CoinEx Confirms $70 Million Hack Due to Compromised Private Keys in Hot Wallets

CoinEx, a prominent cryptocurrency exchange, has confirmed that compromised private keys gave hackers access to its hot wallets, leading to a $70 million hack. In this article, we will delve into the details of CoinEx’s ongoing investigation, their response to the breach, the impact on their assets, compensation for affected users, the identity of the hackers, communication with the hackers, the root cause of the breach, measures taken by CoinEx, the timeline for resuming withdrawals, and the history of North Korean hackers in the cryptocurrency space.

CoinEx’s Investigation and Response

CoinEx representatives have provided Cointelegraph with in-depth information about their ongoing investigation. The team is working diligently to build and deploy a new wallet architecture, which aims to restore affected users and the functionality of the platform. By addressing the vulnerabilities and implementing robust security measures, CoinEx aims to strengthen the platform against future threats.

Impact on CoinEx’s Assets

Despite the significant $70 million hack, CoinEx claims that this amount represents a relatively small percentage of its total assets under management. This suggests that the exchange has taken precautions to safeguard a significant portion of its holdings and mitigate further losses.

Compensation for Affected Users

In a bid to restore user confidence, CoinEx has assured affected users that they will be fully compensated for any lost funds. By taking responsibility for the security breach and ensuring that users do not suffer financial losses, CoinEx aims to maintain its reputation as a trusted exchange within the cryptocurrency community.

Identity of Hackers

CoinEx is actively working to identify the individuals or group responsible for the security breach. Blockchain security firms have pointed to the North Korean Lazarus Group as potential culprits. However, this attribution is still under investigation, and CoinEx is leaving no stone unturned in its efforts to unveil the true identity of the hackers.

Communication with Hackers

In an unconventional move, CoinEx has opened communication channels with the hackers in hopes of proactively engaging towards a mutually agreeable resolution. While the success of this approach is uncertain, CoinEx is committed to exploring all possible avenues to mitigate the impact of the breach.

Root Cause of the Breach

CoinEx’s preliminary investigation suggests that the compromised private key for its hot wallets is the root cause of the breach. This highlights the critical importance of strong security measures and the need for continuous monitoring and risk assessment in the cryptocurrency industry.

Measures Taken by CoinEx

To prevent further losses, CoinEx promptly suspended its withdrawal service after detecting the hack. System vulnerabilities were promptly patched, and the remaining assets from the affected hot wallets were transferred to secure locations. These precautionary measures aim to protect the exchange’s assets and minimize the potential impact on users.

Timeline for Resuming Withdrawals

CoinEx has informed Cointelegraph that it anticipates resuming withdrawals progressively within seven working days. This timeline reflects the exchange’s commitment to swiftly addressing the issue and restoring normal operations for its users.

North Korean Hackers in the Cryptocurrency Space

This incident once again highlights the presence of North Korean hackers in the cryptocurrency industry. Over the past few years, these hackers have been responsible for some of the largest thefts in the space. Their sophisticated tactics and relentless targeting of exchanges and digital assets serve as a reminder of the ongoing cybersecurity challenges faced by the cryptocurrency community.

CoinEx’s confirmation of a $70 million hack due to compromised private keys underscores the crucial need for robust security measures in the cryptocurrency industry. While the exchange is working tirelessly to investigate the breach, restore functionality, and compensate affected users, this incident also serves as a broader reminder of the ongoing threats posed by cybercriminals, including state-sponsored hackers. By strengthening security systems and remaining vigilant, exchanges and users can help safeguard their digital assets in this evolving landscape.

Explore more

AI Redefines Software Engineering as Manual Coding Fades

The rhythmic clacking of mechanical keyboards, once the heartbeat of Silicon Valley innovation, is rapidly being replaced by the silent, instantaneous pulse of automated script generation. For decades, the ability to hand-write complex logic in languages like Python, Java, or C++ served as the ultimate gatekeeper to a world of prestige and high compensation. Today, that gate is being dismantled

Is Writing Code Becoming Obsolete in the Age of AI?

The 3,000-Developer Question: What Happens When the Keyboard Goes Quiet? The rhythmic tapping of mechanical keyboards that once echoed through every software engineering hub has gradually faded into a thoughtful silence as the industry pivots toward autonomous systems. This transformation was the focal point of a recent gathering of over 3,000 developers who sought to define their roles in a

Skills-Based Hiring Ends the Self-Inflicted Talent Crisis

The persistent disconnect between a company’s inability to fill open roles and the record-breaking volume of incoming applications suggests that modern recruitment has become its own worst enemy. While 65% of HR leaders believe the hiring power dynamic has finally shifted back in their favor, a staggering 62% simultaneously claim they are trapped in a persistent talent crisis. This paradox

AI and Gen Z Are Redefining the Entry-Level Job Market

The silent hum of a server rack now performs the tasks once reserved for the bright-eyed college graduate clutching a fresh diploma and a stack of business cards. This mechanical evolution represents a fundamental dismantling of the traditional corporate hierarchy, where the entry-level role served as a primary training ground for future leaders. As of 2026, the concept of “paying

How Can Recruiters Shift From Attraction to Seduction?

The traditional recruitment funnel has transformed into a complex psychological maze where simply posting a vacancy no longer guarantees a single qualified applicant. Talent acquisition teams now face a reality where the once-reliable job boards remain silent, reflecting a fundamental shift in how professionals view career mobility. This quietude signifies the end of a passive era, as the modern talent