<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>upbit hack Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/upbit-hack/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/upbit-hack/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Fri, 28 Nov 2025 07:09:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>upbit hack Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/upbit-hack/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Group Behind the Upbit Hack Has Been Identified</title>
		<link>https://coinengineer.net/blog/the-group-behind-the-upbit-hack-has-been-identified/</link>
					<comments>https://coinengineer.net/blog/the-group-behind-the-upbit-hack-has-been-identified/#respond</comments>
		
		<dc:creator><![CDATA[Haciyev Reşit]]></dc:creator>
		<pubDate>Fri, 28 Nov 2025 07:09:38 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[cryptocurrencies]]></category>
		<category><![CDATA[upbit]]></category>
		<category><![CDATA[upbit hack]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=58073</guid>

					<description><![CDATA[<p>The attack on Upbit, South Korea’s largest cryptocurrency exchange—resulting in losses of approximately 44.5 billion won ($30.4 million)—is believed to have been carried out by the internationally known North Korean hacking group Lazarus. According to a report by local media outlet Yonhap, citing government and industry sources, South Korean authorities are increasingly confident that Lazarus</p>
<p>The post <a href="https://coinengineer.net/blog/the-group-behind-the-upbit-hack-has-been-identified/">The Group Behind the Upbit Hack Has Been Identified</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The attack on <strong>Upbit</strong>, South Korea’s largest cryptocurrency exchange—resulting in losses of approximately 44.5 billion won ($30.4 million)—is believed to have been carried out by the internationally known North Korean hacking group <strong>Lazarus</strong>. According to a report by local media outlet Yonhap, citing government and industry sources, South Korean authorities are increasingly confident that Lazarus is linked to the attack based on the methods used and the on-chain traces.</p>
<h2 data-start="567" data-end="625">Officials: “The Attack Resembles Lazarus’ Tactics”</h2>
<p data-start="626" data-end="919">Authorities stated that the techniques used in the Upbit hack strongly resemble those used in previous Lazarus operations. One of the biggest reasons strengthening this suspicion is the fact that Lazarus was confirmed to be behind the 2019 Upbit hack, in which 342,000 ETH were stolen.</p>
<p data-start="921" data-end="1034">A government official noted that instead of directly attacking the exchange’s servers, the attackers most likely:</p>
<ul>
<li data-start="1038" data-end="1080">Gained access to administrative accounts</li>
<li data-start="1083" data-end="1139">Impersonated admins during transfer approval processes</li>
</ul>
<p data-start="1141" data-end="1227">This indicates that the attack was highly coordinated and professionally executed.</p>
<p data-start="1141" data-end="1227"><img fetchpriority="high" decoding="async" class="wp-image-58076 aligncenter" src="https://coinengineer.net/blog/wp-content/uploads/2025/11/lazarus-300x169.jpg" alt="" width="884" height="498" srcset="https://coinengineer.net/blog/wp-content/uploads/2025/11/lazarus-300x169.jpg 300w, https://coinengineer.net/blog/wp-content/uploads/2025/11/lazarus-1024x576.jpg 1024w, https://coinengineer.net/blog/wp-content/uploads/2025/11/lazarus-768x432.jpg 768w, https://coinengineer.net/blog/wp-content/uploads/2025/11/lazarus.jpg 1200w" sizes="(max-width: 884px) 100vw, 884px" /></p>
<h2 data-start="1339" data-end="1374">Upbit Revises Loss Estimate</h2>
<p data-start="1375" data-end="1668">Upbit suspended deposits and withdrawals after detecting abnormal transfers involving various tokens on the Solana network. The exchange initially reported losses of 54 billion won ($36.8 million), but after further analysis, the figure was revised to 44.5 billion won ($30.4 million).</p>
<p data-start="1670" data-end="1909">Most of the compromised assets were Solana-based tokens. On-chain analysis shows that a wallet associated with the hacker converted the stolen Solana assets into USDC and was preparing to transfer the funds to the Ethereum network.</p>
<h2 data-start="1916" data-end="1956">Hacker Activity Tracked On-Chain</h2>
