The post Upbit Hack Stemmed From High-Level Mathematical Exploit, Says Local Expert appeared on BitcoinEthereumNews.com. A South Korean expert has suggested that the recent Upbit breach may have originated from a high-level mathematical exploit targeting flaws in the exchange’s signature or random-number generation system. Rather than a conventional wallet compromise, the attack appears to have leveraged subtle nonce-bias patterns embedded in millions of Solana transactions—an approach requiring advanced cryptographic expertise and significant computational resources. Sponsored Sponsored Technical Analysis of the Breach On Friday, Upbit operator Dunamu’s CEO Kyoungsuk Oh issued a public apology regarding the Upbit incident, acknowledging that the company had discovered a security flaw that allowed an attacker to infer private keys by analyzing a large number of Upbit wallet transactions exposed on the blockchain. His statement, however, raised immediate questions about how private keys could be stolen through transaction data. The next day, Professor Jaewoo Cho of Hansung University provided insight into the breach, linking it to biased or predictable nonces within Upbit’s internal signing system. Rather than typical ECDSA nonce-reuse flaws, this method exploited subtle statistical patterns in the platform’s cryptography. Cho explained that attackers could examine millions of leaked signatures, infer bias patterns, and ultimately recover private keys. This perspective aligns with recent studies showing that affinely related ECDSA nonces create a significant risk. A 2025 study on arXiv demonstrated that just two signatures with such related nonces can expose private keys. As a result, private key extraction becomes far easier for attackers who can gather large datasets from exchanges. The level of technical sophistication suggests an organized group with advanced cryptographic skills conducted this exploit. According to Cho, identifying minimal bias across millions of signatures requires not only mathematical expertise but also extensive computational resources. In response to the incident, Upbit moved all remaining assets to secure cold wallets and halted digital asset deposits and withdrawals. The exchange has… The post Upbit Hack Stemmed From High-Level Mathematical Exploit, Says Local Expert appeared on BitcoinEthereumNews.com. A South Korean expert has suggested that the recent Upbit breach may have originated from a high-level mathematical exploit targeting flaws in the exchange’s signature or random-number generation system. Rather than a conventional wallet compromise, the attack appears to have leveraged subtle nonce-bias patterns embedded in millions of Solana transactions—an approach requiring advanced cryptographic expertise and significant computational resources. Sponsored Sponsored Technical Analysis of the Breach On Friday, Upbit operator Dunamu’s CEO Kyoungsuk Oh issued a public apology regarding the Upbit incident, acknowledging that the company had discovered a security flaw that allowed an attacker to infer private keys by analyzing a large number of Upbit wallet transactions exposed on the blockchain. His statement, however, raised immediate questions about how private keys could be stolen through transaction data. The next day, Professor Jaewoo Cho of Hansung University provided insight into the breach, linking it to biased or predictable nonces within Upbit’s internal signing system. Rather than typical ECDSA nonce-reuse flaws, this method exploited subtle statistical patterns in the platform’s cryptography. Cho explained that attackers could examine millions of leaked signatures, infer bias patterns, and ultimately recover private keys. This perspective aligns with recent studies showing that affinely related ECDSA nonces create a significant risk. A 2025 study on arXiv demonstrated that just two signatures with such related nonces can expose private keys. As a result, private key extraction becomes far easier for attackers who can gather large datasets from exchanges. The level of technical sophistication suggests an organized group with advanced cryptographic skills conducted this exploit. According to Cho, identifying minimal bias across millions of signatures requires not only mathematical expertise but also extensive computational resources. In response to the incident, Upbit moved all remaining assets to secure cold wallets and halted digital asset deposits and withdrawals. The exchange has…

Upbit Hack Stemmed From High-Level Mathematical Exploit, Says Local Expert

For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

A South Korean expert has suggested that the recent Upbit breach may have originated from a high-level mathematical exploit targeting flaws in the exchange’s signature or random-number generation system.

Rather than a conventional wallet compromise, the attack appears to have leveraged subtle nonce-bias patterns embedded in millions of Solana transactions—an approach requiring advanced cryptographic expertise and significant computational resources.

Sponsored

Sponsored

Technical Analysis of the Breach

On Friday, Upbit operator Dunamu’s CEO Kyoungsuk Oh issued a public apology regarding the Upbit incident, acknowledging that the company had discovered a security flaw that allowed an attacker to infer private keys by analyzing a large number of Upbit wallet transactions exposed on the blockchain. His statement, however, raised immediate questions about how private keys could be stolen through transaction data.

The next day, Professor Jaewoo Cho of Hansung University provided insight into the breach, linking it to biased or predictable nonces within Upbit’s internal signing system. Rather than typical ECDSA nonce-reuse flaws, this method exploited subtle statistical patterns in the platform’s cryptography. Cho explained that attackers could examine millions of leaked signatures, infer bias patterns, and ultimately recover private keys.

This perspective aligns with recent studies showing that affinely related ECDSA nonces create a significant risk. A 2025 study on arXiv demonstrated that just two signatures with such related nonces can expose private keys. As a result, private key extraction becomes far easier for attackers who can gather large datasets from exchanges.

The level of technical sophistication suggests an organized group with advanced cryptographic skills conducted this exploit. According to Cho, identifying minimal bias across millions of signatures requires not only mathematical expertise but also extensive computational resources.

