A major crypto security incident has captured the attention of the blockchain community after a hacker linked to the KelpDAO exploit swapped an astounding 75,700 ETH for Bitcoin (BTC) in a single transaction valued at roughly $175 million. This ETH-to-BTC rotation stands out as one of the largest post-exploit asset transfers in recent memory, sparking widespread analysis, urgent security discussions, and renewed questions about the evolving risks in decentralized finance (DeFi).
Background: The KelpDAO Exploit and Its Aftermath
KelpDAO is a DeFi protocol specializing in liquid restaking, an innovation allowing users to maximize staking rewards while retaining asset liquidity. In recent months, the platform fell victim to an exploit targeting its restaked ETH (rsETH) product. The attacker, utilizing vulnerabilities in protocol logic or smart contract oversight, extracted significant value—an event that quickly rippled through DeFi forums and security circles.
While the immediate damage was clear from blockchain outflows, the ultimate fate of the stolen cryptocurrency remained uncertain. Initially, the hacker’s associated wallet held the ETH in place, leaving security experts and users alike hopeful for potential recovery. However, recent blockchain records now show that the attacker has acted decisively to move and convert a majority of the ill-gotten ETH.
The $175 Million Transaction: Details of the ETH-to-BTC Swap
According to on-chain data, a wallet known as 0xF9802c5EB6b972Ba686aFa7CA615910Ea8310b85—publicly linked to the KelpDAO exploit by leading blockchain intelligence platforms—initiated the transfer. The transaction involved the direct swap of approximately 75,700 ETH into BTC, one of the largest high-profile asset conversions of its kind.
- Swapped Amount: ~75,700 ETH
- Estimated USD Value: $175 million
- Direction: ETH to BTC
This move was flagged almost immediately by blockchain surveillance tools and discussed across community and governance forums. The scale of the outflow and the asset rotation strategy have both intensified scrutiny on the hacker’s methods, as well as the vulnerabilities that allowed the exploit in the first place.
Why Hackers Swap ETH for BTC After an Exploit
The cryptocurrency ecosystem has seen a recurring trend: hackers, after stealing large sums in ETH or other ERC-20 tokens, often elect to convert those assets to BTC. There are several critical reasons for this preference:
- Liquidity: Bitcoin’s massive liquidity pools on both centralized and decentralized exchanges allow for the movement of very large sums with relatively minimal slippage or attention compared to other assets.
- Obfuscation: BTC benefits from robust privacy-focused tools (mixers, coinjoin services, and certain bridges) which can further obscure the trail of stolen funds after conversion—making investigative efforts far more challenging.
- Cross-Chain Complexity: Moving funds from Ethereum’s account-based system to Bitcoin’s unspent transaction output (UTXO) model demands new techniques and software tools from blockchain forensic teams, often causing delays or adding uncertainty to tracking endeavors.
- Psychological Impact: The conversion also signals a psychological milestone to both the hacker and the observing public: the funds, once static, are being actively laundered, which historically diminishes the probability of successful asset recovery.
This combination of practical and strategic advantages makes BTC the asset of choice for attackers looking to exit or further conceal their digital tracks.
Asset-Tracing Challenges: From Ethereum to Bitcoin
The shift from ETH to BTC places new hurdles before forensic investigators. Ethereum’s public, account-based model provides rich, granular data on fund movement and wallet behavior. Bitcoin’s UTXO model, by contrast, can complicate “following the money,” especially after the introduction of privacy techniques.
While intelligence services like Arkham Intelligence have flagged and tagged the exploiter’s wallet, cross-chain analytics must now bridge divergent technical standards. Once on the Bitcoin chain, and especially if the BTC is routed through mixers, chain-hopping and laundering practices can blur or even break typical surveillance workflows.
This shift stands as a stark reminder: the best chance for recovery or intervention occurs before stolen assets leave their originating ecosystem. After cross-asset and cross-chain swaps, the recovery prospects fall dramatically.
Implications for KelpDAO and DeFi Security
The hacker’s active conversion of stolen assets shines a harsh spotlight on the security landscape for liquid restaking protocols and DeFi as a whole. Not only does the move diminish user hopes for asset retrieval, but it also delivers a major blow to confidence in KelpDAO and, by extension, similar protocols offering novel staking and liquidity features.
