A New Front in the North-South Korean Secret War: Upbit, North Korean Hackers’ “Nuclear ATM”? | Bee Network
Original author: Deep Tide TechFlow
The market rebounded, but the exchange was hacked again.
On November 27, Upbit, South Korea’s largest cryptocurrency exchange, confirmed a security breach that resulted in the loss of approximately 54 billion won (about US$36.8 million) in assets.
At 04:42 AM Seoul time (KST) on November 27, while most South Korean traders were still asleep, Upbit’s Solana hot wallet address experienced an unusually large outflow of funds.
According to on-chain monitoring data from security organizations such as SlowMist, the attackers did not use a single asset transfer method, but instead carried out a “clear-out” plunder of Upbit’s assets on the Solana chain.
The stolen assets included not only the core token SOL and the stablecoin USDC , but also almost all the mainstream SPL standard tokens within the Solana ecosystem.
List of stolen assets (partial):
DeFi/Infrastructure : JUP (Jupiter), RAY (Raydium), PYTH (Pyth Network), JTO (Jito), RENDER, IO, etc. Memes/community-related : BONK, WIF, MOODENG, PENGU, MEW, TRUMP, etc. Other projects include: ACS, DRIFT, ZETA, SONIC, etc.This sweeping attack suggests that the attackers likely gained access to the private key of Upbit’s hot wallet for the Solana ecosystem, or that the signing server was directly controlled, enabling them to authorize the transfer of all SPL tokens under that wallet.
For Upbit, a giant that holds 80% of the South Korean market share and prides itself on having the highest security level certification from the Korea Internet & Security Agency (KISA), this is undoubtedly a painful breach of its defenses.
However, this is not the first time that a South Korean stock exchange has been hacked.
If we extend the timeline, we will find that the South Korean crypto market has actually been targeted by hackers, especially North Korean hackers, for the past eight years.
The South Korean cryptocurrency market is not only the world’s most frenzied casino for retail investors, but also the most convenient “cash cow” for North Korean hackers.
Eight years of North-South Korean conflict, a stolen chronicleFrom early brute-force attacks to later social engineering infiltrations, the attack methods have continuously evolved, and the history of suffering for Korean stock exchanges has also been prolonged.
Total losses: Approximately $200 million (based on the price at the time of the theft; if calculated at current prices, it exceeds $1.2 billion, of which the 342,000 ETH stolen from Upbit in 2019 alone are now worth over $1 billion).
2017: The Wilderness Era – Hackers Target Employee Computers2017 marked the beginning of the crypto bull market, but also the start of a nightmare for South Korean exchanges.
That year, Bithumb, South Korea’s largest online exchange, was the first to be affected. In June, hackers broke into a Bithumb employee’s personal computer, stealing the personal information of approximately 31,000 users. They then used this data to launch targeted phishing attacks, stealing about $32 million. Subsequent investigations revealed that the employee’s computer contained unencrypted customer data, and the company hadn’t even installed basic security updates.
This exposed the rudimentary state of security management at the South Korean stock exchange at the time, where even basic principles like “don’t store customer data on personal computers” were not established.
Even more significant was the collapse of the mid-sized exchange Youbit. This exchange suffered two devastating blows within a year: losing nearly 4,000 bitcoins (approximately $5 million) in April, and then having 17% of its assets stolen in December. Overwhelmed, Youbit declared bankruptcy, with users only able to withdraw 75% of their balance, the remainder awaiting a lengthy liquidation process.
Following the Youbit incident, the South Korean Internet Security Agency (KISA) publicly accused North Korea of being behind it for the first time. This also sent a signal to the market:
The exchanges are no longer dealing with ordinary cyber thieves, but with state-sponsored hacking groups with geopolitical motives.
2018: The Hot Wallet HeistIn June 2018, the South Korean market suffered a series of severe blows.
