Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Does that use a lot of energy?

    The View from RSS

    This smart device stops sneaky AI devices and gadgets from listening to your conversations

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      What the polls say about how Americans are using AI

      February 27, 2026

      Tensions between the Pentagon and AI giant Anthropic reach a boiling point

      February 21, 2026

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026
    • Business

      Huawei Watch GT Series

      March 4, 2026

      Weighing up the enterprise risks of neocloud providers

      March 3, 2026

      A stolen Gemini API key turned a $180 bill into $82,000 in two days

      March 3, 2026

      These ultra-budget laptops “include” 1.2TB storage, but most of it is OneDrive trial space

      March 1, 2026

      FCC approves the merger of cable giants Cox and Charter

      February 28, 2026
    • Crypto

      Banks Respond to Kraken’s Federal Reserve Access as Trump Sides with Crypto

      March 4, 2026

      Hyperliquid and DEXs Break the Top 10 — Is the CEX Era Ending?

      March 4, 2026

      Consensus Hong Kong 2026: The Institutional Turn 

      March 4, 2026

      New Crypto Mutuum Finance (MUTM) Reports V1 Protocol Progress as Roadmap Enters Phase 3

      March 4, 2026

      Bitcoin Short Sellers Caught Off Guard in New White House Move

      March 4, 2026
    • Technology

      Does that use a lot of energy?

      March 4, 2026

      The View from RSS

      March 4, 2026

      This smart device stops sneaky AI devices and gadgets from listening to your conversations

      March 4, 2026

      Building a new flash

      March 4, 2026

      Was Windows 1.0’s lack of overlapping windows a legal or a technical matter?

      March 4, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Cryptocurrency»Upbit Hack Stemmed From High-Level Mathematical Exploit, Says Local Expert
    Cryptocurrency

    Upbit Hack Stemmed From High-Level Mathematical Exploit, Says Local Expert

    TechAiVerseBy TechAiVerseNovember 29, 2025No Comments4 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Upbit Hack Stemmed From High-Level Mathematical Exploit, Says Local Expert
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Upbit Hack Stemmed From High-Level Mathematical Exploit, Says Local Expert

    • A Korean expert says the Upbit breach likely stemmed from a high-level mathematical exploit involving biased nonces.
    • Analysis suggests attackers inferred private keys by detecting subtle randomness flaws across millions of exposed Solana signatures.
    • On-chain evidence shows the breach affected both hot and individual deposit wallets, presenting severe credibility risks for Upbit.

    A South Korean expert has suggested that the recent Upbit breach may have originated from a high-level mathematical exploit targeting flaws in the exchange’s signature or random-number generation system.

    Rather than a conventional wallet compromise, the attack appears to have leveraged subtle nonce-bias patterns embedded in millions of Solana transactions—an approach requiring advanced cryptographic expertise and significant computational resources.

    Sponsored

    Sponsored

    Technical Analysis of the Breach

    On Friday, Upbit operator Dunamu’s CEO Kyoungsuk Oh issued a public apology regarding the Upbit incident, acknowledging that the company had discovered a security flaw that allowed an attacker to infer private keys by analyzing a large number of Upbit wallet transactions exposed on the blockchain. His statement, however, raised immediate questions about how private keys could be stolen through transaction data.

    The next day, Professor Jaewoo Cho of Hansung University provided insight into the breach, linking it to biased or predictable nonces within Upbit’s internal signing system. Rather than typical ECDSA nonce-reuse flaws, this method exploited subtle statistical patterns in the platform’s cryptography. Cho explained that attackers could examine millions of leaked signatures, infer bias patterns, and ultimately recover private keys.

    This perspective aligns with recent studies showing that affinely related ECDSA nonces create a significant risk. A 2025 study on arXiv demonstrated that just two signatures with such related nonces can expose private keys. As a result, private key extraction becomes far easier for attackers who can gather large datasets from exchanges.

