BREAKING
KELP DAO $292M drained via forged LayerZero DVN messages — Lazarus Group 19 APR 2026
01

Real-time detection

We monitor on-chain signals continuously: large outflows from protocol contracts, unexpected approval calls, flash loan originations followed by unusual state changes, and cross-chain bridge message anomalies. Alerts fire within seconds of an anomalous transaction hitting a block.

Etherscan Solscan Dune Analytics Phalcon
02

Transaction graph reconstruction

We trace the full execution path: from the initial trigger transaction through every internal call, delegatecall, and cross-contract interaction. We reconstruct the attacker's fund flow from origin wallet through bridge hops to final destination, building a directed acyclic graph of every value transfer.

Tenderly EigenPhi Breadcrumbs Custom scripts
03

Contract forensics

We decompile or verify the source of every contract involved. We identify the exact vulnerable code path — missing access control, incorrect invariant check, reentrancy window, oracle manipulation vector — and trace it back to the specific commit that introduced the flaw. We check all previous audits against the actual deployed bytecode.

Foundry Heimdall Dedaub 4byte.directory
04

Attribution & threat intelligence

For attribution claims (e.g. Lazarus Group, DPRK), we require corroboration from at least two independent sources: on-chain wallet clustering matching known threat actor infrastructure, plus OSINT from official law enforcement or credible security firms. We clearly mark all attribution as either confirmed or assessed.

Chainalysis TRM Labs OFAC lists
05

Independent publication

We publish without sharing drafts with protocols in advance. We do not accept editorial input, corrections before publication, or "off the record" briefings that could influence our analysis. After publication, we accept factual corrections with on-chain evidence and update articles publicly with a correction notice.

Source standards

Confirmed

Directly verifiable on-chain — a transaction hash, block data, or contract state that any reader can independently verify.

Assessed

Strongly supported by on-chain evidence and corroborating intelligence, but not independently verifiable by a third party without additional data.

Unconfirmed

Reported but not yet verified. We include these only when the claim is credible and relevant, clearly labeled as unconfirmed.

Weekly digest · Free

Get the post-mortem
before the protocol does.

Confirmed exploits, attack vector breakdowns, and recovered-funds updates delivered every week. Independent — no protocol sponsorships, no advertising.

No ads · No spam · Unsubscribe anytime