{"id":25434,"date":"2025-11-28T17:00:34","date_gmt":"2025-11-28T17:00:34","guid":{"rendered":"https:\/\/www.criptofacil.com\/es\/?p=25434"},"modified":"2025-11-28T18:52:48","modified_gmt":"2025-11-28T18:52:48","slug":"grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit","status":"publish","type":"post","link":"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/","title":{"rendered":"Grupo Lazarus es el principal sospechoso del hackeo de USD 36 millones contra UpBit"},"content":{"rendered":"<p>Investigadores surcoreanos atribuyen<strong> al grupo de hackers norcoreano Lazarus el reciente ataque cibern\u00e9tico que result\u00f3 en el robo de cerca de 45 mil millones de won (USD 36 millones) en criptomonedas de UpBit, la mayor plataforma de intercambio del pa\u00eds.<\/strong> Seg\u00fan un reportaje de la agencia coreana Yonhap News, fuentes gubernamentales y de la industria confirmaron que la investigaci\u00f3n avanza en esta direcci\u00f3n. Est\u00e1 en los planes de los investigadores realizar una <strong>inspecci\u00f3n presencial en las instalaciones de la empresa.<\/strong><\/p>\n<p>La operadora de UpBit, Dunamu, hab\u00eda anunciado el jueves (27) <strong>el ataque hacker a UpBit despu\u00e9s de identificar una transferencia no autorizada de 44,5 mil millones de won en activos vinculados a Solana.<\/strong> La empresa asegur\u00f3 que cubrir\u00e1 \u00edntegramente las p\u00e9rdidas con recursos propios, buscando tranquilizar a sus usuarios.<\/p>\n<p>La sospecha sobre Lazarus, seg\u00fan detall\u00f3 Yonhap News, no es infundada.<strong> El mismo grupo es se\u00f1alado como responsable del robo de Ethereum equivalente a 58 mil millones de won en UpBit en 2019<\/strong>. De acuerdo con las autoridades consultadas por la agencia, los m\u00e9todos utilizados en el ataque m\u00e1s reciente son extremadamente similares a los empleados en aquel episodio.<\/p>\n<ul>\n<li>Lee tambi\u00e9n: <a style=\"font-size: 16px;background-color: #ffffff\" href=\"https:\/\/www.criptofacil.com\/es\/spacex-mueve-mas-de-usd-105-millones-en-bitcoin-en-una-nueva-transferencia\/\">SpaceX mueve m\u00e1s de USD 105 millones en Bitcoin en una nueva transferencia<\/a><\/li>\n<\/ul>\n<h2>M\u00e9todo de ataque y motivaci\u00f3n<\/h2>\n<p>A diferencia de un ataque directo a los servidores, las evidencias reportadas por Yonhap sugieren que los <strong>hackers podr\u00edan haber comprometido cuentas de administradores o haberse hecho pasar por ellos para autorizar las transacciones.<\/strong><\/p>\n<blockquote><p>\u201cEn lugar de atacar el servidor, es posible que los hackers hayan comprometido las cuentas de los administradores o se hayan hecho pasar por ellos para realizar la transferencia\u201d, detall\u00f3 un funcionario del gobierno a la agencia.<\/p><\/blockquote>\n<p>Especialistas relacionan el ataque con el contexto geopol\u00edtico, se\u00f1alando que Pyongyang ha intensificado sus esfuerzos para obtener fondos en el extranjero. <strong>Lazarus act\u00faa como un brazo financiero crucial para el r\u00e9gimen, que enfrenta severas sanciones internacionales y escasez de divisas.<\/strong><\/p>\n<h2>Estrategia para lavar el dinero<\/h2>\n<p>La complejidad del grupo fue destacada por un oficial de seguridad en declaraciones a Yonhap News, quien explic\u00f3 la t\u00e1ctica posterior al robo.<\/p>\n<blockquote><p>\u201cEsta es la t\u00e1ctica de Lazarus: transferir criptomonedas a billeteras en otras plataformas y tratar de lavar el dinero\u201d.<\/p><\/blockquote>\n<p>Ese proceso, que incluye <strong>m\u00faltiples transferencias y conversiones, busca dificultar al m\u00e1ximo el rastreo y la recuperaci\u00f3n de los fondos.