On June 10, mid-sized exchange Coinrail was attacked, suffering losses exceeding $40 million. Unlike previous attacks, this time the hackers primarily targeted then-popular ICO tokens (such as Pundi X’s NPXS), rather than Bitcoin or Ethereum. Following the news, the price of Bitcoin briefly plummeted by over 10%, and the entire crypto market lost over $40 billion in market capitalization within two days.
Just ten days later, Bithumb, a leading South Korean exchange, also suffered a breach, with approximately $31 million worth of XRP and other tokens stolen from its hot wallet. Ironically, just days before the attack, Bithumb had announced on Twitter that it was “transferring assets to cold wallets to upgrade its security system.”
This is the third time Bithumb has been hacked in a year and a half.
The series of defaults severely damaged market confidence. Following the incident, the South Korean Ministry of Science and Technology conducted a security audit of 21 domestic exchanges, finding that only 7 passed all 85 checks, while the remaining 14 were “at risk of being exposed to hacker attacks at any time,” with 12 of them having serious vulnerabilities in their cold wallet management.
2019: Upbit’s 342,000 ETH stolenOn November 27, 2019, Upbit, South Korea’s largest cryptocurrency exchange, suffered what was then the largest single theft in the country’s history.
Hackers took advantage of exchanges’ wallet cleanup to transfer 342,000 ETH in a single transaction. Instead of immediately dumping the funds, they used “peel chain” technology to break the money down into countless small transactions, transferring it layer by layer until it finally ended up in dozens of non-KYC exchanges and mixers.
The investigation revealed that 57% of the stolen ETH was exchanged for Bitcoin at a discount of 2.5% below market price on exchanges suspected to be operated by North Korea, while the remaining 43% was laundered through 51 exchanges in 13 countries.
It wasn’t until November 2024, five years later, that South Korean police officially confirmed the case was perpetrated by the North Korean hacking groups Lazarus Group and Andariel. Investigators identified the attackers through IP tracking, financial flow analysis, and the North Korean-specific term “흘한일” (meaning “not important”) appearing in the attack code.
South Korean authorities collaborated with the US FBI to track the assets, and after four years of legal proceedings, finally recovered 4.8 bitcoins (approximately 600 million won) from a Swiss exchange, which were then returned to Upbit in October 2024.
However, compared to the total amount stolen, the amount recovered is almost negligible.
2023: GDAC EventOn April 9, 2023, mid-sized exchange GDAC suffered an attack, losing approximately $13 million—23% of its total assets under custody.
The stolen assets included approximately 61 BTC, 350 ETH, 10 million WEMIX tokens, and 220,000 USDT. The hackers took control of GDAC’s hot wallet and quickly laundered some of the funds using the Tornado Cash mixer.
2025: Six years later, on the same day, Upbit fell victim again.On the same day six years ago (November 27), Upbit lost 342,000 ETH.
History has repeated itself. At 4:42 a.m., Upbit’s Solana hot wallet experienced an unusual outflow of funds, with approximately 54 billion won (US$36.8 million) transferred to an unknown address.
Following the Upbit incident in 2019, South Korea officially implemented the Specific Financial Information Act (Special Financial Information Act) in 2020, requiring all exchanges to obtain ISMS (Information Security Management System) certification and open real-name accounts with banks. Many smaller exchanges that failed to meet the requirements were forced to exit the market, shrinking the industry landscape from a “hundred-exchange battle” to one dominated by a few giants. Upbit, backed by resources from the Kakao group and having obtained certification, once held a market share exceeding 80%.
However, six years of compliance efforts did not save Upbit from this crisis.
As of press time, Upbit has announced that it will fully compensate users for their losses with its own assets, but the company has not yet released detailed information regarding the attacker’s identity and the specific attack path.
Kimchi premium, state-owned hackers and nuclear weaponsThe frequent hacking of South Korean stock exchanges is not simply a matter of technological incompetence, but a tragic reflection of geopolitics.
