A New Front in the North-South Korean Secret War: Upbit, North Korean Hackers’ “Nuclear ATM”? | Bee Network
Original author: Deep Tide TechFlow
The market rebounded, but the exchange was hacked again.
On November 27, Upbit, South Korea’s largest 暗号currency exchange, confirmed a security breach that resulted in the loss of approximately 54 billion won (about US$36.8 million) in assets.
At 04:42 AM Seoul time (KST) on November 27, while most South Korean traders were still asleep, Upbit’s Solana hot wallet address experienced an unusually large outflow of funds.
According to on-chain monitoring data from security organizations such as SlowMist, the attackers did not use a single asset transfer method, but instead carried out a “clear-out” plunder of Upbit’s assets on the Solana chain.
The stolen assets included not only the core token ソル and the stablecoin USDC , but also almost all the mainstream SPL standard tokens within the Solana ecosystem.
List of stolen assets (partial):
DeFi/Infrastructure : JUP (Jupiter), RAY (Raydium), PYTH (Pyth Network), JTO (Jito), RENDER, IO, etc. Memes/community-related : BONK, WIF, MOODENG, PENGU, MEW, TRUMP, etc. Other projects include: ACS, DRIFT, ZETA, SONIC, etc.This sweeping attack suggests that the attackers likely gained access to the private key of Upbit’s hot wallet for the Solana ecosystem, or that the signing server was directly controlled, enabling them to authorize the transfer of all SPL tokens under that wallet.
For Upbit, a giant that holds 80% of the South Korean market share and prides itself on having the highest security level certification from the Korea Internet & Security Agency (KISA), this is undoubtedly a painful breach of its defenses.
However, this is not the first time that a South Korean stock exchange has been hacked.
If we extend the timeline, we will find that the South Korean crypto market has actually been targeted by hackers, especially North Korean hackers, for the past eight years.
The South Korean cryptocurrency market is not only the world’s most frenzied casino for retail investors, but also the most convenient “cash cow” for North Korean hackers.
Eight years of North-South Korean conflict, a stolen chronicleFrom early brute-force attacks to later social engineering infiltrations, the attack methods have continuously evolved, and the history of suffering for Korean stock exchanges has also been prolonged.
Total losses: Approximately $200 million (based on the price at the time of the theft; if calculated at current prices, it exceeds $1.2 billion, of which the 342,000 ETH stolen from Upbit in 2019 alone are now worth over $1 billion).
2017: The Wilderness Era – Hackers Target Employee Computers2017 marked the beginning of the crypto bull market, but also the start of a nightmare for South Korean exchanges.
That year, Bithumb, South Korea’s largest online exchange, was the first to be affected. In June, hackers broke into a Bithumb employee’s personal computer, stealing the personal information of approximately 31,000 users. They then used this data to launch targeted phishing attacks, stealing about $32 million. Subsequent investigations revealed that the employee’s computer contained unencrypted customer data, and the company hadn’t even installed basic security updates.
This exposed the rudimentary state of security management at the South Korean stock exchange at the time, where even basic principles like “don’t store customer data on personal computers” were not established.
Even more significant was the collapse of the mid-sized exchange Youbit. This exchange suffered two devastating blows within a year: losing nearly 4,000 ビットコインs (approximately $5 million) in April, and then having 17% of its assets stolen in December. Overwhelmed, Youbit declared bankruptcy, with users only able to withdraw 75% of their balance, the remainder awaiting a lengthy liquidation process.
Following the Youbit incident, the South Korean Internet Security Agency (KISA) publicly accused North Korea of being behind it for the first time. This also sent a signal to the market:
The exchanges are no longer dealing with ordinary cyber thieves, but with state-sponsored hacking groups with geopolitical motives.
2018: The Hot Wallet HeistIn June 2018, the South Korean market suffered a series of severe blows.
