UNC4899: North Korea’s Cyber Threat Landscape
Overview of the Threat Actor
The hacking group known as UNC4899, linked to North Korea, has recently come under scrutiny for targeting various organizations through platforms like LinkedIn and Telegram. This group operates under the pretense of offering freelance software development work, using social engineering tactics to persuade employees into executing harmful Docker containers on their systems. Such incidents were highlighted in Google’s Cloud Threat Horizons Report for the second half of 2025.
Notable Operations and Affiliations
UNC4899 has been active since at least 2020 and has also been identified by other names, including Jade Sleet, PUKCHONG, Slow Pisces, and TraderTraitor. This state-sponsored entity focuses predominantly on sectors related to cryptocurrency and blockchain technology. Past operations have led to significant cryptocurrency breaches, with high-profile thefts from platforms such as Axie Infinity ($625 million in March 2022), DMM Bitcoin ($308 million in May 2024), and Bybit ($1.4 billion in February 2025).
Tactics and Techniques Employed
One of the distinctive tactics employed by UNC4899 involves creating job-themed lures or uploading malicious npm packages. They often approach potential victims with enticing offers or collaborative projects on GitHub, tricking employees into running compromised libraries. As reported by cybersecurity experts, this group demonstrated a keen interest in targeting "cloud-centric and cloud-adjacent" systems, aims at infiltrating organizations that utilize cloud service platforms rather than the platforms themselves.
Case Studies of Recent Attacks
Two specific attacks have been analyzed in detail. In the first, UNC4899 targeted a Google Cloud environment, utilizing stolen credentials to remotely access the platform through Google Cloud CLI over an anonymous VPN. Although these intrusions initially faced multi-factor authentication (MFA) barriers, the attackers managed to disable these safeguards, gaining administrative access to the project at hand. They later re-enabled MFA in an attempt to cover their tracks.
In a separate incident involving an AWS environment, the group similarly gained access through long-term credentials extracted from an AWS credential file. Although they encountered access control limitations, there were indications of session cookie theft, allowing them to investigate sensitive S3 bucket configurations and CloudFront settings.
The Sophistication of UNC4899
The group’s operations reflect a high level of sophistication. In one particular instance, UNC4899 allegedly exploited JumpCloud’s infrastructure to reach downstream cryptocurrency clients. Such actions underscore their ambition to infiltrate organizations deeply embedded in the digital currency ecosystem.
One notable example of UNC4899’s capabilities is their ability to upload malicious code that manipulates cryptocurrency functions within targeted organizations. By exploiting administrative permissions, they replaced legitimate JavaScript files with rogue versions, ultimately triggering unauthorized cryptocurrency transactions.
The Broader Context of North Korean Cyber Operations
Recent reports indicate that Sonatype has flagged over 234 malware-laden npm and PyPI packages linked to North Korea’s Lazarus Group between January and July 2025. Many of these malicious packages are disguised as popular developer tools and are designed to function as espionage implants, with capabilities to access sensitive information and establish enduring backdoors in critical infrastructures.
These revelations point towards a noticeable strategic shift within North Korea’s cyber operations, as Lazarus has begun embedding malware directly into open-source package registries like npm and PyPI—a concerning trend that reflects their ongoing adaptability and resourcefulness in the cyber realm.
By leveraging these sophisticated techniques and tools, UNC4899 continues to pose a significant threat, especially to organizations involved in cryptocurrency, ultimately reinforcing the need for heightened cybersecurity measures across the board.