<\/strong><\/p>\n<p>Adem\u00e1s, el momento del ataque tambi\u00e9n llama la atenci\u00f3n. Ocurri\u00f3 un d\u00eda despu\u00e9s de que<strong> Naver Corp., la mayor operadora de buscadores de Corea del Sur, anunciara la adquisici\u00f3n de Dunamu como subsidiaria integral de Naver Financial.<\/strong> La coincidencia en el timing podr\u00eda no ser accidental.<\/p>\n<p><strong>\u201cLos hackers tienen una fuerte tendencia a la autoexposici\u00f3n\u201d<\/strong>, coment\u00f3 otro funcionario del \u00e1rea de seguridad a Yonhap, sugiriendo que el grupo puede buscar no solo beneficios econ\u00f3micos, sino tambi\u00e9n notoriedad e impacto medi\u00e1tico, eligiendo momentos de alta visibilidad para sus acciones.<\/p>\n<p>Sin embargo, la investigaci\u00f3n, con base en la informaci\u00f3n obtenida por Yonhap News, contin\u00faa, con las autoridades enfocadas en rastrear los activos digitales y entender en detalle la brecha de seguridad explotada por el grupo Lazarus.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Investigadores surcoreanos atribuyen al grupo de hackers norcoreano Lazarus el reciente ataque cibern\u00e9tico que result\u00f3 en el robo de cerca de 45 mil millones de won (USD 36 millones) en criptomonedas de UpBit, la mayor plataforma de intercambio del pa\u00eds. Seg\u00fan un reportaje de la agencia coreana Yonhap News, fuentes gubernamentales y de la industria [&hellip;]<\/p>\n","protected":false},"author":140,"featured_media":25435,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1760],"tags":[1779,1771,1831,1767,1758],"class_list":["post-25434","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mercado","tag-criptoactivos","tag-criptomonedas","tag-hack","tag-mercado","tag-titular"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Grupo Lazarus es el principal sospechoso del hackeo de USD 36 millones contra UpBit<\/title>\n<meta name=\"description\" content=\"Especialistas y autoridades identifican similitudes con el ataque de 2019 y se\u00f1alan una t\u00e1ctica de lavado de dinero para eludir el rastreo\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Grupo Lazarus es el principal sospechoso del hackeo de USD 36 millones contra UpBit\" \/>\n<meta property=\"og:description\" content=\"Especialistas y autoridades identifican similitudes con el ataque de 2019 y se\u00f1alan una t\u00e1ctica de lavado de dinero para eludir el rastreo\" \/>\n<meta property=\"og:site_name\" content=\"CriptoF\u00e1cil Espa\u00f1ol\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/criptomoedasfacil\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-28T17:00:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-28T18:52:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.criptofacil.com\/es\/wp-content\/uploads\/sites\/2\/2025\/11\/lazarus-criptomoedas-1536x806-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"806\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Diego Vieira\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@criptofacil\" \/>\n<meta name=\"twitter:site\" content=\"@criptofacil\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Diego Vieira\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/\"},\"author\":{\"name\":\"Diego Vieira\",\"@id\":\"https:\/\/www.criptofacil.com\/es\/#\/schema\/person\/cf1a90acabb1093ec55d03dc41bf149d\"},\"headline\":\"Grupo Lazarus es el principal sospechoso del hackeo de USD 36 millones contra UpBit\",\"datePublished\":\"2025-11-28T17:00:34+00:00\",\"dateModified\":\"2025-11-28T18:52:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/\"},\"wordCount\":557,\"publisher\":{\"@id\":\"https:\/\/www.criptofacil.com\/es\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.criptofacil.com\/es\/wp-content\/uploads\/sites\/2\/2025\/11\/lazarus-criptomoedas-1536x806-1.png\",\"keywords\":[\"Criptoactivos\",\"Criptomonedas\",\"Hack\",\"Mercado\",\"Titular\"],\"articleSection\":[\"Mercado\"],\"inLanguage\":\"es\",\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.criptofacil.