User Confidence and the Domino Effect
High-profile exploits and ongoing laundering draw negative attention and accelerate capital outflows as users seek to protect their holdings. In DeFi, where trust is both essential and fragile, such incidents can lead to:
- Reduced protocol TVL (Total Value Locked)
- Delays or cancellations of new product rollouts
- Increased scrutiny or withdrawal by institutional partners and larger community stakeholders
- Broader reevaluation of restaking, liquid staking, and similar DeFi innovations in terms of inherent risks
Security Lessons and Defensive Best Practices
This exploit underscores the urgent need for proactive security investments in the DeFi arena. Protocols must not only build in real-time transaction monitoring, but also establish rapid communication channels with major exchanges to coordinate freezes on suspect assets. The collaborative, swift response shown by platforms like the Arbitrum Foundation in these events demonstrates effective crisis management, but it’s an open question whether such measures can stop exploiters after a cross-chain transition has already occurred.
Furthermore, DeFi teams are now incentivized to implement layered security audits, bug bounty programs, and constant stress-testing under adversarial conditions. Community engagement, transparency after incidents, and prompt software upgrades are critical for rebuilding trust post-incident.
Market Implications: How Traders and Investors React
From a market perspective, the sheer size of the swap is significant enough to register as a large, coordinated sell of ETH and a corresponding buy of BTC. Such flows can generate:
- Short-term price volatility, particularly in the ETH/BTC trading pair
- Increased order book activity and potential slippage on exchanges during the swap period
- Speculative buzz, as traders and market-makers look to front-run, hedge, or otherwise respond to whale-sized transactions flagged by analytics dashboards
Additionally, news of exploits and subsequent laundering feeds into market psychology. Headlines centered on attackers moving vast sums contribute to cautious or bearish sentiment around compromised DeFi protocols, while simultaneously reinforcing Bitcoin’s narrative as the ultimate liquidity and exit vehicle in digital assets.
This cyclical pattern—exploit, asset movement, market response—contributes to both market technicals and long-term sentiment around the stability and safety of emerging DeFi technologies.
Key Questions About the Exploit and ETH-to-BTC Swap
How much ETH was swapped and for how much?
The hacker converted approximately 75,700 ETH, which equated to nearly $175 million at the time of transaction.
Why did the hacker choose to convert to Bitcoin?
BTC offers deeper liquidity, a robust set of privacy tools, and is more readily moved across borders and platforms. For illicit actors, it’s often the endgame for large-scale funds due to these properties and the added challenge it brings to asset tracking efforts.
What does such a large asset swap mean for recovery efforts?
Once ETH has been converted to BTC and potentially mixed or laundered, the chance of recovering the stolen funds drops steeply. Real-time response is crucial for success; delayed response almost always means the attacker has the upper hand.
Has any stolen KelpDAO funds been recovered?
At the time of writing, there is no confirmed report of any funds being returned. The hacker’s ongoing laundering strategy indicates that most, if not all, of the exploited assets remain under the attacker’s control.
How can on-chain observers track the movements?
The relevant Ethereum addresses remain visible on public block explorers, while certain blockchain analysis services and investigator dashboards have tagged, flagged, and are actively monitoring the wallets and transactions associated with the KelpDAO exploit.
Looking Forward: The Road Ahead for DeFi Security
This incident stands as both a cautionary tale and a rallying cry for improved security standards in decentralized finance. As the scale of exploits grows alongside protocol complexity and user adoption, hackers continue to refine their playbooks, moving funds across chains and employing increasingly sophisticated laundering techniques.
For the DeFi community, the lessons are clear: transparency, constant vigilance, and collaborative security efforts must be prioritized. Protocols, users, and security professionals must work together to anticipate and mitigate risks. The ultimate goal is not only to survive incidents like the KelpDAO hack but to emerge stronger and more resilient in the defense of open finance.
Disclaimer: This article is for informational purposes only, not financial or investment advice. Cryptocurrency markets present significant risks. Conduct your own research and consult a professional before making investment decisions.

