The post Lazarus Group link deepens Korea probe appeared on BitcoinEthereumNews.com. South Korean regulators are intensifying scrutiny of the Upbit hack as investigators connect the incident to a broader pattern of North Korean cyber operations, well-known as Lazarus Group. What do South Korean authorities say about the Upbit incident? South Korean authorities now suspect that North Korea’s Lazarus Group executed the recent attack on Upbit, one of the country’s largest cryptocurrency exchanges. According to a report by YONHAP NEWS AGENCY, the breach resulted in the theft of approximately 44.5 billion won ($30.4 million). The incident surfaced after the platform detected suspicious activity affecting customer assets. Officials noted that confidence in Lazarus’s involvement has grown as the investigation progressed. Moreover, they emphasized that the scale and sophistication of the theft resemble earlier operations linked to North Korean actors. Authorities are coordinating with domestic cybersecurity teams and international partners to verify the attribution and recover as many funds as possible. How did Upbit detect the abnormal activity? On Thursday, Upbit identified unusual withdrawals involving Solana-based crypto assets. In response, the exchange halted all deposit and withdrawal services, aiming to contain any further outflows. The platform quickly launched an internal review to trace the origin of the transfers, which involved substantial sums across several wallets. Initially, the company reported losses of 54 billion won ($36.8 million). However, after further reconciliation, that figure was revised down to 44.5 billion won ($30.4 million). Upbit’s rapid suspension of services helped limit additional damage. That said, the incident triggered renewed concerns about cryptocurrency exchange security in South Korea’s fast-growing digital asset market. Why is Lazarus Group suspected in the Upbit exchange hack? Investigators highlight clear similarities between this latest theft and a major incident that struck Upbit in 2019. That earlier attack, which South Korean police also attributed to Lazarus, led to the loss of 342,000 ETH. Moreover,… The post Lazarus Group link deepens Korea probe appeared on BitcoinEthereumNews.com. South Korean regulators are intensifying scrutiny of the Upbit hack as investigators connect the incident to a broader pattern of North Korean cyber operations, well-known as Lazarus Group. What do South Korean authorities say about the Upbit incident? South Korean authorities now suspect that North Korea’s Lazarus Group executed the recent attack on Upbit, one of the country’s largest cryptocurrency exchanges. According to a report by YONHAP NEWS AGENCY, the breach resulted in the theft of approximately 44.5 billion won ($30.4 million). The incident surfaced after the platform detected suspicious activity affecting customer assets. Officials noted that confidence in Lazarus’s involvement has grown as the investigation progressed. Moreover, they emphasized that the scale and sophistication of the theft resemble earlier operations linked to North Korean actors. Authorities are coordinating with domestic cybersecurity teams and international partners to verify the attribution and recover as many funds as possible. How did Upbit detect the abnormal activity? On Thursday, Upbit identified unusual withdrawals involving Solana-based crypto assets. In response, the exchange halted all deposit and withdrawal services, aiming to contain any further outflows. The platform quickly launched an internal review to trace the origin of the transfers, which involved substantial sums across several wallets. Initially, the company reported losses of 54 billion won ($36.8 million). However, after further reconciliation, that figure was revised down to 44.5 billion won ($30.4 million). Upbit’s rapid suspension of services helped limit additional damage. That said, the incident triggered renewed concerns about cryptocurrency exchange security in South Korea’s fast-growing digital asset market. Why is Lazarus Group suspected in the Upbit exchange hack? Investigators highlight clear similarities between this latest theft and a major incident that struck Upbit in 2019. That earlier attack, which South Korean police also attributed to Lazarus, led to the loss of 342,000 ETH. Moreover,…

Lazarus Group link deepens Korea probe

South Korean regulators are intensifying scrutiny of the Upbit hack as investigators connect the incident to a broader pattern of North Korean cyber operations, well-known as Lazarus Group.

What do South Korean authorities say about the Upbit incident?