<p data-start="1957" data-end="2034">According to blockchain analytics provider Dethective, the attacker’s wallet:</p>
<ul>
<li data-start="2038" data-end="2083">Swapped stolen Solana (SOL) assets for USDC</li>
<li data-start="2086" data-end="2124">Prepared to bridge funds to Ethereum</li>
</ul>
<p data-start="2126" data-end="2243">These actions align with the escape and obfuscation techniques frequently used by Lazarus in previous operations.</p>
<h2 data-start="2250" data-end="2294">Critical Timing for Upbit and Dunamu</h2>
<p data-start="2295" data-end="2619">The timing of the attack has also raised attention. Just one day before the hack, South Korea’s financial giant Naver Financial officially announced merger plans with Dunamu, the company behind Upbit. The merger is seen as a strategic move to expand digital asset services and strengthen Upbit’s corporate structure. The fact that the hack occurred immediately after this major announcement has once again brought cybersecurity risks to the forefront.</p>
<p><i>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our</i><a href="https://t.me/coinengineernews"> <i>Telegram,</i></a><a href="https://www.youtube.com/@CoinEngineer"><i> YouTube</i></a><i>, and</i><a href="https://twitter.com/coinengineers"> <i>Twitter</i></a><i> channels for the latest</i><a href="https://coinengineer.io/news/"> <i>news</i></a><i> and updates.</i></p>
<p>The post <a href="https://coinengineer.net/blog/the-group-behind-the-upbit-hack-has-been-identified/">The Group Behind the Upbit Hack Has Been Identified</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/the-group-behind-the-upbit-hack-has-been-identified/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/12/FBI-and-Japan-Reveal-Details-of-the-305M-DMM-Hack.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/12/FBI-and-Japan-Reveal-Details-of-the-305M-DMM-Hack.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Upbit Hit by Multi-Million Dollar Hack Attack on the Solana Network!</title>
		<link>https://coinengineer.net/blog/upbit-hit-by-multi-million-dollar-hack-attack-on-the-solana-network/</link>
					<comments>https://coinengineer.net/blog/upbit-hit-by-multi-million-dollar-hack-attack-on-the-solana-network/#respond</comments>
		
		<dc:creator><![CDATA[Haciyev Reşit]]></dc:creator>
		<pubDate>Thu, 27 Nov 2025 07:32:14 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[crypto market]]></category>
		<category><![CDATA[cryptocurrencies]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[upbit]]></category>
		<category><![CDATA[upbit exchange]]></category>
		<category><![CDATA[upbit hack]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=57985</guid>

					<description><![CDATA[<p>South Korea’s largest cryptocurrency exchange, Upbit, announced that it suffered a major hack worth approximately $37 million following large-scale abnormal withdrawal activities on the Solana network. After the incident was detected, the exchange temporarily suspended all deposit and withdrawal services to protect user funds. This development created significant shock across the market, as it represents</p>
<p>The post <a href="https://coinengineer.net/blog/upbit-hit-by-multi-million-dollar-hack-attack-on-the-solana-network/">Upbit Hit by Multi-Million Dollar Hack Attack on the Solana Network!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>South Korea’s largest cryptocurrency exchange, <strong>Upbit</strong>, announced that it suffered a major hack worth approximately $37 million following large-scale abnormal withdrawal activities on the Solana network. After the incident was detected, the exchange temporarily suspended all deposit and withdrawal services to protect user funds. This development created significant shock across the market, as it represents a serious security breach at one of the biggest crypto platforms in the region.</p>
<h2>Solana-Based Tokens Transferred to an Unknown Wallet</h2>
<p>According to <strong>Upbit</strong>, the attack was detected around 04:42 KST (23:42 TSI) when an unusual token movement was observed in the system. Initial investigation revealed that various Solana-based tokens were rapidly withdrawn from the platform and sent to an unidentified external wallet. The fact that the movements targeted a single wallet in a coordinated fashion suggests that the attack was not random but a pre-planned and highly organized operation.</p>
