Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto

Posted on July 31, 2025July 31, 2025 By CWS

Jul 31, 2025Ravie LakshmananCryptocurrency / Malware
The North Korea-linked risk actor referred to as UNC4899 has been attributed to assaults focusing on two completely different organizations by approaching their staff by way of LinkedIn and Telegram.
“Beneath the guise of freelance alternatives for software program improvement work, UNC4899 leveraged social engineering strategies to efficiently persuade the focused staff to execute malicious Docker containers of their respective workstations,” Google’s cloud division mentioned [PDF] in its Cloud Risk Horizons Report for H2 2025.
UNC4899 overlaps with exercise tracked beneath the monikers Jade Sleet, PUKCHONG, Gradual Pisces, and TraderTraitor. Energetic since not less than 2020, the state-sponsored actor is thought for its focusing on of cryptocurrency and blockchain industries.
Notably, the hacking group has been implicated in vital cryptocurrency heists, together with that of Axie Infinity in March 2022 ($625 million), DMM Bitcoin in Might 2024 ($308 million), and Bybit in February 2025 ($1.4 billion).

One other instance that highlights its sophistication is the suspected exploitation of JumpCloud’s infrastructure to focus on downstream prospects throughout the cryptocurrency vertical.
In response to DTEX, TraderTraitor is affiliated with the Third Bureau (or Division) of North Korea’s Reconnaissance Normal Bureau and is essentially the most prolific of any of the Pyongyang hacking teams in terms of cryptocurrency theft.

Assaults mounted by the risk actor have entailed leveraging job-themed lures or importing malicious npm packages, after which approaching staff at goal corporations with a profitable alternative or asking them to collaborate on a GitHub mission that might then result in the execution of the rogue npm libraries.

“TraderTraitor has demonstrated a sustained curiosity in cloud-centric and cloud-adjacent assault surfaces, typically with a last objective of compromising corporations which might be prospects of cloud platforms slightly than the platforms themselves,” cloud safety agency Wiz mentioned in an in depth report of TraderTraitor this week.
The assaults noticed by Google Cloud focused the respective organizations’ Google Cloud and Amazon Net Companies (AWS) environments, paving the way in which for a downloader known as GLASSCANNON that is then used to serve backdoors like PLOTTWIST and MAZEWIRE that may set up connections with an attacker-controlled server.

Within the incident involving the Google Cloud setting, the risk actors have been discovered to make use of stolen credentials to work together remotely utilizing Google Cloud CLI over an nameless VPN service, finishing up in depth reconnaissance and credential theft actions. Nevertheless, they have been thwarted of their efforts because of the multi-factor authentication (MFA) configuration utilized to their credentials.
“UNC4899 finally decided the sufferer’s account had administrative privileges to the Google Cloud mission and disabled the MFA necessities,” Google mentioned. “After efficiently getting access to the focused assets, they instantly re-enabled MFA to evade detection.”
The intrusion focusing on the second sufferer’s AWS setting is claimed to have adopted an analogous playbook, solely this time the attackers used long-term entry keys obtained from an AWS credential file to work together remotely by way of AWS CLI.
Though the risk actors bumped into entry management roadblocks that prevented them from performing any delicate actions, Google mentioned it discovered proof that seemingly indicated the theft of the person’s session cookies. These cookies have been then used to establish related CloudFront configurations and S3 buckets.

UNC4899 “leveraged the inherent administrative permissions utilized to their entry to add and substitute current JavaScript information with these containing malicious code, which have been designed to control cryptocurrency capabilities and set off a transaction with the cryptocurrency pockets of a goal group,” Google mentioned.
The assaults, in each circumstances, ended with the risk actors efficiently withdrawing a number of million value of cryptocurrency, the corporate added.

The event comes as Sonatype mentioned it flagged and blocked 234 distinctive malware npm and PyPI packages attributed to North Korea’s Lazarus Group between January and July 2025. A few of these libraries are configured to drop a recognized credential stealer known as BeaverTail, which is related to a long-running marketing campaign dubbed Contagious Interview.
“These packages mimic widespread developer instruments however operate as espionage implants, designed to steal secrets and techniques, profile hosts, and open persistent backdoors into essential infrastructure,” the software program provide chain safety agency mentioned. “The surge of exercise in H1 2025 demonstrates a strategic pivot: Lazarus is now embedding malware immediately into open supply package deal registries, particularly npm and PyPI, at an alarming charge.”

The Hacker News Tags:Access, Account, Cloud, Crypto, Hackers, Job, Korean, Lures, Malware, Millions, Steal

Post navigation

Previous Post: Who’s Really Behind the Mask? Combatting Identity Fraud
Next Post: 20 Best Inventory Management Tools in 2025

Related Posts

Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents The Hacker News
New FileFix Method Emerges as a Threat Following 517% Rise in ClickFix Attacks The Hacker News
New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy The Hacker News
Google Launches DBSC Open Beta in Chrome and Enhances Patch Transparency via Project Zero The Hacker News
Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access The Hacker News
Are Forgotten AD Service Accounts Leaving You at Risk? The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Echo Raises $15M in Seed Funding for Vulnerability-Free Container Images
  • Bill Aims to Create National Strategy for Quantum Cybersecurity Migration
  • Search Engines are Indexing ChatGPT Conversations!
  • $1 Million Offered for WhatsApp Exploit at Pwn2Own Ireland 2025
  • Hackers Weaponizing Free Trials of EDR to Disable Existing EDR Protections

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Echo Raises $15M in Seed Funding for Vulnerability-Free Container Images
  • Bill Aims to Create National Strategy for Quantum Cybersecurity Migration
  • Search Engines are Indexing ChatGPT Conversations!
  • $1 Million Offered for WhatsApp Exploit at Pwn2Own Ireland 2025
  • Hackers Weaponizing Free Trials of EDR to Disable Existing EDR Protections

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News