Connecting the Dots: The Lazarus Group and the Upbit Hack

Published on
November 28, 2025
Digital illustration of a hooded figure with binary code overlay, representing a hacker from the Lazarus Group.
Author
Portrait of a person wearing round glasses and a light beige turtleneck sweater against a beige background.
Cooper Starr
Crypto analyst
Subscribe to our newsletter
Read about our privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

The Shadow of a Nation State

In the world of cryptocurrency, exchange hacks are an unfortunate and all too common story. But what happens when the prime suspect isn't a lone wolf hacker or a criminal syndicate, but an entire nation state? That's the question swirling around a new development in a years old case. South Korean authorities are now pointing fingers at the notorious Lazarus Group, a sophisticated cybercrime unit with direct ties to North Korea, for the massive 2019 hack of the Upbit exchange.

While the breach itself happened years ago, recent intelligence gathered by South Korean law enforcement and cybersecurity agencies suggests the attack bears the classic fingerprints of Lazarus. According to local media reports citing industry sources, the methods used to breach Upbit's security and, crucially, the techniques used to launder the stolen funds, align perfectly with the group's well documented playbook. This attribution sheds new light on one of South Korea's most significant crypto heists and highlights the persistent threat that state sponsored actors pose to the digital asset industry.

A Quick Look Back: The 2019 Upbit Breach

Let’s rewind to November 2019. Upbit, one of South Korea’s largest and most reputable cryptocurrency exchanges, sent shockwaves through the community when it announced a major security breach. In a single, unauthorized transaction, a staggering 342,000 Ether (ETH) was drained from the exchange’s hot wallet. At the time, this massive haul was valued at approximately $50 million.

To its credit, Upbit’s response was swift and transparent. The exchange immediately halted deposits and withdrawals, moved all remaining assets to secure cold storage, and launched a full investigation. Most importantly, Upbit’s parent company, Dunamu, pledged to cover the entire loss with corporate assets, ensuring that no users lost their funds. This decisive action helped maintain user trust, but the question of who was behind the sophisticated attack remained a troubling mystery for years.

Who is the Lazarus Group?

To understand the gravity of the accusation, you need to understand who the Lazarus Group is. This isn't your average group of hackers. Widely believed to be a state sponsored cyber warfare unit operating under the directive of North Korea's Reconnaissance General Bureau, Lazarus is one of the most prolific and dangerous hacking syndicates in the world.

Their motivations are primarily financial. Cut off from the global financial system by heavy international sanctions, North Korea has turned to cybercrime as a key source of revenue to fund its regime and weapons programs. Lazarus is their primary tool for this mission. Their track record of high profile attacks is chilling and extends far beyond the crypto world:

  • The Sony Pictures Hack (2014): A destructive attack that leaked confidential data and wiped company servers, believed to be in retaliation for the film The Interview.
  • The Bangladesh Bank Heist (2016): An attempt to steal nearly $1 billion from the central bank of Bangladesh, which resulted in the successful theft of $81 million.
  • The WannaCry Ransomware Attack (2017): A global ransomware campaign that crippled hundreds of thousands of computers in over 150 countries, including the UK's National Health Service.

A History of Targeting Crypto

While their resume is diverse, the Lazarus Group has developed a particular taste for cryptocurrency. Digital assets offer a relatively new and anonymous way to move large sums of money across borders, making them an ideal target. South Korean exchanges have been in their crosshairs for years. Before the Upbit incident, the group was linked to attacks on other platforms like Bithumb and the bankruptcy-inducing hack of YouBit. Their focus on South Korea is strategic, leveraging a shared language and proximity to exploit potential vulnerabilities.

The Evidence: Connecting Lazarus to the Upbit Heist

So, why are authorities confident that Lazarus was behind the Upbit attack? While official details from the ongoing investigation are scarce, experts point to the group’s signature tactics, or TTPs (tactics, techniques, and procedures).

First, there's the method of entry. Lazarus is known for its highly sophisticated spear phishing campaigns. These are not your typical spam emails. They are meticulously crafted messages, often targeting specific employees within an organization, designed to trick them into installing malware or revealing their credentials. This initial foothold allows the group to move laterally through a network, escalating privileges until they gain access to critical systems like an exchange's hot wallet.

Second, and perhaps more damning, is the money trail. Following the Upbit hack, blockchain analytics firms tracked the stolen 342,000 ETH as it was systematically laundered. The perpetrators used a complex process involving:

  • Peeling Chains: Sending small amounts of crypto off from the main wallet to thousands of new addresses.
  • Crypto Mixers: Using services like Tornado Cash to obscure the origin and destination of the funds.
  • Jumping to Other Exchanges: Moving the laundered funds to less regulated exchanges to cash out or convert to other cryptocurrencies.

This intricate and patient method of money laundering is a known specialty of the Lazarus Group. It’s a pattern that has been observed in nearly every major crypto heist attributed to them, including the recent $625 million Ronin Bridge hack. The consistency in these post-heist activities provides some of the strongest evidence linking them to the crime.

A Persistent Threat to Global Crypto

The formal accusation connecting Lazarus to the Upbit hack is more than just solving an old case. It's a stark reminder of the unique challenges facing the cryptocurrency industry. Exchanges are not just defending against financially motivated criminals; they are on the front lines against well-funded, patient, and highly skilled cyber warfare units backed by a sovereign state.

According to reports from blockchain intelligence firm Chainalysis, North Korean linked groups have stolen billions of dollars worth of digital assets over the years, with the pace of their attacks accelerating. This represents a significant threat to the stability and security of the entire ecosystem and a major challenge for international law enforcement. As the investigation continues, the crypto community will be watching closely, hoping that greater accountability can help fortify defenses against these formidable adversaries.