A New Front in the North-South Korean Secret War: Upbit, North Korean Hackers’ “Nuclear ATM”? | Bee Network
Original author: Deep Tide TechFlow
The market rebounded, but the exchange was hacked again.
On November 27, Upbit, South Korea’s largest криптовалютаcurrency exchange, confirmed a security breach that resulted in the loss of approximately 54 billion won (about US$36.8 million) in assets.
At 04:42 AM Seoul time (KST) on November 27, while most South Korean traders were still asleep, Upbit’s Solana hot wallet address experienced an unusually large outflow of funds.
According to on-chain monitoring data from security organizations such as SlowMist, the attackers did not use a single asset transfer method, but instead carried out a “clear-out” plunder of Upbit’s assets on the Solana chain.
The stolen assets included not only the core token SOL and the stablecoin USDC , but also almost all the mainstream SPL standard tokens within the Solana ecosystem.
List of stolen assets (partial):
DeFi/Infrastructure : JUP (Jupiter), RAY (Raydium), PYTH (Pyth Network), JTO (Jito), RENDER, IO, etc. Memes/community-related : BONK, WIF, MOODENG, PENGU, MEW, TRUMP, etc. Other projects include: ACS, DRIFT, ZETA, SONIC, etc.This sweeping attack suggests that the attackers likely gained access to the private key of Upbit’s hot wallet for the Solana ecosystem, or that the signing server was directly controlled, enabling them to authorize the transfer of all SPL tokens under that wallet.
For Upbit, a giant that holds 80% of the South Korean market share and prides itself on having the highest security level certification from the Korea Internet & Security Agency (KISA), this is undoubtedly a painful breach of its defenses.
However, this is not the first time that a South Korean stock exchange has been hacked.
If we extend the timeline, we will find that the South Korean crypto market has actually been targeted by hackers, especially North Korean hackers, for the past eight years.
The South Korean cryptocurrency market is not only the world’s most frenzied casino for retail investors, but also the most convenient “cash cow” for North Korean hackers.
Eight years of North-South Korean conflict, a stolen chronicleFrom early brute-force attacks to later social engineering infiltrations, the attack methods have continuously evolved, and the history of suffering for Korean stock exchanges has also been prolonged.
Total losses: Approximately $200 million (based on the price at the time of the theft; if calculated at current prices, it exceeds $1.2 billion, of which the 342,000 ETH stolen from Upbit in 2019 alone are now worth over $1 billion).
2017: The Wilderness Era – Hackers Target Employee Computers2017 marked the beginning of the crypto bull market, but also the start of a nightmare for South Korean exchanges.
That year, Bithumb, South Korea’s largest online exchange, was the first to be affected. In June, hackers broke into a Bithumb employee’s personal computer, stealing the personal information of approximately 31,000 users. They then used this data to launch targeted phishing attacks, stealing about $32 million. Subsequent investigations revealed that the employee’s computer contained unencrypted customer data, and the company hadn’t even installed basic security updates.
This exposed the rudimentary state of security management at the South Korean stock exchange at the time, where even basic principles like “don’t store customer data on personal computers” were not established.
Even more significant was the collapse of the mid-sized exchange Youbit. This exchange suffered two devastating blows within a year: losing nearly 4,000 bitcoins (approximately $5 million) in April, and then having 17% of its assets stolen in December. Overwhelmed, Youbit declared bankruptcy, with users only able to withdraw 75% of their balance, the remainder awaiting a lengthy liquidation process.
Following the Youbit incident, the South Korean Internet Security Agency (KISA) publicly accused North Korea of being behind it for the first time. This also sent a signal to the market:
The exchanges are no longer dealing with ordinary cyber thieves, but with state-sponsored hacking groups with geopolitical motives.
2018: The Hot Wallet HeistIn June 2018, the South Korean market suffered a series of severe blows.