    The level of technical sophistication suggests an organized group with advanced cryptographic skills conducted this exploit. According to Cho, identifying minimal bias across millions of signatures requires not only mathematical expertise but also extensive computational resources.

    In response to the incident, Upbit moved all remaining assets to secure cold wallets and halted digital asset deposits and withdrawals. The exchange has also pledged to restore any losses from its reserves, ensuring immediate damage control.

    Sponsored

    Sponsored

    Extent and Security Implications

    Evidence from a Korean researcher indicates that hackers gained access not only to the exchange’s hot wallet but also to individual deposit wallets. This may point to the compromise of sweep-authority keys—or even the private keys themselves—signaling a grave security breach.

    Another researcher points out that, if private keys were exposed, Upbit could be forced to comprehensively overhaul its security systems, including its hardware security modules (HSM), multi-party computation (MPC), and wallet structures. This scenario raises questions about internal controls, indicating possible insider involvement and placing Upbit’s reputation at risk. The extent of the attack highlights the need for robust security protocols and strict access controls across major exchanges.

    The incident illustrates that even highly engineered systems can conceal mathematical weaknesses. Effective nonce generation must ensure randomness and unpredictability. Detectable bias creates vulnerabilities that attackers can exploit. Organized attackers are increasingly capable of identifying and leveraging these flaws.

    Research into ECDSA safeguards stresses that faulty randomness in nonce creation can leak key information. The Upbit case shows how theoretical vulnerabilities can translate into major real-world losses when attackers have the expertise and motivation to exploit them.

    Timing and Industry Impact

    The attack’s timing has fueled community speculation. It occurred exactly six years after a comparable Upbit breach in 2019, which was attributed to North Korean hackers. Furthermore, the hack coincided with the announcement of a major merger involving Naver Financial and Dunamu, Upbit’s parent company.

    Online, some conspiracy theories about coordination or insider knowledge, while others suggest the attack could mask other motives, such as internal embezzlement. Although the clear technical evidence of a complex mathematical exploit points to a highly advanced attack by cybercriminals, critics say the pattern still mirrors longstanding concerns about Korean exchanges:

    “Everyone knows these exchanges massacre retail traders by listing questionable tokens and letting them die with no liquidity,” one user wrote. Others noted, “Two overseas altcoin exchanges recently pulled the same stunt and disappeared,” while another accused the company directly: “Is this just internal embezzlement and plugging the hole with company funds?”

    The 2019 Upbit case showed that North Korea-aligned entities had previously targeted major exchanges to evade sanctions through cyber theft. Although it’s unclear if the current incident involved state-sponsored actors, the advanced nature of the attack remains concerning.

    Disclaimer

    In adherence to the Trust Project guidelines, BeInCrypto is committed to unbiased, transparent reporting. This news article aims to provide accurate, timely information. However, readers are advised to verify facts independently and consult with a professional before making any decisions based on this content. Please note that our Terms and Conditions, Privacy Policy, and Disclaimers have been updated.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleGold Weekly Forecast: Bulls Show Interest as Fed Cut Odds Grow
    Next Article What we still don’t know about weight-loss drugs
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Banks Respond to Kraken’s Federal Reserve Access as Trump Sides with Crypto

    March 4, 2026

    Hyperliquid and DEXs Break the Top 10 — Is the CEX Era Ending?

    March 4, 2026

    Consensus Hong Kong 2026: The Institutional Turn 

    March 4, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025703 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025288 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025164 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025124 Views
    Don't Miss
    Technology March 4, 2026

    Does that use a lot of energy?

    Does that use a lot of energy? Methodology and Sources for Energy Consumption Estimates 1.…

    The View from RSS

    This smart device stops sneaky AI devices and gadgets from listening to your conversations

    Building a new flash

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Does that use a lot of energy?

    March 4, 20260 Views

    The View from RSS

    March 4, 20260 Views

    This smart device stops sneaky AI devices and gadgets from listening to your conversations

    March 4, 20260 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    Best TV Antenna of 2025

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.