South Korean authorities now suspect that North Korea’s Lazarus Group executed the recent attack on Upbit, one of the country’s largest cryptocurrency exchanges. According to a report by YONHAP NEWS AGENCY, the breach resulted in the theft of approximately 44.5 billion won ($30.4 million). The incident surfaced after the platform detected suspicious activity affecting customer assets.

Officials noted that confidence in Lazarus’s involvement has grown as the investigation progressed. Moreover, they emphasized that the scale and sophistication of the theft resemble earlier operations linked to North Korean actors. Authorities are coordinating with domestic cybersecurity teams and international partners to verify the attribution and recover as many funds as possible.

How did Upbit detect the abnormal activity?

On Thursday, Upbit identified unusual withdrawals involving Solana-based crypto assets. In response, the exchange halted all deposit and withdrawal services, aiming to contain any further outflows. The platform quickly launched an internal review to trace the origin of the transfers, which involved substantial sums across several wallets.

Initially, the company reported losses of 54 billion won ($36.8 million). However, after further reconciliation, that figure was revised down to 44.5 billion won ($30.4 million). Upbit’s rapid suspension of services helped limit additional damage. That said, the incident triggered renewed concerns about cryptocurrency exchange security in South Korea’s fast-growing digital asset market.

Why is Lazarus Group suspected in the Upbit exchange hack?

Investigators highlight clear similarities between this latest theft and a major incident that struck Upbit in 2019. That earlier attack, which South Korean police also attributed to Lazarus, led to the loss of 342,000 ETH. Moreover, both operations involved large-scale crypto outflows executed in a short time frame.

Authorities believe the hackers may have compromised administrator accounts or impersonated internal staff to authorize withdrawals. These intrusion techniques align with previously documented lazarus group attribution patterns. “We are closely inspecting the situation to confirm whether Lazarus is involved,” a government official stated, underscoring that the inquiry remains active.

How is blockchain analysis tracing the stolen funds?

Investigators are focusing heavily on blockchain analysis tracing to follow the movement of the stolen assets. On-chain data shows that the hacker’s wallet swapped Solana tokens for USDC, a leading stablecoin. The funds were then moved via an USDC bridge to the Ethereum network, a typical tactic used to obscure transaction trails.

Blockchain analytics provider Dethective flagged a series of addresses and transaction patterns matching the timeline of the attack. Furthermore, the routing and conversion behavior mirrors strategies seen in previous Lazarus-linked campaigns. This overlap has reinforced investigators’ working theory that the same state-backed group is behind the new Upbit incident.

What are the implications of the Upbit security breach for users?

The latest upbit security breach has raised hard questions about how crypto platforms protect customer assets amid escalating cyber threats. While Upbit’s swift response limited the overall loss, users remain concerned about potential future incidents. Moreover, the recurrence of an attack resembling the 2019 theft has intensified calls for stronger oversight and technical standards.

Regulators are expected to review internal control requirements for trading venues, especially around admin account management and real-time monitoring of large transfers. Exchanges may face pressure to increase cold storage ratios, upgrade multi-signature schemes, and enhance incident disclosure practices to rebuild user confidence.

How does the Naver Financial merger affect the fallout from the hack?

The recent Upbit hack coincided with a strategic announcement from Naver Financial. The company confirmed its plan to merge with Dunamu, the operator of Upbit, and integrate it as a subsidiary. This move aims to strengthen Naver Financial’s position in the digital asset and fintech sectors, despite the ongoing investigation.

Market observers note that the naver financial merger could provide Upbit with greater resources to bolster its security stack. However, it also increases scrutiny on both entities to demonstrate robust risk management. In particular, investors will watch how the combined group addresses vulnerabilities exposed by the attack.

What is next for Upbit after the hack?

Despite the turmoil, Upbit is pressing ahead with its long-term growth strategy alongside Naver Financial. The integration is expected to expand Upbit’s technical capacity, liquidity access, and compliance infrastructure. That said, the platform must now prove it can prevent another high-profile breach while operating at larger scale.