On June 10, mid-sized exchange Coinrail was attacked, suffering losses exceeding $40 million. Unlike previous attacks, this time the hackers primarily targeted then-popular ICO tokens (such as Pundi X’s NPXS), rather than Bitcoin or Ethereum. Following the news, the price of Bitcoin briefly plummeted by over 10%, and the entire crypto market lost over $40 billion in market capitalization within two days.
Just ten days later, Bithumb, a leading South Korean exchange, also suffered a breach, with approximately $31 million worth of XRP and other tokens stolen from its hot wallet. Ironically, just days before the attack, Bithumb had announced on Twitter that it was “transferring assets to cold wallets to upgrade its security system.”
This is the third time Bithumb has been hacked in a year and a half.
The series of defaults severely damaged market confidence. Following the incident, the South Korean Ministry of Science and Technology conducted a security audit of 21 domestic exchanges, finding that only 7 passed all 85 checks, while the remaining 14 were “at risk of being exposed to hacker attacks at any time,” with 12 of them having serious vulnerabilities in their cold wallet management.
2019: Upbit’s 342,000 ETH stolenOn November 27, 2019, Upbit, South Korea’s largest cryptocurrency exchange, suffered what was then the largest single theft in the country’s history.
Hackers took advantage of exchanges’ wallet cleanup to transfer 342,000 ETH in a single transaction. Instead of immediately dumping the funds, they used “peel chain” technology to break the money down into countless small transactions, transferring it layer by layer until it finally ended up in dozens of non-KYC exchanges and mixers.
The investigation revealed that 57% of the stolen ETH was exchanged for Bitcoin at a discount of 2.5% below market price on exchanges suspected to be operated by North Korea, while the remaining 43% was laundered through 51 exchanges in 13 countries.
It wasn’t until November 2024, five years later, that South Korean police officially confirmed the case was perpetrated by the North Korean hacking groups Lazarus Group and Andariel. Investigators identified the attackers through IP tracking, financial flow analysis, and the North Korean-specific term “흘한일” (meaning “not important”) appearing in the attack code.
South Korean authorities collaborated with the US FBI to track the assets, and after four years of legal proceedings, finally recovered 4.8 bitcoins (approximately 600 million won) from a Swiss exchange, which were then returned to Upbit in October 2024.
However, compared to the total amount stolen, the amount recovered is almost negligible.
2023: GDAC EventOn April 9, 2023, mid-sized exchange GDAC suffered an attack, losing approximately $13 million—23% of its total assets under custody.
The stolen assets included approximately 61 BTC, 350 ETH, 10 million WEMIX tokens, and 220,000 USDT. The hackers took control of GDAC’s hot wallet and quickly laundered some of the funds using the Tornado Cash mixer.
2025: Six years later, on the same day, Upbit fell victim again.On the same day six years ago (November 27), Upbit lost 342,000 ETH.
History has repeated itself. At 4:42 a.m., Upbit’s Solana hot wallet experienced an unusual outflow of funds, with approximately 54 billion won (US$36.8 million) transferred to an unknown address.
Following the Upbit incident in 2019, South Korea officially implemented the Specific Financial Information Act (Special Financial Information Act) in 2020, requiring all exchanges to obtain ISMS (Information Security Management System) certification and open real-name accounts with banks. Many smaller exchanges that failed to meet the requirements were forced to exit the market, shrinking the industry landscape from a “hundred-exchange battle” to one dominated by a few giants. Upbit, backed by resources from the Kakao group and having obtained certification, once held a market share exceeding 80%.
However, six years of compliance efforts did not save Upbit from this crisis.
As of press time, Upbit has announced that it will fully compensate users for their losses with its own assets, but the company has not yet released detailed information regarding the attacker’s identity and the specific attack path.
Kimchi premium, state-owned hackers and nuclear weaponsThe frequent hacking of South Korean stock exchanges is not simply a matter of technological incompetence, but a tragic reflection of geopolitics.
In a highly centralized market with extremely high liquidity premiums and a unique geographical location, the Korean exchange is essentially using the security budget of a commercial company to fight against a national-level hacking force with nuclear deterrence aspirations.