On June 10, mid-sized exchange Coinrail was attacked, suffering losses exceeding $40 million. Unlike previous attacks, this time the hackers primarily targeted then-popular ICO tokens (such as Pundi X’s NPXS), rather than Bitcoin or Ethereum. Following the news, the price of Bitcoin briefly plummeted by over 10%, and the entire crypto market lost over $40 billion in market capitalization within two days.
Just ten days later, Bithumb, a leading South Korean exchange, also suffered a breach, with approximately $31 million worth of XRP and other tokens stolen from its hot wallet. Ironically, just days before the attack, Bithumb had announced on Twitter that it was “transferring assets to cold wallets to upgrade its security system.”
This is the third time Bithumb has been hacked in a year and a half.
The series of defaults severely damaged market confidence. Following the incident, the South Korean Ministry of Science and Technology conducted a security audit of 21 domestic exchanges, finding that only 7 passed all 85 checks, while the remaining 14 were “at risk of being exposed to hacker attacks at any time,” with 12 of them having serious vulnerabilities in their cold wallet management.
2019: Upbit’s 342,000 ETH stolenOn November 27, 2019, Upbit, South Korea’s largest cryptocurrency exchange, suffered what was then the largest single theft in the country’s history.
Hackers took advantage of exchanges’ wallet cleanup to transfer 342,000 ETH in a single transaction. Instead of immediately dumping the funds, they used “peel chain” technology to break the money down into countless small transactions, transferring it layer by layer until it finally ended up in dozens of non-KYC exchanges and mixers.
The investigation revealed that 57% of the stolen ETH was exchanged for Bitcoin at a discount of 2.5% below market price on exchanges suspected to be operated by North Korea, while the remaining 43% was laundered through 51 exchanges in 13 countries.
It wasn’t until November 2024, five years later, that South Korean police officially confirmed the case was perpetrated by the North Korean hacking groups Lazarus Group and Andariel. Investigators identified the attackers through IP tracking, financial flow analysis, and the North Korean-specific term “흘한일” (meaning “not important”) appearing in the attack code.
South Korean authorities collaborated with the US FBI to track the assets, and after four years of legal proceedings, finally recovered 4.8 bitcoins (approximately 600 million won) from a Swiss exchange, which were then returned to Upbit in October 2024.
However, compared to the total amount stolen, the amount recovered is almost negligible.
2023: GDAC EventOn April 9, 2023, mid-sized exchange GDAC suffered an attack, losing approximately $13 million—23% of its total assets under custody.
The stolen assets included approximately 61 BTC, 350 ETH, 10 million WEMIX tokens, and 220,000 USDT. The hackers took control of GDAC’s hot wallet and quickly laundered some of the funds using the Tornado Cash mixer.
2025: Six years later, on the same day, Upbit fell victim again.On the same day six years ago (November 27), Upbit lost 342,000 ETH.
History has repeated itself. At 4:42 a.m., Upbit’s Solana hot wallet experienced an unusual outflow of funds, with approximately 54 billion won (US$36.8 million) transferred to an unknown address.
Following the Upbit incident in 2019, South Korea officially implemented the Specific Financial Information Act (Special Financial Information Act) in 2020, requiring all exchanges to obtain ISMS (Information Security Management System) certification and open real-name accounts with banks. Many smaller exchanges that failed to meet the requirements were forced to exit the market, shrinking the industry landscape from a “hundred-exchange battle” to one dominated by a few giants. Upbit, backed by resources from the Kakao group and having obtained certification, once held a market share exceeding 80%.
However, six years of compliance efforts did not save Upbit from this crisis.
As of press time, Upbit has announced that it will fully compensate users for their losses with its own assets, but the company has not yet released detailed information regarding the attacker’s identity and the specific attack path.
Kimchi premium, state-owned hackers and nuclear weaponsThe frequent hacking of South Korean stock exchanges is not simply a matter of technological incompetence, but a tragic reflection of geopolitics.
In a highly centralized market with extremely high liquidity premiums and a unique geographical location, the Korean exchange is essentially using the security budget of a commercial company to fight against a national-level hacking force with nuclear deterrence aspirations.