In a highly centralized market with extremely high liquidity premiums and a unique geographical location, the Korean exchange is essentially using the security budget of a commercial company to fight against a national-level hacking force with nuclear deterrence aspirations.
This unit has a name: Lazarus Group.
Lazarus, belonging to the North Korean Reconnaissance General Bureau (RGB), is one of Pyongyang’s most elite cyber warfare forces.
Before turning to cryptocurrencies, they had already proven their strength in the traditional financial sector.
In 2014, they breached Sony Pictures; in 2016, they stole $81 million from the Central Bank of Bangladesh; and in 2017, they orchestrated the WannaCry ransomware attack that affected 150 countries.
Starting in 2017, Lazarus shifted its focus to the cryptocurrency field. The reason is simple:
Compared to traditional banks, cryptocurrency exchanges are more loosely regulated, have inconsistent security standards, and once they succeed, funds can be quickly transferred across borders via on-chain transfers, bypassing international sanctions.
South Korea happens to be the ideal hunting ground.
First, South Korea is a natural target for geopolitical confrontation. For North Korea, attacking South Korean companies not only provides access to funds but also creates chaos in an “enemy country,” achieving two goals at once.
Secondly, the premium on cryptocurrencies reflects a lucrative pool of funds. South Korean retail investors are world-renowned for their fervor for cryptocurrencies, and the premium is essentially a result of supply falling short of demand, with large amounts of Korean won flooding in to chase limited crypto assets.
This means that South Korean exchanges’ hot wallets hold far more liquidity than other markets. For hackers, this is a gold mine.
Third, they had an advantage in language. Lazarus’ attacks didn’t rely solely on brute-force techniques. They were adept at social engineering, such as forging job postings, sending phishing emails, and impersonating customer service to obtain verification codes.
North and South Korea share the same language and culture, with zero language barrier, which significantly increases the success rate of targeted phishing attacks against South Korean employees and users.
Where did the stolen money go? That’s probably the most interesting part of the story.
According to a UN report and tracking by several blockchain analytics firms, the cryptocurrency stolen by Lazarus ultimately flowed into North Korea’s nuclear weapons and ballistic missile programs.
Previously, Reuters cited a confidential UN report stating that North Korea used stolen cryptocurrency funds to help fund its missile development program.
In May 2023, Anne Neuberger, the White House Deputy National Security Advisor, publicly stated that about 50% of the funding for North Korea’s missile program came from cyberattacks and cryptocurrency theft; this figure was a further increase from the “about one-third” she gave in July 2022.
In other words, every time a South Korean stock exchange is hacked, it may indirectly contribute to the development of nuclear warheads on the other side of the 38th parallel.
Meanwhile, the money laundering methods are quite sophisticated: stolen assets are first split into countless small transactions using “stripping chain” technology, then their origin is obscured by coin mixers (such as Tornado Cash and Sinbad), then they are exchanged for Bitcoin at a discounted price through a North Korean-built exchange, and finally exchanged for fiat currency through underground channels in China and Russia.
In 2019, South Korean police officially released the results of their investigation into the theft of 342,000 ETH from Upbit. The investigation revealed that 57% of the stolen ETH was exchanged for Bitcoin at 2.5% below market value on three exchanges suspected to be operated by North Korea, while the remaining 43% was laundered through 51 exchanges in 13 countries. The entire process lasted several years, and the vast majority of the funds have yet to be recovered.
This may be the fundamental dilemma facing South Korean stock exchanges:
On one side is Lazarus, a hacker force supported by national resources, capable of operating 24/7, and willing to invest any amount of money; on the other side are commercial companies like Upbit and Bithumb.
Even top-tier exchanges that have passed censorship are still powerless when faced with state-sponsored high-persistence threat attacks.
It’s not just a problem in South Korea.Eight years, more than ten attacks, and approximately $200 million in losses—if you only consider this local news in South Korea’s crypto industry, you’re missing the bigger picture.
