CoinEx Confirms $70 Million Hack Due to Compromised Private Keys in Hot Wallets

CoinEx, a prominent cryptocurrency exchange, has confirmed that compromised private keys gave hackers access to its hot wallets, leading to a $70 million hack. In this article, we will delve into the details of CoinEx’s ongoing investigation, their response to the breach, the impact on their assets, compensation for affected users, the identity of the hackers, communication with the hackers, the root cause of the breach, measures taken by CoinEx, the timeline for resuming withdrawals, and the history of North Korean hackers in the cryptocurrency space.

CoinEx’s Investigation and Response

CoinEx representatives have provided Cointelegraph with in-depth information about their ongoing investigation. The team is working diligently to build and deploy a new wallet architecture, which aims to restore affected users and the functionality of the platform. By addressing the vulnerabilities and implementing robust security measures, CoinEx aims to strengthen the platform against future threats.

Impact on CoinEx’s Assets

Despite the significant $70 million hack, CoinEx claims that this amount represents a relatively small percentage of its total assets under management. This suggests that the exchange has taken precautions to safeguard a significant portion of its holdings and mitigate further losses.

Compensation for Affected Users

In a bid to restore user confidence, CoinEx has assured affected users that they will be fully compensated for any lost funds. By taking responsibility for the security breach and ensuring that users do not suffer financial losses, CoinEx aims to maintain its reputation as a trusted exchange within the cryptocurrency community.

Identity of Hackers

CoinEx is actively working to identify the individuals or group responsible for the security breach. Blockchain security firms have pointed to the North Korean Lazarus Group as potential culprits. However, this attribution is still under investigation, and CoinEx is leaving no stone unturned in its efforts to unveil the true identity of the hackers.

Communication with Hackers

In an unconventional move, CoinEx has opened communication channels with the hackers in hopes of proactively engaging towards a mutually agreeable resolution. While the success of this approach is uncertain, CoinEx is committed to exploring all possible avenues to mitigate the impact of the breach.

Root Cause of the Breach

CoinEx’s preliminary investigation suggests that the compromised private key for its hot wallets is the root cause of the breach. This highlights the critical importance of strong security measures and the need for continuous monitoring and risk assessment in the cryptocurrency industry.

Measures Taken by CoinEx

To prevent further losses, CoinEx promptly suspended its withdrawal service after detecting the hack. System vulnerabilities were promptly patched, and the remaining assets from the affected hot wallets were transferred to secure locations. These precautionary measures aim to protect the exchange’s assets and minimize the potential impact on users.

Timeline for Resuming Withdrawals

CoinEx has informed Cointelegraph that it anticipates resuming withdrawals progressively within seven working days. This timeline reflects the exchange’s commitment to swiftly addressing the issue and restoring normal operations for its users.

North Korean Hackers in the Cryptocurrency Space

This incident once again highlights the presence of North Korean hackers in the cryptocurrency industry. Over the past few years, these hackers have been responsible for some of the largest thefts in the space. Their sophisticated tactics and relentless targeting of exchanges and digital assets serve as a reminder of the ongoing cybersecurity challenges faced by the cryptocurrency community.

CoinEx’s confirmation of a $70 million hack due to compromised private keys underscores the crucial need for robust security measures in the cryptocurrency industry. While the exchange is working tirelessly to investigate the breach, restore functionality, and compensate affected users, this incident also serves as a broader reminder of the ongoing threats posed by cybercriminals, including state-sponsored hackers. By strengthening security systems and remaining vigilant, exchanges and users can help safeguard their digital assets in this evolving landscape.

Explore more

Resilience Becomes the New Velocity for DevOps in 2026

With extensive expertise in artificial intelligence, machine learning, and blockchain, Dominic Jainy has a unique perspective on the forces reshaping modern software delivery. As AI-driven development accelerates release cycles to unprecedented speeds, he argues that the industry is at a critical inflection point. The conversation has shifted from a singular focus on velocity to a more nuanced understanding of system

Can a Failed ERP Implementation Be Saved?

The ripple effect of a malfunctioning Enterprise Resource Planning system can bring a thriving organization to its knees, silently eroding operational efficiency, financial integrity, and employee morale. An ERP platform is meant to be the central nervous system of a business, unifying data and processes from finance to the supply chain. When it fails, the consequences are immediate and severe.

When Should You Upgrade to Business Central?

Introduction The operational rhythm of a growing business is often dictated by the efficiency of its core systems, yet many organizations find themselves tethered to outdated enterprise resource planning platforms that silently erode productivity and obscure critical insights. These legacy systems, once the backbone of operations, can become significant barriers to scalability, forcing teams into cycles of manual data entry,

Is Your ERP Ready for Secure, Actionable AI?

Today, we’re speaking with Dominic Jainy, an IT professional whose expertise lies at the intersection of artificial intelligence, machine learning, and enterprise systems. We’ll be exploring one of the most critical challenges facing modern businesses: securely and effectively connecting AI to the core of their operations, the ERP. Our conversation will focus on three key pillars for a successful integration:

Trend Analysis: Next-Generation ERP Automation

The long-standing relationship between users and their enterprise resource planning systems is being fundamentally rewritten, moving beyond passive data entry toward an active partnership with intelligent, autonomous agents. From digital assistants to these new autonomous entities, the nature of enterprise automation is undergoing a radical transformation. This analysis explores the leap from AI-powered suggestions to true, autonomous execution within ERP