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/\",\"url\":\"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/\",\"name\":\"Grupo Lazarus es el principal sospechoso del hackeo de USD 36 millones contra UpBit\",\"isPartOf\":{\"@id\":\"https:\/\/www.criptofacil.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.criptofacil.com\/es\/wp-content\/uploads\/sites\/2\/2025\/11\/lazarus-criptomoedas-1536x806-1.png\",\"datePublished\":\"2025-11-28T17:00:34+00:00\",\"dateModified\":\"2025-11-28T18:52:48+00:00\",\"description\":\"Especialistas y autoridades identifican similitudes con el ataque de 2019 y se\u00f1alan una t\u00e1ctica de lavado de dinero para eludir el rastreo\",\"breadcrumb\":{\"@id\":\"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/#primaryimage\",\"url\":\"https:\/\/www.criptofacil.com\/es\/wp-content\/uploads\/sites\/2\/2025\/11\/lazarus-criptomoedas-1536x806-1.png\",\"contentUrl\":\"https:\/\/www.criptofacil.com\/es\/wp-content\/uploads\/sites\/2\/2025\/11\/lazarus-criptomoedas-1536x806-1.png\",\"width\":1536,\"height\":806,\"caption\":\"Grupo Lazarus es el principal sospechoso del hackeo de USD 36 millones contra UpBit\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.criptofacil.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Grupo Lazarus es el principal sospechoso del hackeo de USD 36 millones contra UpBit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.criptofacil.com\/es\/#website\",\"url\":\"https:\/\/www.criptofacil.com\/es\/\",\"name\":\"CriptoF\u00e1cil Espa\u00f1ol\",\"description\":\"Noticias sobre Bitcoin, Criptomonedas, DeFi, NFT, Web3 y Blockchain\",\"publisher\":{\"@id\":\"https:\/\/www.criptofacil.com\/es\/#organization\"},\"alternateName\":\"CriptoF\u00e1cil\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.criptofacil.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.criptofacil.com\/es\/#organization\",\"name\":\"CriptoF\u00e1cil\",\"url\":\"https:\/\/www.criptofacil.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.criptofacil.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.criptofacil.com\/es\/wp-content\/uploads\/sites\/2\/2025\/07\/logo-criptofacil.png\",\"contentUrl\":\"https:\/\/www.criptofacil.com\/es\/wp-content\/uploads\/sites\/2\/2025\/07\/logo-criptofacil.png\",\"width\":424,\"height\":104,\"caption\":\"CriptoF\u00e1cil\"},\"image\":{\"@id\":\"https:\/\/www.criptofacil.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/criptomoedasfacil\",\"https:\/\/x.com\/criptofacil\",\"https:\/\/youtube.com\/channel\/UCak-HWmXEqeC3KOjTN9Fr-Q?si=lWaoQK8jh5CRg1qt\",\"https:\/\/www.instagram.com\/criptofacil\/\",\"https:\/\/www.linkedin.com\/company\/criptofacil\/\",\"https:\/\/t.me\/criptomoedasfacil\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.criptofacil.com\/es\/#\/schema\/person\/cf1a90acabb1093ec55d03dc41bf149d\",\"name\":\"Diego Vieira\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.criptofacil.com\/es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.criptofacil.com\/wp-content\/uploads\/2024\/11\/avatar_user_140_1732549544-96x96.jpg\",\"contentUrl\":\"https:\/\/www.criptofacil.com\/wp-content\/uploads\/2024\/11\/avatar_user_140_1732549544-96x96.jpg\",\"caption\":\"Diego Vieira\"},\"description\":\"Diego Vieira \u00e9 analista e comunicador especializado em criptomoedas e blockchain, com forma\u00e7\u00e3o em Direito. Combina conhecimento t\u00e9cnico e regulat\u00f3rio para explicar o setor de forma clara e acess\u00edvel \u2014 sem investimentos pessoais no mercado, busca sempre priorizar a informa\u00e7\u00e3o.