The post Korean Authorities Point to Lazarus Group in Upbit’s ₩44.5B Hack appeared on BitcoinEthereumNews.com. South Korea’s regulators say North Korea’s Lazarus Group is now the prime suspect behind the ₩44.5 billion (~$32–36 million) hack on Upbit, the country’s largest crypto exchange. Investigators say the on-chain trail looks almost identical to the group’s previous operations, including Upbit’s infamous 2019 breach. The attack hit on November 27, triggering an immediate freeze on withdrawals and transfers. Upbit confirmed that funds vanished from one of its hot wallets, affecting several assets, SOL, USDC, BONK, JUP, and others. While the exchange says users will be fully compensated from its reserves, the incident marks another damaging blow to trust in local crypto infrastructure. And the fingerprints are familiar. A Pattern Authorities Know Too Well Investigators began tracing the exploited wallet minutes after the hack. What they found matched a blueprint they’ve seen repeatedly over the past five years. The stolen assets were:  Swapped instantly on Jupiter and Raydium  Split across more than 200 wallets  Bridged through Wormhole  Pushed into a laundering cycle resembling mixer-style dispersion The flow mirrors the techniques Lazarus has used in hacks across the world. Korea’s cybercrime teams pointed to “wallet-hopping patterns and mixing behavior identical to Lazarus operations,” according to local media briefings and early reporting from Crypto Times. 🚨UPDATE: Korean authorities say North Korea’s Lazarus Group is the key suspect in Upbit’s ₩44.5B (~$32M) hack. Investigators traced wallet-hops and mixing patterns identical to previous Lazarus ops, including Upbit’s 2019 breach. FSS and KISA have launched an on-site… pic.twitter.com/NhJwskSv1S — The Crypto Times (@CryptoTimes_io) November 28, 2025 Authorities say this includes the same tactics seen in the 2019 Upbit breach, at that time, $50 million in ETH disappeared using a near-identical playbook. The new attack’s precision, timing, and laundering methods only strengthened the suspicion. The $36M Breach: What Happened Upbit classified the event as an external… The post Korean Authorities Point to Lazarus Group in Upbit’s ₩44.5B Hack appeared on BitcoinEthereumNews.com. South Korea’s regulators say North Korea’s Lazarus Group is now the prime suspect behind the ₩44.5 billion (~$32–36 million) hack on Upbit, the country’s largest crypto exchange. Investigators say the on-chain trail looks almost identical to the group’s previous operations, including Upbit’s infamous 2019 breach. The attack hit on November 27, triggering an immediate freeze on withdrawals and transfers. Upbit confirmed that funds vanished from one of its hot wallets, affecting several assets, SOL, USDC, BONK, JUP, and others. While the exchange says users will be fully compensated from its reserves, the incident marks another damaging blow to trust in local crypto infrastructure. And the fingerprints are familiar. A Pattern Authorities Know Too Well Investigators began tracing the exploited wallet minutes after the hack. What they found matched a blueprint they’ve seen repeatedly over the past five years. The stolen assets were:  Swapped instantly on Jupiter and Raydium  Split across more than 200 wallets  Bridged through Wormhole  Pushed into a laundering cycle resembling mixer-style dispersion The flow mirrors the techniques Lazarus has used in hacks across the world. Korea’s cybercrime teams pointed to “wallet-hopping patterns and mixing behavior identical to Lazarus operations,” according to local media briefings and early reporting from Crypto Times. 🚨UPDATE: Korean authorities say North Korea’s Lazarus Group is the key suspect in Upbit’s ₩44.5B (~$32M) hack. Investigators traced wallet-hops and mixing patterns identical to previous Lazarus ops, including Upbit’s 2019 breach. FSS and KISA have launched an on-site… pic.twitter.com/NhJwskSv1S — The Crypto Times (@CryptoTimes_io) November 28, 2025 Authorities say this includes the same tactics seen in the 2019 Upbit breach, at that time, $50 million in ETH disappeared using a near-identical playbook. The new attack’s precision, timing, and laundering methods only strengthened the suspicion. The $36M Breach: What Happened Upbit classified the event as an external…

Korean Authorities Point to Lazarus Group in Upbit’s ₩44.5B Hack

2025/11/29 15:43

South Korea’s regulators say North Korea’s Lazarus Group is now the prime suspect behind the ₩44.5 billion (~$32–36 million) hack on Upbit, the country’s largest crypto exchange.

