According to findings by native cybersecurity agency East Security, the rip-off got here within the type of an e mail despatched to UpBit customers requesting account info.
The pretence was a faux giveaway, with the emails additionally containing a file referred to as “Event Winner Personal Information Collection and Usage Agreement.hwp,” which might run malicious code when opened.
UpBit had alerted merchants a day earlier than, warning anybody receiving an e mail from the tackle “[email protected]” to discard it.
“Please be aware that this mail just isn’t an e mail despatched from UpBit,” a tough translation of a press release launched on the time reads. It continues:
“If you obtain an e mail with an attachment with the same title that impersonates UpBit in future, please don’t obtain the file connected to the e-mail and delete the e-mail instantly.”
According to East Security, the emails have been the work of North Korean hacker group Kim Soo-Ki.
As Cointelegraph reported, North Korea continues to focus on the cryptocurrency trade worldwide, with United States FBI officers this week claiming such exercise was a direct response to sanctions positioned on its economic system.
“Sanctions are having an financial influence, so cyber operations are a way to generate profits, whether or not it’s by way of cryptocurrency mining or financial institution theft,” a senior FBI official warned.
UpBit is South Korea’s largest cryptocurrency trade, and the one one overseas’s high 5 platforms to file an total revenue in the course of the 2018 bear market.