This unit has a name: Lazarus Group.
Lazarus, belonging to the North Korean Reconnaissance General Bureau (RGB), is one of Pyongyang’s most elite cyber warfare forces.
Before turning to cryptocurrencies, they had already proven their strength in the traditional financial sector.
In 2014, they breached Sony Pictures; in 2016, they stole $81 million from the Central Bank of Bangladesh; and in 2017, they orchestrated the WannaCry ransomware attack that affected 150 countries.
Starting in 2017, Lazarus shifted its focus to the cryptocurrency field. The reason is simple:
Compared to traditional banks, cryptocurrency exchanges are more loosely regulated, have inconsistent security standards, and once they succeed, funds can be quickly transferred across borders via on-chain transfers, bypassing international sanctions.
South Korea happens to be the ideal hunting ground.
First, South Korea is a natural target for geopolitical confrontation. For North Korea, attacking South Korean companies not only provides access to funds but also creates chaos in an “enemy country,” achieving two goals at once.
Secondly, the premium on cryptocurrencies reflects a lucrative pool of funds. South Korean retail investors are world-renowned for their fervor for cryptocurrencies, and the premium is essentially a result of supply falling short of demand, with large amounts of Korean won flooding in to chase limited crypto assets.
This means that South Korean exchanges’ hot wallets hold far more liquidity than other markets. For hackers, this is a gold mine.
Third, they had an advantage in language. Lazarus’ attacks didn’t rely solely on brute-force techniques. They were adept at social engineering, such as forging job postings, sending phishing emails, and impersonating customer service to obtain verification codes.
North and South Korea share the same language and culture, with zero language barrier, which significantly increases the success rate of targeted phishing attacks against South Korean employees and users.
Where did the stolen money go? That’s probably the most interesting part of the story.
According to a UN report and tracking by several blockchain analytics firms, the cryptocurrency stolen by Lazarus ultimately flowed into North Korea’s nuclear weapons and ballistic missile programs.
以前、 Reuters cited a confidential UN report stating that North Korea used stolen cryptocurrency funds to help fund its missile development program.
In May 2023, Anne Neuberger, the White House Deputy National Security Advisor, publicly stated that about 50% of the funding for North Korea’s missile program came from cyberattacks and cryptocurrency theft; this figure was a further increase from the “about one-third” she gave in July 2022.
In other words, every time a South Korean stock exchange is hacked, it may indirectly contribute to the development of nuclear warheads on the other side of the 38th parallel.
Meanwhile, the money laundering methods are quite sophisticated: stolen assets are first split into countless small transactions using “stripping chain” technology, then their origin is obscured by coin mixers (such as Tornado Cash and Sinbad), then they are exchanged for Bitcoin at a discounted price through a North Korean-built exchange, and finally exchanged for fiat currency through underground channels in China and Russia.
In 2019, South Korean police officially released the results of their investigation into the theft of 342,000 ETH from Upbit. The investigation revealed that 57% of the stolen ETH was exchanged for Bitcoin at 2.5% below market value on three exchanges suspected to be operated by North Korea, while the remaining 43% was laundered through 51 exchanges in 13 countries. The entire process lasted several years, and the vast majority of the funds have yet to be recovered.
This may be the fundamental dilemma facing South Korean stock exchanges:
On one side is Lazarus, a hacker force supported by national resources, capable of operating 24/7, and willing to invest any amount of money; on the other side are commercial companies like Upbit and Bithumb.
Even top-tier exchanges that have passed censorship are still powerless when faced with state-sponsored high-persistence threat attacks.
It’s not just a problem in South Korea.Eight years, more than ten attacks, and approximately $200 million in losses—if you only consider this local news in South Korea’s crypto industry, you’re missing the bigger picture.
The ordeal of South Korean exchanges is a preview of the crypto industry’s struggle against a national-level adversary.
