate this same forensic reconstruction process.

5. The $605 Million Pattern: Lazarus in April 2026

The Kelp DAO laundering operation does not exist in isolation. It is the second major suspected Lazarus laundering event of April 2026 alone. The Drift Protocol exploit on April 1 — which drained approximately $285 million from the Solana-based perpetuals protocol through a long-term social engineering operation involving governance signer compromise — preceded Kelp by 17 days. The two attacks combined represent more than $577 million stolen from DeFi in under three weeks, attributed by multiple parties to the same state-sponsored hacking organization. Blockchain security researcher Taylor Monahan has warned that Lazarus operatives may be embedded in more than 40 active DeFi projects, contributing legitimate work over extended periods before exploiting access to keys, infrastructure, or governance systems. The Drift attack used social engineering; the Kelp attack used infrastructure compromise. The operational playbook is evolving across attack vectors while the laundering methodology remains consistent.

6. What Recovery Efforts Remain Active

LayerZero confirmed it is coordinating with multiple law enforcement agencies globally and with blockchain security organization SEAL to trace the stolen funds. Kelp DAO has stated it is working with ecosystem partners on a recovery fund and weighing legal coordination with affected counterparties including Aave. The $71 million frozen on Arbitrum represents the most concrete recovery outcome to date and remains pending a governance vote by ARB token holders on its final disposition. For the remaining $221 million, the practical probability of recovery diminishes with each passing hour as the layering process progresses and funds migrate further from their origin through privacy-preserving infrastructure. Law enforcement agencies in the US, South Korea, and other jurisdictions with active Lazarus Group investigation mandates have demonstrated some ability to disrupt downstream laundering — most notably through the 2023 THORChain sanction action — but the speed differential between a sophisticated nation-state actor moving crypto and international legal coordination processes operating across multiple jurisdictions makes real-time interdiction exceptionally difficult.

7. The Broader Implications for DeFi Security

The Kelp DAO laundering operation is unfolding in real time, and its progression illustrates a challenge that the DeFi sector has not yet resolved: the same characteristics that make decentralized finance useful — permissionless access, cross-chain composability, non-custodial protocols without identity requirements — are precisely the characteristics that make it an effective environment for laundering proceeds of crypto theft at scale. The Arbitrum freeze demonstrated that layer-2 governance can act faster than many assumed, but it also demonstrated the limits of that capability: it can freeze what is still on the network, but it cannot reach assets that have already transitioned to Ethereum mainnet, Bitcoin, or other chains. The design of a DeFi ecosystem robust enough to resist state-level adversaries while remaining accessible, permissionless, and composable for legitimate users is the security challenge that April 2026's series of exploits has placed at the center of the industry's agenda.

Related Articles

NEWSLETTERS

Don't miss another story.

Subscribe to the MINRK Newsletter today.

By signing up, you will receive emails about MINRK products and you agree to our terms of use and privacy policy.

Crypto Daybook Americas

Market analysis for crypto traders and investors.

EVERY WEEKDAY

Crypto for Advisors

Defining crypto, digital assets and the future of finance for financial advisors.

EVERY THURSDAY

The Protocol

Exploring the tech behind crypto one block at a time.

WEEKLY

Crypto Long & Short

A must read for institutions. Insights, news and analysis delivered weekly.

EVERY WEDNESDAY

CoinDesk Headlines

The biggest crypto news and ideas of the day.

EVERY WEEKDAY

State of Crypto

Examining the intersection of cryptocurrency and government.

WEEKLY

Research Reports

Join thousands of readers who rely on MINRK for data-driven insights on the latest digital asset trends.

MONTHLY