The ordeal of South Korean exchanges is a preview of the crypto industry’s struggle against a national-level adversary.
North Korea is the most conspicuous player, but not the only one. Certain high-threat Russian attack groups have been linked to multiple DeFi attacks, Iranian hackers have launched attacks against Israeli crypto companies, and North Korea itself has long since expanded its battlefield from South Korea to the global arena, such as the $1.5 billion Bybit attack in 2025 and the $625 million Ronin attack in 2022, with victims across continents.
The crypto industry has a structural paradox: everything must go through a centralized entry point.
No matter how secure the blockchain itself is, users’ assets will ultimately have to flow through “choke points” such as exchanges, cross-chain bridges, and hot wallets.
These nodes, which concentrate massive amounts of funds, are operated by commercial companies with limited budgets; for state-sponsored hackers, this is a highly efficient hunting ground.
The resources of the attacking and defending sides are fundamentally unequal; Lazarus can fail a hundred times, while the exchange can only fail once.
The kimchi premium will continue to attract global arbitrageurs and local retail investors. Lazarus will not stop just because it has been exposed. The battle between South Korean exchanges and state-sponsored hackers is far from over.
I just hope that next time your money gets stolen, it won’t be your own.
Original link This article is sourced from the internet: A New Front in the North-South Korean Secret War: Upbit, North Korean Hackers’ “Nuclear ATM”?Recommended Articles Related: USDe’s 90 minutes: a misinterpreted incident of a broken anchor TL;DR Brief de-pegging, rapid recovery: On October 11, 2025, USDe briefly dropped to $0.65 on the Binance spot market, but this only lasted a few minutes. The de-pegging lasted approximately 90 minutes (between $0.75 and $0.98), with a trading volume exceeding 780 million tokens. The price fully stabilized to around $0.99 by 06:45 Beijing Time. Localized liquidity misalignment: Fluctuations were primarily concentrated on Binance. Price deviations on other major exchanges and decentralized exchanges (DEXs) like Bybit, Curve, and Uniswap were all within 0.3%, indicating a single point of liquidity imbalance rather than a systemic issue. Not the trigger for the market crash: BTC, ETH, and SOL led the decline at 04:45 Beijing time, triggering a chain reaction of liquidations. USDe’s price deviation is more like a secondary liquidity release rather… # Analysis# bitcoin# crypto# defi# ethereum# Exchange# Market# Token© Copyright NoticeThe copyright of the article belongs to the author, please do not reprint without permission. Pre ONDO leverages Binance Wallet to streamline the entire tokenized stock trading process in three steps. Next The Birth of the XT RWA Zone: Industry Turning Points Discussed at the AMA Session Related articles Crypto CEX spot trading volume hits a nine-month low, and the gap