N. Korean Hackers Exploit Job Offers and Malware to Steal Millions in Cryptocurrency

Published:

spot_img

UNC4899: North Korea’s Cyber Threat Landscape

Overview of the Threat Actor

The hacking group known as UNC4899, linked to North Korea, has recently come under scrutiny for targeting various organizations through platforms like LinkedIn and Telegram. This group operates under the pretense of offering freelance software development work, using social engineering tactics to persuade employees into executing harmful Docker containers on their systems. Such incidents were highlighted in Google’s Cloud Threat Horizons Report for the second half of 2025.

Notable Operations and Affiliations

UNC4899 has been active since at least 2020 and has also been identified by other names, including Jade Sleet, PUKCHONG, Slow Pisces, and TraderTraitor. This state-sponsored entity focuses predominantly on sectors related to cryptocurrency and blockchain technology. Past operations have led to significant cryptocurrency breaches, with high-profile thefts from platforms such as Axie Infinity ($625 million in March 2022), DMM Bitcoin ($308 million in May 2024), and Bybit ($1.4 billion in February 2025).

Tactics and Techniques Employed

One of the distinctive tactics employed by UNC4899 involves creating job-themed lures or uploading malicious npm packages. They often approach potential victims with enticing offers or collaborative projects on GitHub, tricking employees into running compromised libraries. As reported by cybersecurity experts, this group demonstrated a keen interest in targeting "cloud-centric and cloud-adjacent" systems, aims at infiltrating organizations that utilize cloud service platforms rather than the platforms themselves.

Case Studies of Recent Attacks

Two specific attacks have been analyzed in detail. In the first, UNC4899 targeted a Google Cloud environment, utilizing stolen credentials to remotely access the platform through Google Cloud CLI over an anonymous VPN. Although these intrusions initially faced multi-factor authentication (MFA) barriers, the attackers managed to disable these safeguards, gaining administrative access to the project at hand. They later re-enabled MFA in an attempt to cover their tracks.

In a separate incident involving an AWS environment, the group similarly gained access through long-term credentials extracted from an AWS credential file. Although they encountered access control limitations, there were indications of session cookie theft, allowing them to investigate sensitive S3 bucket configurations and CloudFront settings.

The Sophistication of UNC4899

The group’s operations reflect a high level of sophistication. In one particular instance, UNC4899 allegedly exploited JumpCloud’s infrastructure to reach downstream cryptocurrency clients. Such actions underscore their ambition to infiltrate organizations deeply embedded in the digital currency ecosystem.

One notable example of UNC4899’s capabilities is their ability to upload malicious code that manipulates cryptocurrency functions within targeted organizations. By exploiting administrative permissions, they replaced legitimate JavaScript files with rogue versions, ultimately triggering unauthorized cryptocurrency transactions.

The Broader Context of North Korean Cyber Operations

Recent reports indicate that Sonatype has flagged over 234 malware-laden npm and PyPI packages linked to North Korea’s Lazarus Group between January and July 2025. Many of these malicious packages are disguised as popular developer tools and are designed to function as espionage implants, with capabilities to access sensitive information and establish enduring backdoors in critical infrastructures.

These revelations point towards a noticeable strategic shift within North Korea’s cyber operations, as Lazarus has begun embedding malware directly into open-source package registries like npm and PyPI—a concerning trend that reflects their ongoing adaptability and resourcefulness in the cyber realm.

By leveraging these sophisticated techniques and tools, UNC4899 continues to pose a significant threat, especially to organizations involved in cryptocurrency, ultimately reinforcing the need for heightened cybersecurity measures across the board.

spot_img

Related articles

Recent articles

Webinar: Uncovering Suspicious APK Files in Wedding Card and Loan App Scams

The surge of malicious APK files in cyber fraud schemes, such as fake wedding invitations and instant loan applications, has become a growing concern....

Skylon Partners with COBNB to Launch COBNB+ Featuring L’Occitane en Provence Hotel Amenities

Skylon Partners with COBNB for a Luxurious Hospitality Experience in Kuala Lumpur Introduction to the New Partnership In an exciting development for the hospitality scene in...

Understanding CISA KEV: Key Insights and Tools for Security Teams

Understanding the CISA Known Exploited Vulnerability (KEV) Catalog The Cybersecurity and Infrastructure Security Agency (CISA) maintains the Known Exploited Vulnerability (KEV) catalog, a resource designed...

Dark Web Leak Sparks WFH Job Scams; Prayagraj Police Freeze ₹2 Crore in Fraudulent Funds

Rising Cybercrime in Prayagraj: A New Target Shifting Tactics of Cybercriminals In Prayagraj, the landscape of cybercrime is evolving. Previously, scammers predominantly targeted victims through enticing...