In summary, South Korean authorities are tightening their probe into the Upbit hack, using detailed on-chain forensics and historical patterns to support a likely connection to Lazarus Group. The outcome of this investigation, combined with the merger’s completion, will shape how users and regulators view the exchange’s resilience in an increasingly hostile cyber environment.

Source: https://en.cryptonomist.ch/2025/11/28/upbit-hack-lazarus-group/

Market Opportunity
Chainlink Logo
Chainlink Price(LINK)
$12.29
$12.29$12.29
-1.20%
USD
Chainlink (LINK) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Steak ‘n Shake Adds $10 Million in Bitcoin Exposure Alongside BTC ‘Strategic Reserve’

Steak ‘n Shake Adds $10 Million in Bitcoin Exposure Alongside BTC ‘Strategic Reserve’

The post Steak ‘n Shake Adds $10 Million in Bitcoin Exposure Alongside BTC ‘Strategic Reserve’ appeared on BitcoinEthereumNews.com. In brief Restaurant chain Steak
Share
BitcoinEthereumNews2026/01/21 07:11
Saudi Awwal Bank Adopts Chainlink Tools, LINK Near $23

Saudi Awwal Bank Adopts Chainlink Tools, LINK Near $23

The post Saudi Awwal Bank Adopts Chainlink Tools, LINK Near $23 appeared on BitcoinEthereumNews.com. SAB adopts Chainlink’s CCIP and CRE to expand tokenization and cross-border finance tools. SAB and Wamid target $2.32T Saudi capital markets with blockchain-based tokenization plans. LINK price falls 2.43% to $22.99 despite higher trading volume and steady liquidity ratios. Saudi Awwal Bank has added Chainlink’s Cross-Chain Interoperability Protocol (CCIP) and the Chainlink Runtime Environment (CRE) to its digital strategy. CCIP links assets and data across multiple blockchains, while CRE provides banks with a controlled framework to test and deploy new financial applications. The lender, with more than $100 billion in assets, is applying the tools to tokenized assets, cross-border settlement, and automated credit platforms. The move signals that Chainlink’s infrastructure is being adopted at scale inside regulated finance. Related: Chainlink’s Deal with SBI Is a Major Win, But Chart Shows LINK’s Battle at $27 Resistance Wamid Partnership Aims at $2.32 Trillion Markets In parallel, SAB signed an agreement with Wamid, a subsidiary of the Saudi Tadawul Group, to pilot tokenization of the Saudi Exchange’s $2.32 trillion capital markets. The focus is on equities and debt products, opening the door for blockchain-based issuance and settlement. SAB has already executed the world’s first Islamic repo on distributed ledger technology, in collaboration with Oumla earlier this year. That transaction gave regulators a template for compliant on-chain contracts. The Wamid deal builds directly on that precedent, shifting from single-instrument pilots toward broader capital markets integration. Saudi Blockchain Buildout Gains Pace Saudi institutions are building multiple layers of digital infrastructure. Oumla is working with Avalanche to develop the Kingdom’s first domestically hosted Layer 1 blockchain. SAB’s Chainlink adoption adds an interoperability and execution layer on top. Together, these projects are shaping a domestic framework for tokenization, with global connectivity added only where liquidity requires it. LINK Price and Liquidity Snapshot While institutional adoption progresses, Chainlink’s…
Share
BitcoinEthereumNews2025/09/18 08:49
Saylor’s Strategy Splurges $2.1 Billion On Bitcoin In Biggest Buy In A Year, Total Holdings Now Top 700,000 BTC ⋆ ZyCrypto

Saylor’s Strategy Splurges $2.1 Billion On Bitcoin In Biggest Buy In A Year, Total Holdings Now Top 700,000 BTC ⋆ ZyCrypto

The post Saylor’s Strategy Splurges $2.1 Billion On Bitcoin In Biggest Buy In A Year, Total Holdings Now Top 700,000 BTC ⋆ ZyCrypto appeared on BitcoinEthereumNews
Share
BitcoinEthereumNews2026/01/21 07:40