Skip to content

Crypto News Wire

Latest Crypto News And Analysis

Primary Menu

Crypto News Wire

  • Home
  • Contact
  • Crypto News
    • Altcoins News
    • Bitcoin News
    • Ethereum News
    • Mining News
    • Regulation
    • USDT
    • XRP
  • Blockchain
  • DeFi
  • Crypto News

N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto

August 1, 2025 Alex Rustok

Jul 31, 2025Ravie LakshmananCryptocurrency / Malware

The North Korea-linked threat actor known as UNC4899 has been attributed to attacks targeting two different organizations by approaching their employees via LinkedIn and Telegram.

“Under the guise of freelance opportunities for software development work, UNC4899 leveraged social engineering techniques to successfully convince the targeted employees to execute malicious Docker containers in their respective workstations,” Google’s cloud division said [PDF] in its Cloud Threat Horizons Report for H2 2025.

UNC4899 overlaps with activity tracked under the monikers Jade Sleet, PUKCHONG, Slow Pisces, and TraderTraitor. Active since at least 2020, the state-sponsored actor is known for its targeting of cryptocurrency and blockchain industries.

Notably, the hacking group has been implicated in significant cryptocurrency heists, including that of Axie Infinity in March 2022 ($625 million), DMM Bitcoin in May 2024 ($308 million), and Bybit in February 2025 ($1.4 billion).

Cybersecurity

Another example that highlights its sophistication is the suspected exploitation of JumpCloud’s infrastructure to target downstream customers within the cryptocurrency vertical.

According to DTEX, TraderTraitor is affiliated with the Third Bureau (or Department) of North Korea’s Reconnaissance General Bureau and is the most prolific of any of the Pyongyang hacking groups when it comes to cryptocurrency theft.

Attacks mounted by the threat actor have entailed leveraging job-themed lures or uploading malicious npm packages, and then approaching employees at target companies with a lucrative opportunity or asking them to collaborate on a GitHub project that would then lead to the execution of the rogue npm libraries.

“TraderTraitor has demonstrated a sustained interest in cloud-centric and cloud-adjacent attack surfaces, often with a final goal of compromising companies that are customers of cloud platforms rather than the platforms themselves,” cloud security firm Wiz said in a detailed report of TraderTraitor this week.

The attacks observed by Google Cloud targeted the respective organizations’ Google Cloud and Amazon Web Services (AWS) environments, paving the way for a downloader called GLASSCANNON that’s then used to serve backdoors like PLOTTWIST and MAZEWIRE that can establish connections with an attacker-controlled server.

In the incident involving the Google Cloud environment, the threat actors have been found to employ stolen credentials to interact remotely using Google Cloud CLI over an anonymous VPN service, carrying out extensive reconnaissance and credential theft activities. However, they were thwarted in their efforts due to the multi-factor authentication (MFA) configuration applied to the victim’s credentials.

“UNC4899 eventually determined the victim’s account had administrative privileges to the Google Cloud project and disabled the MFA requirements,” Google said. “After successfully gaining access to the targeted resources, they immediately re-enabled MFA to evade detection.”

The intrusion targeting the second victim’s AWS environment is said to have followed a similar playbook, only this time the attackers used long-term access keys obtained from an AWS credential file to interact remotely via AWS CLI.

Although the threat actors ran into access control roadblocks that prevented them from performing any sensitive actions, Google said it found evidence that likely indicated the theft of the user’s session cookies. These cookies were then used to identify relevant CloudFront configurations and S3 buckets.

undefined

UNC4899 “leveraged the inherent administrative permissions applied to their access to upload and replace existing JavaScript files with those containing malicious code, which were designed to manipulate cryptocurrency functions and trigger a transaction with the cryptocurrency wallet of a target organization,” Google said.

The attacks, in both cases, ended with the threat actors successfully withdrawing several million worth of cryptocurrency, the company added.

The development comes as Sonatype said it flagged and blocked 234 unique malware npm and PyPI packages attributed to North Korea’s Lazarus Group between January and July 2025. Some of these libraries are configured to drop a known credential stealer referred to as BeaverTail, which is associated with a long-running campaign dubbed Contagious Interview.

“These packages mimic popular developer tools but function as espionage implants, designed to steal secrets, profile hosts, and open persistent backdoors into critical infrastructure,” the software supply chain security firm said. “The surge of activity in H1 2025 demonstrates a strategic pivot: Lazarus is now embedding malware directly into open source package registries, namely npm and PyPI, at an alarming rate.”

Source link

Tags: Access, Account, Cloud, Computer security, Crypto, crypto news, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, data breach, hacker news, Hackers, hacking news, how to hack, information security, Job, Korean, Lures, Malware, Millions, network security, ransomware malware, software vulnerability, Steal, the hacker news

Continue Reading

Previous The DeFi Golden Age Has Just Begun
Next Strategy Announces Second Quarter 2025 Financial Results

More Stories

  • Bitcoin News
  • Crypto News

Bitcoin surges as Trump plans to sign executive order to allow crypto into 401(k)s

August 8, 2025 Alex Rustok
  • Crypto News

Trump signs order to allow crypto and real estate investments in retirement plans | Trump administration

August 8, 2025 Alex Rustok
  • Crypto News
  • DeFi

Dogecoin (DOGE) Bulls Fight to Maintain $0.20 Zone as DeFi Crypto Mutuum Finance (MUTM) Enters the Spotlight With Bigger Potential in 2025

August 8, 2025 Alex Rustok

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Posts

  • Bitcoin News
  • Crypto News

Bitcoin surges as Trump plans to sign executive order to allow crypto into 401(k)s

August 8, 2025 Alex Rustok
  • Crypto News

Trump signs order to allow crypto and real estate investments in retirement plans | Trump administration

August 8, 2025 Alex Rustok
  • Crypto News
  • DeFi

Dogecoin (DOGE) Bulls Fight to Maintain $0.20 Zone as DeFi Crypto Mutuum Finance (MUTM) Enters the Spotlight With Bigger Potential in 2025

August 8, 2025 Alex Rustok
  • Crypto News

Dogecoin and Solana Retreat 10% — Meanwhile, Analysts Say This Altcoin Could Be the Top Gainer of 2025

August 8, 2025 Alex Rustok
  • Crypto News
  • DeFi

NFTs stage comeback with $530M in July trades, flipping DeFi user activity

August 8, 2025 Alex Rustok
Copyright © All rights reserved. | CoverNews by AF themes.