between institutions and retail investors intensifies 6086cf14eb90bc67ca4fc62b 26,384 1 The Monad airdrop, which was once a hot topic on the test network, is imminent. Do users need to complete tasks within a 6086cf14eb90bc67ca4fc62b 21,020 2 Story helped launch China’s first digital advertising RWA project, accelerating the issuance of non-standard assets unde 6086cf14eb90bc67ca4fc62b 30,056 1 Lombard, Chainlink, and Symbiotic partner to introduce BARD token utility through restaking and launch the first cross-c 6086cf14eb90bc67ca4fc62b 21,094 One-week token unlock: EIGEN’s unlock this week exceeds the circulating supply by 10%. 6086cf14eb90bc67ca4fc62b 15,427 2 Prediction Markets: Concepts, Mechanisms, and Arbitrage Strategies 6086cf14eb90bc67ca4fc62b 7,955 No comments You must be logged in to leave a comment! Login immediately No comments... Bee.com The world's largest Web3 portal Partners CoinCarp Binance CoinMarketCap CoinGecko Coinlive Armors Download Bee Network APP and start the web3 journey White Paper Roles FAQ © 2021—2026. All Rights Reserved. Privacy Policy | Terms of Services Download Bee Network APP and start the web3 journey The world's largest Web3 portal Partners CoinCarp Binance CoinMarketCap CoinGecko Coinlive Armors White Paper Roles FAQ © 2021—2026. All Rights Reserved. Privacy Policy | Terms of Services Search SearchInSiteOnChainSocialNews Hot to you: Airdrop Hunters Data Analysis Crypto Celebrities Trap Detector English 繁體中文 简体中文 日本語 Tiếng Việt العربية 한국어 Bahasa Indonesia हिन्दी اردو Русский English智能索引记录
-
2026-02-27 14:26:04
综合导航
成功
标题:先驱的拼音_先驱的意思_先驱的繁体_词组网
简介:词组网先驱频道,介绍先驱,先驱的拼音,先驱是什么意思,先驱的意思,先驱的繁体,先驱怎么读,先驱的近义词,先驱的反义词。
-
2026-02-27 13:51:39
综合导航
成功
标题:MYTOY2- Tim Paulsen
简介:Alright now I get what Brian was up to. I have been an MR2
-
2026-02-27 13:50:24
教育培训
成功
标题:高二英语A2暑假补习补课辅导班-上海新王牌培优
简介:新王牌培优是上海好的初高中辅导培训机构,创立于2005年,采用分层授课,小班化教学的辅导补课方式 ,是一家致力于初高中辅
-
2026-02-27 14:20:34
法律咨询
成功
标题:别墅网 - 别墅设计图
简介:别墅网专注提供最新别墅设计图纸、农村自建房全套施工图、3D别墅模型下载。涵盖现代、新中式、欧式等多种风格,专业设计师团队
-
2026-02-27 13:35:35
综合导航
成功
标题:考研复核分数几天能出结果?基本4天内出结果-高顿
简介: 考研复核分数几天能出结果?一般4日内能出结果,也有的学校是7日或11日,要看学校的规定,比如北京大部分学校就是4日内
-
2026-02-27 13:48:36
综合导航
成功
标题:Blog PIP - PIP Indianapolis, IN
简介:Track our weekly updates in interesting information with PIP
-
2026-02-27 13:39:16
教育培训
成功
标题:百无一能的意思解释_百无一能是什么意思-雄安文学网
简介:百无一能是什么意思?雄安文学网为您提供百无一能的意思解释、拼音、近反义词,以及百无一能成语接龙,供成语爱好者参考学习用。
-
2026-02-27 14:10:54
综合导航
成功
标题:Eskimo 24 Mou Official Website
简介:Our iconic mou eskimo range offers sophisticated colour, und
-
2026-02-27 13:17:12
综合导航
成功
标题:Surviving In The Woods - Play The Free Game Online
简介:Surviving In The Woods - click to play online. Surviving In
-
2026-02-27 14:26:36
综合导航
成功
标题:Jacuzzi Unlimited Michael Pulizzi Fire in the Hole EX7 Skateboard Comp – CCS
简介:Deck Construction:Traditional Maple,Board Shape:Popsicle,Dec
-
2026-02-27 12:56:12
综合导航
成功
标题:å
ç®çæ¼é³_å
ç®çææ_å
ç®çç¹ä½_è¯ç»ç½
简介:è¯ç»ç½å ç®é¢é,ä»ç»å ç®,å ç®çæ¼é³,å ç®æ¯
-
2026-02-27 13:34:08
综合导航
成功
标题:The domain name PFIL.COM.
简介:PFIL.COM is available for sale.
