ChainStreet
WHERE CODE MEETS CAPITAL
Loading prices…
Powered by CoinGecko
Blockchain Tech

Lazarus Group Tied to Latest $36M Upbit Hack

South Korean authorities suspect the state-sponsored Lazarus Group orchestrated the theft of 54 billion won in Solana assets from Upbit, utilizing forensic techniques that mirror the exchange's 2019 breach.

Lazarus Group Tied to Latest $36M Upbit Hack

The Lazarus Group appears to have struck South Korea’s largest cryptocurrency exchange for the second time in six years. Intelligence sources indicate the North Korean state-sponsored syndicate orchestrated the November 27 Upbit hack, draining approximately $36 million in Solana assets on the exact anniversary of their 2019 breach of the same platform.

Key Takeaways
  • Repeat Offender: Forensic analysis links the breach to the Lazarus Group, noting the attack occurred on the exact anniversary of the syndicate's 2019 hack of Upbit.
  • Solana Wallets Drained: The attackers exploited a hot wallet vulnerability to siphon $36.8 million in SOL, BONK, and JUP on November 27.
  • Crisis Averted: Upbit parent company Dunamu blocked the impact on users by pledging immediate, full reimbursement from corporate funds.
Listen to this article

Anatomy of a Repeat Lazarus Group Attack

The attack, which targeted Upbit’s hot wallets, utilized forensic signatures unique to the Pyongyang-linked group. According to a report from Yonhap News Agency, investigators identified sophisticated “mixing” techniques and wallet-hopping patterns designed to obfuscate the trail of funds, tactics that mirror the group’s $50 million theft from Upbit in 2019.

The breach occurred late Wednesday, triggering “abnormal withdrawals” of Solana (SOL), Bonk (BONK), and other ecosystem tokens. Internal audits suggest the attackers exploited a vulnerability allowing them to derive private keys directly from on-chain data, a technical escalation that bypasses standard multi-signature security layers.

Lazarus Group Funding the Regime

The attribution to Lazarus (APT38) elevates this from a criminal theft to a geopolitical incident. The U.S. Treasury identifies the group as an arm of North Korea’s Reconnaissance General Bureau. 

The syndicate is tasked with generating revenue for the regime’s nuclear weapons program to offset the crippling impact of international sanctions. By targeting the Solana ecosystem during a period of thin “Black Friday” liquidity, the attackers managed to siphon billions of Korean won before Upbit triggered emergency protocols.

Advertisement · Press Release

Genuine News Deserves Honest Attention.

High-conviction projects require an intelligent audience. Connect with readers who value sharp reporting.

👉 Submit Your PR

Dunamu Stops the Bleeding From Upbit Breach

While the security failure is alarming, Upbit’s parent company, Dunamu, moved instantly to neutralize the market fallout. The exchange suspended all deposits and withdrawals and migrated remaining assets to air-gapped cold storage.

Upbit’s CEO issued a public apology and confirmed the exchange would absorb 100% of the losses. “We will fully reimburse impacted users to maintain trust,” the company stated. This liquidity backstop prevented a panic sell-off, with Solana prices dipping only 2% before recovering.

The Upbit Breach Investigation

Police are currently tracking the stolen funds, though recovery is historically difficult against Lazarus operatives, who frequently utilize privacy protocols like Railgun and friendly OTC brokers to cash out. The incident serves as a stark reminder that even top-tier centralized exchanges remain high-value targets for nation-state actors.

Chain Street’s Take

The Upbit breach lands like déjà vu. The timing, the techniques, the quiet precision, everything points back to Lazarus, and once again a major Asian exchange is left patching a hole it didn’t see coming. 

Upbit’s decision to eat the full loss steadied the market, but it doesn’t change the larger truth: North Korea’s elite hacking arm is evolving faster than centralized exchanges can harden their defenses. This wasn’t just a theft but a calibrated strike that shows how fragile hot-wallet infrastructure still is in the face of a nation-state adversary.

CHAIN STREET INTELLIGENCE

Activate Intelligence Layer

Institutional-grade structural analysis for this article.

FAQ

Frequently Asked Questions

01

Did North Korea hack Upbit?

A: South Korean authorities suspect the Lazarus Group, a North Korean state-sponsored hacking syndicate, is responsible. The attack methods and timing (the anniversary of a previous Lazarus hack) point strongly to them.
02

How much was stolen?

A: Approximately 54 billion Korean won, or $36.8 million USD, was stolen in Solana (SOL) and various tokens like BONK and JUP.
03

Will users lose money?

A: No. Upbit has pledged to reimburse all affected users from its own corporate funds.

You Might Also Like

CHAINSTREET
🛡
Alex Reeve

Alex Reeve is a contributing writer for ChainStreet.io. Her articles provide timely insights and analysis across these interconnected industries, including regulatory updates, market trends, token economics, institutional developments, platform innovations, stablecoins, meme coins, policy shifts, and the latest advancements in AI, applications, tools, models, and their broader implications for technology and markets.

The views and opinions expressed by Alex in this article are her own and do not necessarily reflect the official position of ChainStreet.io, its management, editors, or affiliates. This content is provided for informational and educational purposes only and does not constitute financial, investment, legal, or tax advice. Readers should conduct their own research and consult qualified professionals before making any decisions related to digital assets, cryptocurrencies, or financial matters. ChainStreet.io and its contributors are not responsible for any losses incurred from reliance on this information.