In response to the incident, Upbit moved all remaining assets to secure cold wallets and halted digital asset deposits and withdrawals. The exchange has also pledged to restore any losses from its reserves, ensuring immediate damage control.

Sponsored

Sponsored

Extent and Security Implications

Evidence from a Korean researcher indicates that hackers gained access not only to the exchange’s hot wallet but also to individual deposit wallets. This may point to the compromise of sweep-authority keys—or even the private keys themselves—signaling a grave security breach.

Another researcher points out that, if private keys were exposed, Upbit could be forced to comprehensively overhaul its security systems, including its hardware security modules (HSM), multi-party computation (MPC), and wallet structures. This scenario raises questions about internal controls, indicating possible insider involvement and placing Upbit’s reputation at risk. The extent of the attack highlights the need for robust security protocols and strict access controls across major exchanges.

The incident illustrates that even highly engineered systems can conceal mathematical weaknesses. Effective nonce generation must ensure randomness and unpredictability. Detectable bias creates vulnerabilities that attackers can exploit. Organized attackers are increasingly capable of identifying and leveraging these flaws.

Research into ECDSA safeguards stresses that faulty randomness in nonce creation can leak key information. The Upbit case shows how theoretical vulnerabilities can translate into major real-world losses when attackers have the expertise and motivation to exploit them.

Timing and Industry Impact

The attack’s timing has fueled community speculation. It occurred exactly six years after a comparable Upbit breach in 2019, which was attributed to North Korean hackers. Furthermore, the hack coincided with the announcement of a major merger involving Naver Financial and Dunamu, Upbit’s parent company.

Online, some conspiracy theories about coordination or insider knowledge, while others suggest the attack could mask other motives, such as internal embezzlement. Although the clear technical evidence of a complex mathematical exploit points to a highly advanced attack by cybercriminals, critics say the pattern still mirrors longstanding concerns about Korean exchanges:

The 2019 Upbit case showed that North Korea-aligned entities had previously targeted major exchanges to evade sanctions through cyber theft. Although it’s unclear if the current incident involved state-sponsored actors, the advanced nature of the attack remains concerning.

Source: https://beincrypto.com/upbit-hack-sophisticated-mathematical-exploit/

Market Opportunity
Ambire Wallet Logo
Ambire Wallet Price(WALLET)
$0.00836
$0.00836$0.00836
0.00%
USD
Ambire Wallet (WALLET) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Franklin Templeton CEO Dismisses 50bps Rate Cut Ahead FOMC

Franklin Templeton CEO Dismisses 50bps Rate Cut Ahead FOMC

The post Franklin Templeton CEO Dismisses 50bps Rate Cut Ahead FOMC appeared on BitcoinEthereumNews.com. Franklin Templeton CEO Jenny Johnson has weighed in on whether the Federal Reserve should make a 25 basis points (bps) Fed rate cut or 50 bps cut. This comes ahead of the Fed decision today at today’s FOMC meeting, with the market pricing in a 25 bps cut. Bitcoin and the broader crypto market are currently trading flat ahead of the rate cut decision. Franklin Templeton CEO Weighs In On Potential FOMC Decision In a CNBC interview, Jenny Johnson said that she expects the Fed to make a 25 bps cut today instead of a 50 bps cut. She acknowledged the jobs data, which suggested that the labor market is weakening. However, she noted that this data is backward-looking, indicating that it doesn’t show the current state of the economy. She alluded to the wage growth, which she remarked is an indication of a robust labor market. She added that retail sales are up and that consumers are still spending, despite inflation being sticky at 3%, which makes a case for why the FOMC should opt against a 50-basis-point Fed rate cut. In line with this, the Franklin Templeton CEO said that she would go with a 25 bps rate cut if she were Jerome Powell. She remarked that the Fed still has the October and December FOMC meetings to make further cuts if the incoming data warrants it. Johnson also asserted that the data show a robust economy. However, she noted that there can’t be an argument for no Fed rate cut since Powell already signaled at Jackson Hole that they were likely to lower interest rates at this meeting due to concerns over a weakening labor market. Notably, her comment comes as experts argue for both sides on why the Fed should make a 25 bps cut or…
Share
BitcoinEthereumNews2025/09/18 00:36
Melania Trump humiliated her husband as he tries to outrun his decay: analysts

Melania Trump humiliated her husband as he tries to outrun his decay: analysts

First lady Melania Trump just handed President Donald Trump his biggest humiliation yet as the president tried to outrun his decay, according to two political analysts
Share
Rawstory2026/05/05 11:42
Peter Brandt Agrees: This COT Shift Could Be Bitcoin’s Biggest Bull Signal Since 2025

Peter Brandt Agrees: This COT Shift Could Be Bitcoin’s Biggest Bull Signal Since 2025

Peter Brandt backs a rare COT positioning flip in Bitcoin futures. McClellan says large specs turned net long with urgency. Is a rally coming? Three strikes. That
Share
LiveBitcoinNews2026/05/05 11:30

Starter Gold Rush: Win $2,500!

Starter Gold Rush: Win $2,500!Starter Gold Rush: Win $2,500!

Start your first trade & capture every Alpha move