New North Korean Hacker Group ‘Moonstone Sleet’ Revealed by Microsoft

Published:

spot_img

North Korean Threat Actor Moonstone Sleet Behind Cyber Attacks Targeting Software and IT Sector

A new North Korean threat actor, codenamed Moonstone Sleet, has emerged, targeting individuals and organizations in the software, education, and defense sectors with ransomware and bespoke malware similar to the Lazarus Group. Moonstone Sleet uses tactics like setting up fake companies, employing trojanized versions of legitimate tools, and creating malicious games to infiltrate targets.

Microsoft’s Threat Intelligence team identified Moonstone Sleet as a state-aligned group utilizing tactics from other North Korean threat actors, such as Lazarus, but with unique attack methodologies. The group has been observed using code from known malware like Comebacker and PuTTY to infiltrate systems and execute payloads received from Command-and-Control servers.

In addition to using malicious software, Moonstone Sleet also pursues employment in legitimate software development positions to generate revenue for North Korea or gain access to organizations. The group has been observed utilizing tactics like sending trojanized PuTTY executables via LinkedIn and Telegram, as well as distributing malicious npm packages through messaging platforms.

Moonstone Sleet has also been linked to the creation of fake companies, such as C.C. Waterfall and StarGlow Ventures, to engage with targets through email and social engineering campaigns. The group recently deployed a custom ransomware variant called FakePenny against a defense technology company, demanding a $6.6 million ransom in Bitcoin.

As the threat from Moonstone Sleet grows, Microsoft is urging software companies to be vigilant against supply chain attacks and enhance their security measures to defend against this emerging threat actor. This disclosure comes amidst South Korea’s accusations against North Korea, particularly the Lazarus Group, for stealing data and documents from a court network.

spot_img

Related articles

Recent articles

Urgent: Patch GoAnywhere MFT Vulnerability in Fortra Fixes 10.0 Now!

Fortra has recently addressed a critical vulnerability in its GoAnywhere Managed File Transfer (MFT) software. Users are strongly encouraged to apply the...

Senate Panel Reports No Telecom Breaches on Dark Web in Two Years

Senate Committee Discusses Telecom Data Security and 5G Spectrum Auction Overview of Recent Developments On September 19, the Senate Standing Committee on Information Technology and Telecommunication...

RemitHope Aims to Raise $100,000 for 10 Grassroots Organizations in Africa

RemitHope Launches 100 for 10 Campaign to Support African Communities RemitHope, a groundbreaking fintech social enterprise founded by philanthropist Tsitsi Masiyiwa,...

Surge in Cyberattacks Linked to Misconfigurations: Insights from SonicWall 2025

The Unseen Threat: Misconfigurations Fueling Cyberattacks In an age where digital transformation is accelerating at an unprecedented pace, cybersecurity has emerged as a paramount concern...