North Korea is the most conspicuous player, but not the only one. Certain high-threat Russian attack groups have been linked to multiple DeFi attacks, Iranian hackers have launched attacks against Israeli crypto companies, and North Korea itself has long since expanded its battlefield from South Korea to the global arena, such as the $1.5 billion Bybit attack in 2025 and the $625 million Ronin attack in 2022, with victims across continents.
The crypto industry has a structural paradox: everything must go through a centralized entry point.
No matter how secure the blockchain itself is, users’ assets will ultimately have to flow through “choke points” such as exchanges, cross-chain bridges, and hot wallets.
These nodes, which concentrate massive amounts of funds, are operated by commercial companies with limited budgets; for state-sponsored hackers, this is a highly efficient hunting ground.
The resources of the attacking and defending sides are fundamentally unequal; Lazarus can fail a hundred times, while the exchange can only fail once.
The kimchi premium will continue to attract global arbitrageurs and local retail investors. Lazarus will not stop just because it has been exposed. The battle between South Korean exchanges and state-sponsored hackers is far from over.
I just hope that next time your money gets stolen, it won’t be your own.
オリジナルリンク この記事はインターネットから得たものです。 A New Front in the North-South Korean Secret War: Upbit, North Korean Hackers’ “Nuclear ATM”?Recommended Articles Related: USDe’s 90 minutes: a misinterpreted incident of a broken anchor TL;DR Brief de-pegging, rapid recovery: On October 11, 2025, USDe briefly dropped to $0.65 on the Binance spot market, but this only lasted a few minutes. The de-pegging lasted approximately 90 minutes (between $0.75 and $0.98), with a trading volume exceeding 780 million tokens. The price fully stabilized to around $0.99 by 06:45 Beijing Time. Localized liquidity misalignment: Fluctuations were primarily concentrated on Binance. Price deviations on other major exchanges and decentralized exchanges (DEXs) like Bybit, Curve, and Uniswap were all within 0.3%, indicating a single point of liquidity imbalance rather than a systemic issue. Not the trigger for the market crash: BTC, ETH, and SOL led the decline at 04:45 Beijing time, triggering a chain reaction of liquidations. USDe’s price deviation is more like a secondary liquidity release rather… #分析#ビットコイン#暗号# デフィ# イーサリアム# 交換# マーケット#トークン© 版权声明配列 上一篇 ONDO leverages Binance Wallet to streamline the entire tokenized stock trading process in three steps. 下一篇 XT RWAゾーンの誕生:AMAセッションで語られた業界の転換点 相关文章 Ten years ago, Pantera bought 2% of the worlds BTC at a minimum of $65. What is the founder of Pantera thinking today? 6086cf14eb90bc67ca4fc62b 35,075 2 US macro data is in line with expectations, the market continues before the rate cut, and long-term investors officially 6086cf14eb90bc67ca4fc62b 27,456 1 Alpha Arena Tips Revealed: DeepSeek’s Secret to a 42% Profit in Two Days 6086cf14eb90bc67ca4fc62b 20,363 Trump’s clash with JPMorgan Chase has dragged Bitcoin and MSTR into the fray. 6086cf14eb90bc67ca4fc62b 15,085 Debate between bulls and bears: Is CRCL, the leading stablecoin, worth buying? Why are high-growth financial reports failing to boost its stock price? 