Investigators say the on-chain trail looks almost identical to the group’s previous operations, including Upbit’s infamous 2019 breach.

The attack hit on November 27, triggering an immediate freeze on withdrawals and transfers. Upbit confirmed that funds vanished from one of its hot wallets, affecting several assets, SOL, USDC, BONK, JUP, and others. While the exchange says users will be fully compensated from its reserves, the incident marks another damaging blow to trust in local crypto infrastructure.

And the fingerprints are familiar.

A Pattern Authorities Know Too Well

Investigators began tracing the exploited wallet minutes after the hack. What they found matched a blueprint they’ve seen repeatedly over the past five years.

The stolen assets were:

  •  Swapped instantly on Jupiter and Raydium
  •  Split across more than 200 wallets
  •  Bridged through Wormhole
  •  Pushed into a laundering cycle resembling mixer-style dispersion

The flow mirrors the techniques Lazarus has used in hacks across the world. Korea’s cybercrime teams pointed to “wallet-hopping patterns and mixing behavior identical to Lazarus operations,” according to local media briefings and early reporting from Crypto Times.

Authorities say this includes the same tactics seen in the 2019 Upbit breach, at that time, $50 million in ETH disappeared using a near-identical playbook. The new attack’s precision, timing, and laundering methods only strengthened the suspicion.

The $36M Breach: What Happened

Upbit classified the event as an external hack minutes after it occurred. Here’s what investigators say unfolded inside the hot wallet:

  •  ₩44.5B (~$36M) drained almost instantly
  •  Assets swapped across DEXes to obscure origin
  •  Funds fragmented into hundreds of small wallets
  •  Movement funneled through the Wormhole bridge
  •  Subsequent dispersion into mixer paths

Blockchain analysts say the process was coordinated, fast, and automated, classic indicators of a large, experienced team. Upbit froze all transfers immediately after detecting abnormal withdrawals.

The exchange clarified that customer funds remain safe and fully backed. “100% covered using corporate reserves,” the platform announced, attempting to contain market panic.

The Strange Date Coincidence Everyone Noticed

Crypto watchers quickly realized something eerie:

This attack happened on November 27. On the exact same date in 2019, Upbit suffered its previous major breach.

  •  Nov 27, 2019 → $50M ETH stolen
  •  Nov 27, 2024 → ~$36M hot-wallet drain

Same day. Same holiday period. Same laundering method. Same exchange. Same suspect.

Analysts on X highlighted the coincidence, questioning whether Lazarus intentionally marks significant dates as part of its operational pattern. Some security experts cited past attacks where state-backed groups have used symbolic timing to send signals or “flex” their capabilities during major news cycles.

This year’s attack landed on the same day Upbit’s parent company, Dunamu, announced a major business merger with Naver. Local investigators claim Lazarus “likes striking on important news days,” calling the overlap suspicious rather than accidental.

Why Lazarus Is the Primary Suspect

South Korea’s cyber units say three major indicators point directly to Lazarus:

1. Reused Tactics From Prior Hacks

The 2019 Upbit breach followed nearly identical steps:

  •  Admin impersonation
  •  Holiday timing
  •  Hot-wallet drain disguised as a transfer
  •  Immediate DEX and cross-chain moves
  •  Multi-layer wallet splitting

This new attack lines up almost line-for-line with that previous playbook.

2. North Korea’s Financial Pressure

With sanctions tightening, the DPRK has leaned more aggressively on crypto hacking as a financial pipeline. Intelligence agencies worldwide estimate Lazarus has generated hundreds of millions for the regime through cyberattacks on exchanges, bridges, and DeFi protocols.

Korean investigators say North Korea’s need for hard currency right now is “extreme,” making the timing of the attack unsurprising.

3. Behavioral Signatures

Forensic analysts pointed to wallet paths, bridge selections, obfuscation techniques, and the particular clustering style Lazarus is known for.