This unit has a name: Lazarus Group.
Lazarus, belonging to the North Korean Reconnaissance General Bureau (RGB), is one of Pyongyang’s most elite cyber warfare forces.
Before turning to cryptocurrencies, they had already proven their strength in the traditional financial sector.
In 2014, they breached Sony Pictures; in 2016, they stole $81 million from the Central Bank of Bangladesh; and in 2017, they orchestrated the WannaCry ransomware attack that affected 150 countries.
Starting in 2017, Lazarus shifted its focus to the cryptocurrency field. The reason is simple:
Compared to traditional banks, cryptocurrency exchanges are more loosely regulated, have inconsistent security standards, and once they succeed, funds can be quickly transferred across borders via on-chain transfers, bypassing international sanctions.
South Korea happens to be the ideal hunting ground.
First, South Korea is a natural target for geopolitical confrontation. For North Korea, attacking South Korean companies not only provides access to funds but also creates chaos in an “enemy country,” achieving two goals at once.
Secondly, the premium on cryptocurrencies reflects a lucrative pool of funds. South Korean retail investors are world-renowned for their fervor for cryptocurrencies, and the premium is essentially a result of supply falling short of demand, with large amounts of Korean won flooding in to chase limited crypto assets.
This means that South Korean exchanges’ hot wallets hold far more liquidity than other markets. For hackers, this is a gold mine.
Third, they had an advantage in language. Lazarus’ attacks didn’t rely solely on brute-force techniques. They were adept at social engineering, such as forging job postings, sending phishing emails, and impersonating customer service to obtain verification codes.
North and South Korea share the same language and culture, with zero language barrier, which significantly increases the success rate of targeted phishing attacks against South Korean employees and users.
Where did the stolen money go? That’s probably the most interesting part of the story.
According to a UN report and tracking by several blockchain analytics firms, the cryptocurrency stolen by Lazarus ultimately flowed into North Korea’s nuclear weapons and ballistic missile programs.
Previously, Reuters cited a confidential UN report stating that North Korea used stolen cryptocurrency funds to help fund its missile development program.
In May 2023, Anne Neuberger, the White House Deputy National Security Advisor, publicly stated that about 50% of the funding for North Korea’s missile program came from cyberattacks and cryptocurrency theft; this figure was a further increase from the “about one-third” she gave in July 2022.
In other words, every time a South Korean stock exchange is hacked, it may indirectly contribute to the development of nuclear warheads on the other side of the 38th parallel.
Meanwhile, the money laundering methods are quite sophisticated: stolen assets are first split into countless small transactions using “stripping chain” technology, then their origin is obscured by coin mixers (such as Tornado Cash and Sinbad), then they are exchanged for Bitcoin at a discounted price through a North Korean-built exchange, and finally exchanged for fiat currency through underground channels in China and Russia.
In 2019, South Korean police officially released the results of their investigation into the theft of 342,000 ETH from Upbit. The investigation revealed that 57% of the stolen ETH was exchanged for Bitcoin at 2.5% below market value on three exchanges suspected to be operated by North Korea, while the remaining 43% was laundered through 51 exchanges in 13 countries. The entire process lasted several years, and the vast majority of the funds have yet to be recovered.
This may be the fundamental dilemma facing South Korean stock exchanges:
On one side is Lazarus, a hacker force supported by national resources, capable of operating 24/7, and willing to invest any amount of money; on the other side are commercial companies like Upbit and Bithumb.
Even top-tier exchanges that have passed censorship are still powerless when faced with state-sponsored high-persistence threat attacks.
It’s not just a problem in South Korea.Eight years, more than ten attacks, and approximately $200 million in losses—if you only consider this local news in South Korea’s crypto industry, you’re missing the bigger picture.
The ordeal of South Korean exchanges is a preview of the crypto industry’s struggle against a national-level adversary.