<p>Upbit confirmed that 54 billion KRW (approximately $36 million) worth of assets on the Solana network were stolen. The compromised tokens include several popular assets in the Solana ecosystem such as SOL, BONK, PYTH, ORCA, RAY, JTO, USDC, and many others. The attack impacted more than 20 tokens in total, including 2Z, ACS, DOOD, DRIFT, HUMA, IO, JUP, LAYER, ME, MEW, MOODENG, PENGU, RENDER, SONIC, SOON, TRUMP, and W.</p>
<p><img decoding="async" class="wp-image-57986 aligncenter" src="https://coinengineer.net/blog/wp-content/uploads/2025/11/upbit-1-300x233.jpg" alt="" width="684" height="531" srcset="https://coinengineer.net/blog/wp-content/uploads/2025/11/upbit-1-300x233.jpg 300w, https://coinengineer.net/blog/wp-content/uploads/2025/11/upbit-1.jpg 680w" sizes="(max-width: 684px) 100vw, 684px" /></p>
<h2>Upbit Moves Assets to Cold Wallets; $8.18 Million Frozen in Initial Response</h2>
<p>Upon detecting the breach, Upbit immediately transferred all hot wallet assets to cold wallets as an additional security precaution. The exchange also contacted various projects within the Solana ecosystem to initiate token freeze procedures.</p>
<p>The first successful result came from the freezing of LAYER tokens worth $8.18 million. Upbit continues to coordinate with project teams and regulatory authorities to freeze additional stolen assets and prevent the stolen funds from being moved further.</p>
<h2>Upbit: “We Will Not Allow Any User Losses”</h2>
<p>In its official statement after the attack, Upbit reiterated that all user funds would be fully protected. The exchange stated that it will compensate all losses using its own reserves, ensuring that customers do not suffer any financial impact. This approach aligns with previous strategies adopted by Korean exchanges when handling security incidents in the past.</p>
<p><img decoding="async" class="wp-image-57987 aligncenter" src="https://coinengineer.net/blog/wp-content/uploads/2025/11/upbit1-300x82.jpg" alt="" width="798" height="218" srcset="https://coinengineer.net/blog/wp-content/uploads/2025/11/upbit1-300x82.jpg 300w, https://coinengineer.net/blog/wp-content/uploads/2025/11/upbit1-768x210.jpg 768w, https://coinengineer.net/blog/wp-content/uploads/2025/11/upbit1.jpg 910w" sizes="(max-width: 798px) 100vw, 798px" /></p>
<h2>Investigation Into the Source of the Attack</h2>
<p>Upbit has not yet disclosed technical details regarding how the exploit occurred. The platform stated that it is conducting a comprehensive investigation to determine the exact vulnerability that enabled the attack. Experts note that the focus on Solana may not be a coincidence, as Solana’s high transaction throughput could have been leveraged by attackers. However, whether the breach stemmed from an internal technical flaw or an external malicious compromise will become clearer in the coming days.</p>
<p>Upbit also confirmed that a total of $38.5 million worth of assets were transferred to the unknown wallet on November 27. The exchange has suspended all platform operations until the security renewal process is fully completed. Upbit emphasized that its team is working 24/7 during this period to ensure maximum protection of user funds.</p>
<p><i>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our</i><a href="https://t.me/coinengineernews"> <i>Telegram,</i></a><a href="https://www.youtube.com/@CoinEngineer"><i> YouTube</i></a><i>, and</i><a href="https://twitter.com/coinengineers"> <i>Twitter</i></a><i> channels for the latest</i><a href="https://coinengineer.io/news/"> <i>news</i></a><i> and updates.</i></p>
<p>The post <a href="https://coinengineer.net/blog/upbit-hit-by-multi-million-dollar-hack-attack-on-the-solana-network/">Upbit Hit by Multi-Million Dollar Hack Attack on the Solana Network!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/upbit-hit-by-multi-million-dollar-hack-attack-on-the-solana-network/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/upbit_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/upbit_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>UpBit Faced a Fake Asset Disaster!</title>
		<link>https://coinengineer.net/blog/upbit-faced-fake-asset-disaster/</link>
					<comments>https://coinengineer.net/blog/upbit-faced-fake-asset-disaster/#respond</comments>
		
		<dc:creator><![CDATA[Yunus Taşlı]]></dc:creator>
		<pubDate>Mon, 25 Sep 2023 11:27:14 +0000</pubDate>
				<category><![CDATA[Exchange News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[fake assets]]></category>