6086cf14eb90bc67ca4fc62b 15,884 The global market after a 43-day data vacuum: AI stalls, Crypto fluctuates, what’s next in December? 6086cf14eb90bc67ca4fc62b 19,224 2 コメントはありません コメントを残すにはログインが必要です! すぐにログイン コメントはありません... 最新記事 UniSat Releases Phase Updates and Upgrades, Continuously Building the Bitcoin Ecosystem 2時間前 299 Jack Dorsey’s Company: 4,000 White-Collar Workers Are Being Replaced by AI 2時間前 270 Latest Stablecoin Report: Real Distribution and Flow Are Far More Important Than Supply 2時間前 240 Sui DeFi’s “Three-Engine” Revolution: How New Capabilities, New Assets, and New Programs Are Building the Future of On-Chain Finance? 2時間前 236 On-chain Investigator ZachXBT Confirms: Axiom Employees Exploited Internal Privileges for Insider Trading 2時間前 234 人気のウェブサイトTempoGAIBLighterグライダープランクレイリーズBCPoker(ビーシーポーカーカイトAI Bee.com 世界最大の Web3 ポータル パートナー コインカープ バイナンス コインマーケットキャップ CoinGecko コインライブ 鎧 Bee Network APP をダウンロードして、Web3 の旅を始めましょう 白書 役割 よくある質問 © 2021-2026.無断複写・転載を禁じます。. プライバシーポリシー | 利用規約 Bee Networkアプリをダウンロード そしてWeb3の旅を始めましょう 世界最大のWeb3ポータル パートナー CoinCarp Binance CoinMarketCap CoinGecko Coinlive Armors 白書 役割 よくある質問 © 2021-2026.無断複写・転載を禁じます。. プライバシーポリシー | 利用規約 検索 検索インサイトオンチェーン社交ニュース 热门推荐: エアドロップハンター データ分析 クリプトセレブリティ トラップディテクタ 日本語 English 繁體中文 简体中文 Tiếng Việt العربية 한국어 Bahasa Indonesia हिन्दी اردو Русский 日本語智能索引记录
-
2026-02-27 12:54:56
综合导航
成功
标题:Incredible Sprunki Music Box 🎶 Online Casual Game
简介:Tap, swipe, and groove to the beat. Choose different charact
-
2026-02-27 16:26:11
综合导航
成功
标题:EA Gives Back støtter lokal skole i Shanghai
简介:I forbindelse med EA Gives Back fik Shanghai-kontoret 120 me
-
2026-02-27 21:34:08
教育培训
成功
标题:邯郸有没有专门做写字楼的网站博达网站建设流程-北京孤凡电子商务有限公司
简介:邯郸有没有专门做写字楼的网站,博达网站建设流程,平面设计师培训,宣传册设计样本浙大疏锦行 一、图像数据介绍 1.1灰度图
-
2026-02-27 13:29:44
综合导航
成功
标题:EA Play Games - Video Game Subscription Service - Electronic Arts
简介:Get more from your games with an EA Play membership. Get exc
-
2026-02-27 15:59:53
综合导航
成功
标题:胆石症疼痛特点 - 云大夫
简介:胆石症的症状有上腹疼痛、畏寒发热、黄疸等。胆结石发作的疼痛特点主要是胆绞痛,且疼痛比较剧烈,又容易向右肩背放射。胆石症发
-
2026-02-28 04:56:58
综合导航
成功
标题:Environnement et changements climatiques PwC Canada
简介:Des solutions sur mesure pour la décarbonisation et la durab
-
2026-02-28 05:22:47
游戏娱乐
成功
标题:暗喻幻想烹饪前要做什么-烹饪简单攻略分享_3DM单机
简介:《暗喻幻想:ReFantazio》中烹饪是一个含了食材收集、料理制作及战斗增益的重要游戏元素,然而很多玩家不知道烹饪前
-
2026-02-28 04:43:29
综合导航
成功
标题:18luck新利官网利app-你玩乐的的好帮手
简介:18luck新利官网专注于为玩家打造无忧的游戏环境。其官方应用程序以简洁流畅的设计、便捷的操作体验和丰富的游戏内容,成为
-
2026-02-27 13:49:38
数码科技
成功
标题:电器网站建设流程建网站要什么工做人员-北京孤凡电子商务有限公司
简介:电器网站建设流程,建网站要什么工做人员,桂林市天气预报7天,百度官方营销推广平台文章目录一、程序分析题(20分)项目结构
-
2026-02-27 22:49:17
视频影音
成功
标题:福彩网站开发企业网搭建-北京孤凡电子商务有限公司
简介:福彩网站开发,企业网搭建,网站怎么增加关键词库,河北高端网站定制公司西门子S7-1200/1500动态加密功能块程序#x
-
2026-02-28 02:20:33
综合导航
成功
标题:Author: Dan D. Kohane Law.com
简介:Dan D. Kohane
-
2026-02-28 02:16:52
综合导航
成功
标题:ILSC Language Schools Programs Junior Residences CISS Global Leadership Camp at UBC
简介:The CISS UBC Global Leadership Camp for youth age 12-17 take
-
2026-02-28 07:14:23
数码科技
成功
标题:Ultra-fast recovery epitaxial diode
简介:江苏捷捷微电子股份有限公司
-
2026-02-27 17:31:45
综合导航
成功
标题:Energy, utilities and resources PwC
简介:PwC helps the energy and resources industry navigate transit
-
2026-02-27 16:03:45
综合导航
成功
标题:NVE Corp - Sensor Boards and Eval Kits
简介:This is Sensor Boards and Eval Kits.
