Webinar January 27, 3:00 PM – 4:00 PM GMT+8

Inside a USD35m Exploit: What Every CEX Needs to Know About Hot-Wallet Compromise Risks

Earlier this year, one of the largest crypto exchanges in South Korea detected abnormal withdrawal activity from one of its hot wallets. Over the next 15+ minutes, ₩44.5B KRW (over ~$35M USD) was lost across hundreds of transactions before withdrawals were paused.

This attack wasn’t caused by a smart-contract flaw or user error. The pattern of withdrawals points clearly to a compromised hot-wallet signing flow – the same root cause behind recent multi-million-dollar breaches at Bybit, BTCTurk, SwissBorg, Phemex, and others.

In this webinar, we’ll go deep into:

  • How the exploit happened
  • The Broader Trend: Why CEX Breaches Are Accelerating
  • What Happened On-Chain
  • How Hexagate Stops These Attacks

See exactly how these systems detect anomalies within the first malicious interactions – and how CEXs can automate protective responses.

Learn how to turn an inevitable breach point into a contained incident – protecting users, operations, and your business.

Speakers