North Korea is the most conspicuous player, but not the only one. Certain high-threat Russian attack groups have been linked to multiple DeFi attacks, Iranian hackers have launched attacks against Israeli crypto companies, and North Korea itself has long since expanded its battlefield from South Korea to the global arena, such as the $1.5 billion Bybit attack in 2025 and the $625 million Ronin attack in 2022, with victims across continents.
The crypto industry has a structural paradox: everything must go through a centralized entry point.
No matter how secure the blockchain itself is, users’ assets will ultimately have to flow through “choke points” such as exchanges, cross-chain bridges, and hot wallets.
These nodes, which concentrate massive amounts of funds, are operated by commercial companies with limited budgets; for state-sponsored hackers, this is a highly efficient hunting ground.
The resources of the attacking and defending sides are fundamentally unequal; Lazarus can fail a hundred times, while the exchange can only fail once.
The kimchi premium will continue to attract global arbitrageurs and local retail investors. Lazarus will not stop just because it has been exposed. The battle between South Korean exchanges and state-sponsored hackers is far from over.
I just hope that next time your money gets stolen, it won’t be your own.
Оригинальная ссылка Эта статья взята из интернета: A New Front in the North-South Korean Secret War: Upbit, North Korean Hackers’ “Nuclear ATM”?Recommended Articles Related: USDe’s 90 minutes: a misinterpreted incident of a broken anchor TL;DR Brief de-pegging, rapid recovery: On October 11, 2025, USDe briefly dropped to $0.65 on the Binance spot market, but this only lasted a few minutes. The de-pegging lasted approximately 90 minutes (between $0.75 and $0.98), with a trading volume exceeding 780 million tokens. The price fully stabilized to around $0.99 by 06:45 Beijing Time. Localized liquidity misalignment: Fluctuations were primarily concentrated on Binance. Price deviations on other major exchanges and decentralized exchanges (DEXs) like Bybit, Curve, and Uniswap were all within 0.3%, indicating a single point of liquidity imbalance rather than a systemic issue. Not the trigger for the market crash: BTC, ETH, and SOL led the decline at 04:45 Beijing time, triggering a chain reaction of liquidations. USDe’s price deviation is more like a secondary liquidity release rather… Анализ ## биткоин# crypto# defi# ethereumОбмен #Рынок #Токен #© Copyright NoticeМассив Pre ONDO leverages Binance Wallet to streamline the entire tokenized stock trading process in three steps. Next The Birth of the XT RWA Zone: Industry Turning Points Discussed at the AMA Session Related articles ГорячаяEthereum’s AI Transformation Moment: What Projects Are Worth Watching Under the ERC-8004 Standard? 