Upbit Hack 2025: North Korea’s Lazarus Group Strikes Again

5 min read
1 views
Nov 28, 2025

South Korea just pointed the finger at North Korea’s Lazarus Group for the fresh $30M+ Upbit hack. The tactics look eerily familiar to their 2019 heist. But this time the target was a Solana hot wallet and the funds are already bouncing across chains…

Financial market analysis from 28/11/2025. Market conditions may have changed since publication.

Imagine waking up to find one of the biggest crypto exchanges in Asia just lost over thirty million dollars overnight. Not from some random script kiddie, but from one of the most sophisticated state-sponsored hacking groups on the planet. That’s exactly what happened to Upbit users on Thursday when their hot wallet got cleaned out faster than you can say “private key.”

And now South Korean authorities are saying the fingerprints all point in one direction: North Korea’s Lazarus Group. Yeah, the same crew that’s been terrorizing the crypto space for years. If you thought 2019 was bad when they walked away with nearly $50 million in Ethereum, buckle up – they’re clearly back and more polished than ever.

Another Day, Another Multi-Million Dollar Crypto Heist

Let’s be real for a second. Crypto hacks aren’t exactly rare. But when the victim is Upbit – South Korea’s largest exchange by volume – and the suspected culprit is a group that basically operates like a military cyber unit, it stops being “just another hack” and starts feeling like geopolitical warfare played out on the blockchain.

The numbers are still shifting as investigators dig deeper, but we’re looking at roughly 44.5 billion Korean won gone in a flash. Early reports even suggested closer to 54 billion. Whatever the final tally, it’s a gut punch. Especially because Upbit had to freeze all deposits and withdrawals immediately – the crypto equivalent of a bank locking its doors after a robbery.

What Actually Got Stolen?

This wasn’t some broad spray-and-pray attack. The thieves went straight for a hot wallet holding 24 different Solana-based assets. We’re talking everything from major SPL tokens to smaller meme coins that happened to be parked there.

In my experience covering these incidents, when attackers are this surgical, they’ve done their homework. They knew exactly which wallet had liquidity, which tokens would convert cleanly, and how to move everything before anyone hit the alarm. That level of precision screams state-level resources.

  • Target: Single Solana hot wallet
  • Assets taken: 24 distinct SPL tokens
  • Immediate action: All deposits/withdrawals suspended
  • Exchange promise: Full reimbursement from corporate reserves

The Lazarus Playbook Looks Awfully Familiar

Here’s the part that gave investigators chills. The method bears uncanny resemblance to Upbit’s 2019 breach – the one everyone already pinned on Lazarus. Back then it was 342,000 ETH transferred out in one swoop. This time? Different chain, same vibe.

“Instead of attacking the server directly, it’s likely the hackers compromised admin accounts or impersonated administrators to authorize the transfers.”

— Security source quoted by South Korean media

Social engineering remains Lazarus’s bread and butter. They don’t brute-force their way in when they can just phish a developer, steal a session cookie, or trick someone into approving a malicious transaction. It’s quieter, cleaner, and terrifyingly effective.

Follow the Money: Classic Lazarus Laundering Route

Blockchain analysts didn’t waste any time. Within hours, firms like Dethective were tracing the flows. And guess what? The stolen funds were quickly swapped for USDC, bridged to Ethereum, and scattered across new wallets. Sound familiar?

It should. It’s the exact same pattern we’ve seen in dozens of confirmed Lazarus operations. Convert to a stablecoin, hop chains, then start the long dance through mixers and cross-chain bridges. The goal? Make recovery practically impossible and cash out through over-the-counter brokers who don’t ask too many questions.

One analyst I follow put it bluntly: “If you see rapid conversion to USDC followed by Ethereum bridging after a major exchange breach, you’re almost certainly looking at DPRK actors.” That’s intelligence-agency speak for North Korea.

Why Hot Wallets Remain the Soft Underbelly

Look, I get it. Exchanges need hot wallets to process withdrawals quickly. Nobody wants to wait six hours because their coins are locked in cold storage on some air-gapped server in a bunker. But every single time a major hack happens, it’s almost always a hot wallet that bleeds.

Perhaps the most frustrating part? We’ve known this for years. Yet the industry keeps leaving nine-figure sums connected to the internet with keys that humans can be tricked into exposing. Multi-sig helps. Hardware security modules help more. But as long as people are the weakest link, Lazarus will keep winning.

Bigger Picture: Funding a Rogue State One Hack at a Time

Let’s not lose sight of why this matters beyond the immediate losses. Every dollar Lazarus steals is a dollar that reportedly flows back to Pyongyang. Western intelligence agencies have been screaming from the rooftops that crypto heists are now one of North Korea’s primary revenue sources – right up there with counterfeit cigarettes and methamphetamine.

Remember the $1.5 billion ByBit hack earlier this year? FBI publicly attributed that one to Lazarus’s TraderTraitor subunit too. Add Upbit’s losses to the pile, and we’re talking billions funneled toward a nuclear program that keeps the world on edge. It’s hard to wrap your head around sometimes – trading memes one minute, accidentally funding weapons of mass destruction the next.

Was Timing of the Hack Deliberate?

One detail that raised eyebrows: the breach happened literally one day after Dunamu (Upbit’s parent) announced a major merger with Naver Corp. Some investigators are wondering if this was more than coincidence – a sort of digital flexing of muscles right when Upbit was making headlines for legitimate business reasons.

State actors love symbolism. Hitting a high-profile South Korean company right after a landmark deal announcement sends a message. Whether that message was the primary goal or just a bonus, we may never know. But the optics are chilling.

What Happens Next for Upbit Users?

Credit where it’s due – Upbit moved fast. They’ve already promised to cover every won of user losses from their own reserves. That’s the gold standard response and one reason Upbit has survived previous disasters with its reputation mostly intact.

Deposits and withdrawals will stay frozen until they’re 100% certain the environment is clean. Expect a detailed post-mortem in the coming weeks. And expect a lot of soul-searching about whether hot wallets holding Solana tokens need entirely new security models.

Lessons the Entire Industry Still Hasn’t Learned

If I sound a little jaded, it’s because we’ve been here before. Ronin. Binance. KuCoin. Mt. Gox way back in the day. Every time we swear “this was the wake-up call,” and every time another exchange gets cleaned out six months later.

  • Never store large amounts on exchanges long-term
  • Use hardware wallets for serious holdings
  • Enable withdrawal whitelists where available
  • Treat any unsolicited message as potential Lazarus bait
  • Diversify across custodians – don’t keep everything in one place

The technology exists to make these attacks orders of magnitude harder. Multi-party computation. Threshold signatures. Zero-knowledge proofs for private withdrawals. Some exchanges are already implementing them. The question is whether the rest will wait for their own nine-figure disaster before following suit.

Until then, Lazarus Group will keep doing what they do best: turning our collective complacency into their paycheck. And the blockchain, for all its transparency, will keep recording every embarrassing step of the way.

Stay safe out there.

A penny saved is a penny earned.
— Benjamin Franklin
Author

Steven Soarez passionately shares his financial expertise to help everyone better understand and master investing. Contact us for collaboration opportunities or sponsored article inquiries.

Related Articles

?>