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/diegorvieira\"],\"url\":\"https:\/\/www.criptofacil.com\/es\/author\/diegovieira\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Grupo Lazarus es el principal sospechoso del hackeo de USD 36 millones contra UpBit","description":"Especialistas y autoridades identifican similitudes con el ataque de 2019 y se\u00f1alan una t\u00e1ctica de lavado de dinero para eludir el rastreo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/","og_locale":"es_ES","og_type":"article","og_title":"Grupo Lazarus es el principal sospechoso del hackeo de USD 36 millones contra UpBit","og_description":"Especialistas y autoridades identifican similitudes con el ataque de 2019 y se\u00f1alan una t\u00e1ctica de lavado de dinero para eludir el rastreo","og_site_name":"CriptoF\u00e1cil Espa\u00f1ol","article_publisher":"https:\/\/www.facebook.com\/criptomoedasfacil","article_published_time":"2025-11-28T17:00:34+00:00","article_modified_time":"2025-11-28T18:52:48+00:00","og_image":[{"width":1536,"height":806,"url":"https:\/\/www.criptofacil.com\/es\/wp-content\/uploads\/sites\/2\/2025\/11\/lazarus-criptomoedas-1536x806-1.png","type":"image\/png"}],"author":"Diego Vieira","twitter_card":"summary_large_image","twitter_creator":"@criptofacil","twitter_site":"@criptofacil","twitter_misc":{"Written by":"Diego Vieira","Est. reading time":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/#article","isPartOf":{"@id":"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/"},"author":{"name":"Diego Vieira","@id":"https:\/\/www.criptofacil.com\/es\/#\/schema\/person\/cf1a90acabb1093ec55d03dc41bf149d"},"headline":"Grupo Lazarus es el principal sospechoso del hackeo de USD 36 millones contra UpBit","datePublished":"2025-11-28T17:00:34+00:00","dateModified":"2025-11-28T18:52:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/"},"wordCount":557,"publisher":{"@id":"https:\/\/www.criptofacil.com\/es\/#organization"},"image":{"@id":"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.criptofacil.com\/es\/wp-content\/uploads\/sites\/2\/2025\/11\/lazarus-criptomoedas-1536x806-1.png","keywords":["Criptoactivos","Criptomonedas","Hack","Mercado","Titular"],"articleSection":["Mercado"],"inLanguage":"es","copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/www.criptofacil.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/","url":"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/","name":"Grupo Lazarus es el principal sospechoso del hackeo de USD 36 millones contra UpBit","isPartOf":{"@id":"https:\/\/www.criptofacil.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/#primaryimage"},"image":{"@id":"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.criptofacil.com\/es\/wp-content\/uploads\/sites\/2\/2025\/11\/lazarus-criptomoedas-1536x806-1.png","datePublished":"2025-11-28T17:00:34+00:00","dateModified":"2025-11-28T18:52:48+00:00","description":"Especialistas y autoridades identifican similitudes con el ataque de 2019 y se\u00f1alan una t\u00e1ctica de lavado de dinero para eludir el rastreo","breadcrumb":{"@id":"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/#primaryimage","url":"https:\/\/www.criptofacil.com\/es\/wp-content\/uploads\/sites\/2\/2025\/11\/lazarus-criptomoedas-1536x806-1.png","contentUrl":"https:\/\/www.criptofacil.com\/es\/wp-content\/uploads\/sites\/2\/2025\/11\/lazarus-criptomoedas-1536x806-1.png","width":1536,"height":806,"caption":"Grupo Lazarus es el principal sospechoso del hackeo de USD 36 millones contra