-
2026-02-27 19:59:18
综合导航
成功
标题:Dealer Locator Dealer Locator MTX - Serious About Sound®
简介:Find an MTX Dealer near you, or find an online retailer.
-
2026-02-28 03:04:49
综合导航
成功
标题:Greystone College Canada Programs Attestation of College Studies, Digital Marketing Specialist
简介:The AEC, Digital Marketing Specialist with Practicum provide
-
2026-02-28 03:21:08
综合导航
成功
标题:Sustentative. World English Historical Dictionary
简介:Sustentative. World English Historical Dictionary
-
2026-02-28 05:09:38
综合导航
成功
标题:Little Devil Inside Release Date Targeting Winter 2022 - PlayStation Universe
简介:The Little Devil Inside release is targeting winter 2022, ac
-
2026-02-27 23:27:38
综合导航
成功
标题:Weekly theme Movies winners
简介:1x.com is the world
-
2026-02-27 22:52:31
综合导航
成功
标题:property protocol Node.js url module Bun
简介:API documentation for property node:url.Url.protocol Bun
-
2026-02-28 06:07:38
综合导航
成功
标题:åéªçæ¼é³_åéªçææ_åéªçç¹ä½_è¯ç»ç½
简介:è¯ç»ç½åéªé¢é,ä»ç»åéª,åéªçæ¼é³,åéªæ¯
-
2026-02-28 06:01:06
综合导航
成功
标题:Elena Raceala
简介:1x.com is the world
-
2026-02-27 17:26:48
综合导航
成功
标题:Free Alphabet Coloring Page - Vase, Volcano, Vegetables in Letter V EDU.COM
简介:Download our free printable alphabet coloring page featuring
-
2026-02-27 22:47:49
综合导航
成功
标题:GRM $2006 Challenge here I come! [Archive] - Toyota MR2 Message Board
简介:I
-
2026-02-27 21:29:41
综合导航
成功
标题:Gen-Z Influencer Freed from Abuse, Witchcraft, and Porn Addiction CBN
简介:Gen-Z social media influencer Yamilexis Fernandez broke the
-
2026-02-28 03:35:05
游戏娱乐
成功
标题:魔法王座神耀1升8进阶数据是多少 需要多少进阶丹_欢乐园游戏
简介:魔法王座内神耀可以给玩家们提供大量的战斗力,而且还有伤害减免的效果加成,这个效果在进阶后更加可观,下面小编就给大家带来魔
-
2026-02-27 20:25:14
综合导航
成功
标题:360度下级绩效评估表-果果圈模板
简介:360度下级绩效评估表,适用于员工绩效考核,欢迎大家下载使用。
-
2026-02-27 13:32:38
综合导航
成功
标题:Homepage CBN
简介:The Christian Broadcasting Network is a global ministry comm
-
2026-02-27 19:45:36
综合导航
成功
标题:Sagesse pour les hommes – Conseils avisés pour se fortifier – Excelsis
简介:Le livre Sagesse pour les hommes est né de ma passion de voi