In past attacks, including those on Bybit, WazirX, and numerous token bridges, Lazarus used:

  •  rapid swaps to volatile tokens
  •  fragmentation into 100–300 small wallets
  •  cross-chain exit routes
  •  mixer-like dispersion patterns to conceal origin

Every hallmark is here.

Lazarus and the Industry’s Biggest Hacks

If confirmed, the Upbit incident adds to a long list of high-profile targets linked to Lazarus. Over the past few years, the group has been tied to major thefts across the crypto industry:

  •  WazirX breach
  •  Bybit exploit
  •  Multiple bridge hacks, including cross-chain protocols
  •  Numerous attacks on centralized exchanges worldwide

State-backed groups like Lazarus have become highly sophisticated players in crypto markets. Their operations involve multi-level automation, high-end exploit development, and laundering networks that run across dozens of chains.

Is Crypto Ready for State-Level Adversaries?

The Upbit case underscores a growing reality:

  • Nation-state hackers now treat crypto exchanges like high-speed ATMs.

Upbit emphasized that user funds are safe, but the psychological hit is still severe. Trust in centralized exchanges, already fragile since 2022, takes another blow each time a major platform is compromised.

Cyber experts warn that crypto infrastructure isn’t evolving as quickly as the attackers targeting it. Lazarus, backed by state resources and years of operational experience, continues to move faster than most private security teams.

The Bigger Picture: A Warning for Global Markets

As Korean authorities continue their investigation, the industry faces a difficult question:

If even the largest, most regulated exchange in the country can suffer repeated breaches from the same adversary, what does that say about the state of crypto security?

The Upbit hack highlights three trends reshaping the landscape:

  •  State-backed hackers dominate the high-end attack surface
  •  Cross-chain bridges are still the weakest link
  •  Centralized exchange hot wallets remain prime targets

The Lazarus Group, if confirmed, once again demonstrates a level of coordination and consistency unmatched by typical cybercriminals.

For Upbit, the response is swift. For users, the reassurance is welcome.

But the message behind the attack is louder than ever:

Crypto’s biggest threat isn’t retail panic or market volatility.

It’s state-sponsored entities playing a long-term, high-stakes game.

Disclosure: This is not trading or investment advice. Always do your research before buying any cryptocurrency or investing in any services.

Follow us on Twitter @nulltxnews to stay updated with the latest Crypto, NFT, AI, Cybersecurity, Distributed Computing, and Metaverse news!

Source: https://nulltx.com/korean-authorities-point-to-lazarus-group-in-upbits-%E2%82%A944-5b-hack/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

CleanSpark Shares Rise After Getting $100M Bitcoin-Backed Credit From Coinbase Prime

CleanSpark Shares Rise After Getting $100M Bitcoin-Backed Credit From Coinbase Prime

Bitcoin mining company CleanSpark (CLSK) has secured a new $100 million credit facility with Coinbase Prime, giving it access to fresh capital without selling its bitcoin holdings or raising equity.The shares rose nearly 6% in post-market trading, after the announcement on Monday. The mining company will use the proceeds for strategic capital expenditures, including expanding CleanSpark’s energy portfolio, scaling its bitcoin mining operations, and investing in high-performance computing (HPC) capabilities, the company said in a press release. Rather than selling bitcoin to raise cash or selling additional shares of the firm—a move that can dilute the current shareholders—CleanSpark is using the asset as collateral to keep growing while holding on to what it mines. "Delivering accretive growth using non-dilutive financing is at the core of CleanSpark's capital strategy," said Gary A. Vecchiarelli, CleanSpark's CFO. "Our 'Infrastructure First' strategy has been proven historically and will further enhance shareholder value as we expand into more diversified compute opportunities."The new raise comes after recent leadership changes hinted at the miner going beyond just mining bitcoin and diversifying into other revenue opportunities. The focus on HPC isn't surprising, as more and more bitcoin miners are pivoting into hosting machines that cater to HPC and artificial intelligence computing, which requires a tremendous amount of energy, in their data centers. Read more: GPU Gold Rush: Why Bitcoin Miners Are Powering AI’s Expansion
Share
Coinstats2025/09/23 06:04