-
2026-02-27 13:59:35
综合导航
成功
标题:† Kennet2. World English Historical Dictionary
简介:† Kennet2. World English Historical Dictionary
-
2026-02-27 13:42:01
综合导航
成功
标题:GQR Innovative Talent Solutions for Strategic Growth · GQR
简介:Discover GQR
-
2026-02-27 13:57:19
综合导航
成功
标题:Roger Paucton
简介:1x.com is the world
-
2026-02-27 14:38:20
综合导航
成功
标题:杨柳木命与覆灯火命八字配婚吉凶如何?_一世迷命理网
简介:八字命理是一门深奥的学问,它通过分析个人的出生年月日时,结合五行相生相克的原则,来预测一个人的命运走势。合八字是一种常见
-
2026-02-27 14:27:12
综合导航
成功
标题:Craft Mobile Games Online - 4J.Com
简介:There are 21 Mobile games related to Craft on 4J.com. Click
-
2026-02-27 14:32:46
综合导航
成功
标题:Timothy Riffe Fish & Richardson
简介:Timothy W. Riffe’s practice emphasizes complex patent litiga
-
2026-02-27 12:36:03
综合导航
成功
标题:å®ä¹çæ¼é³_å®ä¹çææ_å®ä¹çç¹ä½_è¯ç»ç½
简介:è¯ç»ç½å®ä¹é¢é,ä»ç»å®ä¹,å®ä¹çæ¼é³,å®ä¹æ¯
-
2026-02-27 14:18:30
综合导航
成功
标题:Оборудование для пищевой промышленности в Киеве - купить на RIA.com
简介:Продажа оборудования для пищевой промышленности в Киеве недо
-
2026-02-27 13:18:58
教育培训
成功
标题:包粽子二年级作文(精选20篇)
简介:在日复一日的学习、工作或生活中,大家对作文都不陌生吧,作文根据写作时限的不同可以分为限时作文和非限时作文。你知道作文怎样
-
2026-02-27 14:27:41
综合导航
成功
标题:Schaeffler Germany
简介:Schaeffler has been driving forward groundbreaking invention
-
2026-02-27 14:25:48
综合导航
成功
标题:1.3二氯丙烯(混合/乳化/反式)生产厂家-批发价格-山东地六化学有限公司
简介:山东地六化学有限公司主要生产研发和销售醋酸、氯化铵、1.3反式、1,3-混合二氯丙烯系列(混合、乳化、反式)英文名:1,
-
2026-02-27 14:27:00
综合导航
成功
标题:Apple
简介:Discover the innovative world of Apple and shop everything i
-
2026-02-27 13:20:24
综合导航
成功
标题:Matthew Boldy with a Shorthanded Goal vs. Colorado Avalanche NHL.com
简介:Matthew Boldy (Minnesota Wild) with a Shorthanded Goal vs. C
-
2026-02-27 14:23:40
综合导航
成功
标题:KYK 김영귀환원수 알칼리이온수기 전문 브랜드
简介:47년 전통 대통령 훈장수훈 식약처 허가 알칼리이온수기로 4대 위장질환 개선 도움 가족 건강 지키는 알칼리
-
2026-02-27 14:12:23
综合导航
成功
标题:Eskimo Sneaker Kid Wool Fabric Mou Official Website
简介:The eskimo kids sneaker is updated with wool fabric that is
-
2026-02-27 12:46:14
综合导航
成功
标题:お問い合わせ - 森音楽教室
简介:お問い合わせフォームは24時間お受けいたします。2〜3日中にお返事いたします。4日以上経っても返信が無い場合、お電話にて
-
2026-02-27 12:38:17
综合导航
成功
标题:å¨å¸çæ¼é³_å¨å¸çææ_å¨å¸çç¹ä½_è¯ç»ç½
简介:è¯ç»ç½å¨å¸é¢é,ä»ç»å¨å¸,å¨å¸çæ¼é³,å¨å¸æ¯
-
2026-02-27 13:47:09
综合导航
成功
标题:湖南理工类985高校院校资讯_湖南理工类985高校考研院校排名-高顿考研
简介:湖南理工类985高校研究生院校查询频道,为广大考生免费提供考研院校信息查询搜索服务,您可以按地域、院校类型、院校属性、院