UpBit"},{"@type":"BreadcrumbList","@id":"https:\/\/www.criptofacil.com\/es\/grupo-lazarus-es-el-principal-sospechoso-del-hackeo-de-usd-36-millones-contra-upbit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.criptofacil.com\/es\/"},{"@type":"ListItem","position":2,"name":"Grupo Lazarus es el principal sospechoso del hackeo de USD 36 millones contra UpBit"}]},{"@type":"WebSite","@id":"https:\/\/www.criptofacil.com\/es\/#website","url":"https:\/\/www.criptofacil.com\/es\/","name":"CriptoF\u00e1cil Espa\u00f1ol","description":"Noticias sobre Bitcoin, Criptomonedas, DeFi, NFT, Web3 y Blockchain","publisher":{"@id":"https:\/\/www.criptofacil.com\/es\/#organization"},"alternateName":"CriptoF\u00e1cil","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.criptofacil.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.criptofacil.com\/es\/#organization","name":"CriptoF\u00e1cil","url":"https:\/\/www.criptofacil.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.criptofacil.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.criptofacil.com\/es\/wp-content\/uploads\/sites\/2\/2025\/07\/logo-criptofacil.png","contentUrl":"https:\/\/www.criptofacil.com\/es\/wp-content\/uploads\/sites\/2\/2025\/07\/logo-criptofacil.png","width":424,"height":104,"caption":"CriptoF\u00e1cil"},"image":{"@id":"https:\/\/www.criptofacil.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/criptomoedasfacil","https:\/\/x.com\/criptofacil","https:\/\/youtube.com\/channel\/UCak-HWmXEqeC3KOjTN9Fr-Q?si=lWaoQK8jh5CRg1qt","https:\/\/www.instagram.com\/criptofacil\/","https:\/\/www.linkedin.com\/company\/criptofacil\/","https:\/\/t.me\/criptomoedasfacil"]},{"@type":"Person","@id":"https:\/\/www.criptofacil.com\/es\/#\/schema\/person\/cf1a90acabb1093ec55d03dc41bf149d","name":"Diego Vieira","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.criptofacil.com\/es\/#\/schema\/person\/image\/","url":"https:\/\/www.criptofacil.com\/wp-content\/uploads\/2024\/11\/avatar_user_140_1732549544-96x96.jpg","contentUrl":"https:\/\/www.criptofacil.com\/wp-content\/uploads\/2024\/11\/avatar_user_140_1732549544-96x96.jpg","caption":"Diego Vieira"},"description":"Diego Vieira \u00e9 analista e comunicador especializado em criptomoedas e blockchain, com forma\u00e7\u00e3o em Direito. Combina conhecimento t\u00e9cnico e regulat\u00f3rio para explicar o setor de forma clara e acess\u00edvel \u2014 sem investimentos pessoais no mercado, busca sempre priorizar a informa\u00e7\u00e3o.","sameAs":["https:\/\/www.linkedin.com\/in\/diegorvieira"],"url":"https:\/\/www.criptofacil.com\/es\/author\/diegovieira\/"}]}},"_links":{"self":[{"href":"https:\/\/www.criptofacil.com\/es\/wp-json\/wp\/v2\/posts\/25434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.criptofacil.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.criptofacil.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.criptofacil.com\/es\/wp-json\/wp\/v2\/users\/140"}],"replies":[{"embeddable":true,"href":"https:\/\/www.criptofacil.com\/es\/wp-json\/wp\/v2\/comments?post=25434"}],"version-history":[{"count":1,"href":"https:\/\/www.criptofacil.com\/es\/wp-json\/wp\/v2\/posts\/25434\/revisions"}],"predecessor-version":[{"id":25436,"href":"https:\/\/www.criptofacil.com\/es\/wp-json\/wp\/v2\/posts\/25434\/revisions\/25436"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.criptofacil.com\/es\/wp-json\/wp\/v2\/media\/25435"}],"wp:attachment":[{"href":"https:\/\/www.criptofacil.com\/es\/wp-json\/wp\/v2\/media?parent=25434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.criptofacil.com\/es\/wp-json\/wp\/v2\/categories?post=25434"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.criptofacil.com\/es\/wp-json\/wp\/v2\/tags?post=25434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}