6086cf14eb90bc67ca4fc62b 8 561 1 Bitcoin Briefly Fell Below $72,000, How Much Faith Remains in the Crypto Space? 6086cf14eb90bc67ca4fc62b 6 861 1 Polymarket 2025 Six Profit Models In-Depth Report: Starting with 95 Million On-Chain Transactions 6086cf14eb90bc67ca4fc62b 15 733 2 Weekly Editors Picks (0614-0620) 6086cf14eb90bc67ca4fc62b 30 813 Why Ethereum Needs ZK-VM: The Ultimate Path to Scaling 6086cf14eb90bc67ca4fc62b 17 193 Кто будет нести флаг Соланы? Взгляд на кандидатов на пост “Тома Ли ”Рекомендуемые статьи 6086cf14eb90bc67ca4fc62b 26 122 1 Нет комментариев Вы должны войти в систему, чтобы оставить комментарий! Немедленно войдите в систему Нет комментариев... Bee.com Крупнейший в мире портал Web3. Партнеры CoinCarp Binance CoinMarketCap CoinGecko Coinlive Доспехи Загрузите приложение Bee Network APP и начните путешествие по web3 Белая книга Роли ЧАСТО ЗАДАВАЕМЫЕ ВОПРОСЫ © 2021-2026. Все права защищены. Политика конфиденциальности | Условия предоставления услуг Скачать приложение Bee Network APP и начните путешествие по web3 Крупнейший в мире портал Web3 Партнеры CoinCarp Binance CoinMarketCap CoinGecko Coinlive Armors Белая книга Роли ЧАСТО ЗАДАВАЕМЫЕ ВОПРОСЫ © 2021-2026. Все права защищены. Политика конфиденциальности | Условия предоставления услуг Поиск ПоискInSiteOnChainСоциальнаяНовости Hot to you: Охотники за воздухом Анализ данных Криптознаменитости Детектор-ловушка Русский English 繁體中文 简体中文 日本語 Tiếng Việt العربية 한국어 Bahasa Indonesia हिन्दी اردو Русский智能索引记录
-
2026-02-27 17:51:29
综合导航
成功
标题:Northern Cochise Community Hospital TMC Health
简介:Health care for Willcox and surrounding region, including 24
-
2026-02-28 04:22:25
综合导航
成功
标题:Flug buchen
简介:Buchen Sie Ihren nächsten Flug ab Düsseldorf auf dus.com! A
-
2026-02-28 01:01:21
综合导航
成功
标题:Когтеточка, дряпка для котов и кошек Черкассы в Черкассах ➤ RIA.com Купить когтеточки, дряпки для котов и кошек: цены, фото, отзывы
简介:Купить когтеточку, дряпку для котов и кошек в Черкассах ✔️ И
-
2026-02-28 02:01:36
综合导航
成功
标题:Overnight Saturday Delays on Northbound I-5 in Cowlitz & Lewis Counties—Classic Hits 100.7 KLOG News - Classic Hits 100.7 KLOG
简介:100.7 KLOG - Classic Hits, Local News and Sports
-
2026-02-28 04:01:57
综合导航
成功
标题:厉害了“小锤君”! “95后”大学生钢笔画走红网络-新华网
简介:厉害了“小锤君”! “95后”大学生钢笔画走红网络 --- 在“小锤君”的系列30幅钢笔画作中,分为风景篇、求学篇、
-
2026-02-27 21:03:59
数码科技
成功
标题:做机械设备哪个网站好微信支付申请网站吗-北京孤凡电子商务有限公司
简介:做机械设备哪个网站好,微信支付申请网站吗,wordpress页面排版,wordpress 比特币行情企业微信/钉钉集成设
-
2026-02-27 13:20:52
综合导航
成功
标题:火必 Huobi 下载_第88页
简介:火必 Huobi 下载 第88页_火必 Huobi交易所
-
2026-02-28 04:34:14
综合导航
成功
标题:18luck新利官网利app-你玩乐的的好帮手
简介:18luck新利官网专注于为玩家打造无忧的游戏环境。其官方应用程序以简洁流畅的设计、便捷的操作体验和丰富的游戏内容,成为
-
2026-02-27 14:08:56
综合导航
成功
标题:Today at Apple - Akasya - Apple (TR)
简介:Yakınınızda her gün gerçekleşen ilham verici etkinlikleri ke
-
2026-02-27 18:40:59