		<category><![CDATA[upbit]]></category>
		<category><![CDATA[upbit exchange]]></category>
		<category><![CDATA[upbit exchange review]]></category>
		<category><![CDATA[upbit fake asset]]></category>
		<category><![CDATA[upbit global]]></category>
		<category><![CDATA[upbit hack]]></category>
		<category><![CDATA[upbit korea]]></category>
		<guid isPermaLink="false">https://coinengineer.io/blog/?p=4070</guid>

					<description><![CDATA[<p>UpBit faced a fake asset disaster! South Korea&#8217;s leading crypto exchange Upbit, was exposed to a deposit event carried out for fraudulent purposes, and after this event, APT Coin transactions were temporarily suspended. ▪️ This asset disaster that Upbit faced, the largest crypto exchange in South Korea, also emerged with the discovery of a fake</p>
<p>The post <a href="https://coinengineer.net/blog/upbit-faced-fake-asset-disaster/">UpBit Faced a Fake Asset Disaster!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>UpBit faced a fake asset disaster! South Korea&#8217;s leading crypto exchange<strong> Upbit,</strong> was exposed to a deposit event carried out for fraudulent purposes, and after this event, <strong><a href="https://coinengineer.net/blog/?s=aptos">APT</a> Coin</strong> transactions were temporarily suspended.</em></p>
<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/25aa.png" alt="▪" class="wp-smiley"  /> This asset disaster that Upbit faced, the largest crypto exchange in South Korea, also emerged with the discovery of a fake deposit in the early hours of Sunday. Additionally scammers successfully managed to deposit a fake token onto the platform by portraying it as a real <strong>Aptos (APT)</strong> token.</p>
<hr />
<blockquote>
<p class="entry-title">You might like: <a href="https://coinengineer.net/blog/can-binance-go-bankrupt/"><strong>Could Binance Go Bankrupt?</strong></a></p>
</blockquote>
<hr />
<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/25aa.png" alt="▪" class="wp-smiley"  /> While the real <strong>APT</strong> has a price with eight decimal places, the fake APT asset had a price with six decimal places and <strong>Upbit,</strong> noticed this difference quickly, thus contributing to the prevention of a serious crisis. According to Definalist&#8217;s estimate, if the fake coin had a price with eight decimal places, thousands of investors could suffer significant losses and this could have led to <strong>Upbit’&#8217;s</strong> bankruptcy.</p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Amazing Korean exchange upbit incident today</p>
<p>1. The Largest S.Korean exchange  <a href="https://twitter.com/Official_Upbit?ref_src=twsrc%5Etfw">@Official_Upbit</a> , abruptly halted Aptos&#39; deposits and withdrawals, citing a wallet system maintenance without any specific reason</p>
<p>2. Various Korean users have posted authentication claiming that they… <a href="https://t.co/OjfCwhB4eV">pic.twitter.com/OjfCwhB4eV</a></p>
<p>&mdash; Definalist (@definalist) <a href="https://twitter.com/definalist/status/1705900412208029894?ref_src=twsrc%5Etfw">September 24, 2023</a></p></blockquote>
<p></p>
<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/25aa.png" alt="▪" class="wp-smiley"  /> According to social media shares, people claim that a flaw in the system is identifying all transactions as the same APT token. So this flaw appears to have caused the Aptos ecosystem to incorrectly classify any cryptocurrency transfer to the Upbit wallet as the APT local token.</p>
<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/25aa.png" alt="▪" class="wp-smiley"  /> After the incident, the exchange managers are making efforts to resolve the issue and are requesting a refund from those who led to the fake token swap.</p>
<hr />
<p><em>You can freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener"><strong>Telegram</strong>  ,</a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener"><strong>YouTube</strong></a> and <a href="https://twitter.com/coinengineers"><strong>Twitter</strong></a> channels for the latest news and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/upbit-faced-fake-asset-disaster/">UpBit Faced a Fake Asset Disaster!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/upbit-faced-fake-asset-disaster/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2023/09/tempory-6.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2023/09/tempory-6.png' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