综合导航
成功
标题:EA: EA por dentro
简介:Lee historias del personal y comunidades de EA, los programa
-
2026-02-27 19:12:44
新闻资讯
成功
标题:【玄关拼花】_别墅设计网
简介:玄关拼花:为您提供最好的玄关拼花相关资讯及内容!了解玄关拼花怎么样知识,尽在别墅设计网知识大全。
-
2026-02-27 23:42:59
综合导航
成功
标题:Librairie chrétienne Excelsis
简介:Excelsis, librairie chrétienne, protestante et évangélique e
-
2026-02-27 19:01:34
综合导航
成功
标题:Wi-Fi®機能を利用する Galaxy Z Fold3 5G SCG11 オンラインマニュアル(取扱説明書) au
简介:auのスマートフォン「Galaxy Z Fold3 5G(ギャラクシー ゼット フォールドスリー ファイブジー)SCG1
-
2026-02-27 14:32:17
综合导航
成功
标题:J’ai toujours le choix… – Excelsis
简介:Quatorze méditations qui nous rappellent, avec légèreté, mai
-
2026-02-27 12:28:34
综合导航
成功
标题:Articles of Association - SSH Communications Security
简介:SSH Communications Security Articles of Association
-
2026-02-28 04:17:29
综合导航
成功
标题:Carroll Independent Fuel
简介:Carroll Independent Fuel’s High’s c-store chain’s competitiv
-
2026-02-28 00:36:31
综合导航
成功
标题:EA SPORTS and the NFL expand partnership to power the future of interactive football
简介:New multi-year deal with the NFL extends across the EA SPORT
-
2026-02-27 22:08:23
综合导航
成功
标题:Roger Ascham (1515-1568). The Reader's Biographical Encyclopaedia. 1922
简介:Roger Ascham (1515-1568). The Reader
-
2026-02-27 21:05:01
新闻资讯
成功
标题:使用Python分析14亿条数据, 站长资讯平台
简介:使用 pytubes,numpy 和 matplotlib Google Ngram viewer是一个有趣和有用的工
-
2026-02-28 02:11:12
综合导航
成功
标题:スマホ用語集 XPERIA 8 SOV42 オンラインマニュアル(取扱説明書) au
简介:auのスマートフォン「XPERIA 8(エクスぺリア エイト)SOV42」のオンラインマニュアル(取扱説明書、操作 設定
-
2026-02-28 04:05:27
综合导航
成功
标题:Schaeffler Germany
简介:Schaeffler has been driving forward groundbreaking invention
-
2026-02-28 01:58:48
综合导航
成功
标题:AI and the Word That's Been Missing From Patent Eligibility Case Law
简介:Discover the key word missing from patent eligibility case l
-
2026-02-27 21:52:30
综合导航
成功
标题:Author: Ari Kaplan Law.com
简介:Ari Kaplan is a legal industry analyst who publishes benchma
-
2026-02-28 02:45:44
综合导航
成功
标题:注册安全工程师有哪几个种类-中级注册安全工程师-233网校
简介:注册安全工程师主要有7个种类,包括煤矿安全、金属非金属矿山安全、化工安全、金属冶炼安全、建筑施工安全、道路运输安全和其他
-
2026-02-27 22:29:39
教育培训
成功
标题:上海新高一寒假补习班_高中辅导补习班-上海新王牌培优
简介:新王牌培优是由一群名师创立于2005年,90%的学生来自重点中学,分层授课,小班教学,按月收费,是上海最好的初中高中课外
-
2026-02-27 22:28:29
综合导航
成功
标题:鸿éçæ¼é³_鸿éçææ_鸿éçç¹ä½_è¯ç»ç½
简介:è¯ç»ç½é¸¿éé¢é,ä»ç»é¸¿é,鸿éçæ¼é³,é¸¿éæ¯
-
2026-02-28 02:30:14
综合导航
成功
标题:断掌纹解读:男性命运之谜揭晓_一世迷命理网
简介:在探讨“断掌男人”这个名称时,我们首先需要了解断掌纹的含义。断掌纹,也称为通贯手,是一种常见的掌纹特征,它在命理学和心理
-
2026-02-27 23:07:37
综合导航
成功
标题:Bracelet Boucle unique rose tendre 42 mm - Taille 9 - Apple (BE)
简介:Personnalisez votre Apple Watch avec un bracelet Boucle uniq
-
2026-02-27 22:11:40
综合导航
成功
标题:Investisseur motivé par la foi – Chaque investissement connaît un impact. Quel est le nôtre ? – Excelsis
简介:Vous choisissez le plus souvent où vous vivez, servez, appre
-
2026-02-28 01:19:55
综合导航
成功
标题:驱动人生官网-显卡驱动_打印机驱动_网卡驱动_声卡驱动等驱动程序下载及检测平台
简介:驱动人生是一款提供电脑驱动下载和安装自动化的软件,通过驱动人生可一键安装显卡驱动、网卡驱动、声卡驱动、打印机驱动、万能网