Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Hackers Target Crypto Firms in Sophisticated Attacks

North Korean Hackers Target Crypto Firms in Sophisticated Attacks

Posted on March 5, 2026 By CWS

A sophisticated cyber assault aimed at cryptocurrency companies has become a focal point for the cybersecurity community. Evidence suggests the involvement of North Korean state-backed hackers, raising concerns about the security of digital financial assets.

The attackers executed a meticulously planned assault across various segments of the cryptocurrency supply chain, including staking platforms and exchange software providers. This breach resulted in the theft of proprietary source code, private keys, and cloud-stored secrets.

Exploitation of Vulnerabilities

This operation showcased a blend of web application exploitation and the use of stolen cloud credentials, marking it as one of the most calculated intrusions in the cryptocurrency sector in recent months.

The attackers employed two primary entry methods. In one scenario, they exploited a known vulnerability, CVE-2025-55182, in the React2Shell framework. They utilized mass scanning and WAF bypass techniques to detect exposed cryptocurrency staking platforms.

In another approach, they utilized pre-obtained valid AWS access tokens, bypassing initial exploitation and directly engaging in cloud infrastructure enumeration. These tactics indicate a level of preparation that surpasses typical opportunistic hacking, targeting organizations managing significant digital assets.

Insights from Security Research

Researchers from Ctrl-Alt-Intel uncovered both intrusion chains by examining exposed open directories over a two-week period in January 2026. They retrieved files from the attackers’ infrastructure, including shell history logs and archived source code.

This rare insight into the attackers’ environment offered clear visibility into every phase of the operation, from initial access to command-and-control setup. In one incident, the attackers extracted backend source code from a compromised staking platform, which included hardcoded private keys for Tron blockchain wallets.

Blockchain records indicated the transfer of approximately 52.6 TRX during the active exploitation period. However, it remains uncertain whether these transfers were conducted by the suspected DPRK-linked actors or other entities.

Cloud Infrastructure Breaches

The attackers also targeted Docker container images from a cryptocurrency exchange, obtaining hardcoded database credentials and proprietary exchange logic. This activity aligns with North Korea’s documented strategy of pre-positioning for large-scale cryptocurrency theft.

In the cloud-focused phase, the attackers demonstrated a structured approach to AWS exploitation. After validating stolen credentials, they conducted an extensive enumeration of EC2 instances, RDS databases, and other AWS services, searching for sensitive information.

Using advanced techniques, they accessed Kubernetes clusters, extracted ConfigMaps and Kubernetes Secrets, and exfiltrated Docker container images. The attackers used innovative methods for command-and-control, including IPv6 connections that evade traditional detection tools.

Security teams are advised to address the CVE-2025-55182 vulnerability immediately and audit all publicly accessible web applications. AWS environments should implement least-privilege IAM policies and monitor for unusual API interactions. Strict controls are necessary for Terraform state files and source code should not contain hardcoded credentials.

Cyber Security News Tags:AWS exploitation, blockchain security, cloud credentials, cloud security, crypto attacks, cryptocurrency theft, Cybersecurity, Docker containers, IAM policies, Kubernetes security, North Korean hackers, React2Shell vulnerability, state-sponsored hacking, web application security

Post navigation

Previous Post: Cybercriminal Group Funnull Unleashes RingH23 Attack Arsenal

Related Posts

New JSCEAL Attack Targeting Crypto App Users To Steal Credentials and Wallets New JSCEAL Attack Targeting Crypto App Users To Steal Credentials and Wallets Cyber Security News
Axis Communications Vulnerability Exposes Azure Storage Account Credentials Axis Communications Vulnerability Exposes Azure Storage Account Credentials Cyber Security News
Cloudflare Warns of DDoS Attacks Targeting Journalists and News Organizations Cloudflare Warns of DDoS Attacks Targeting Journalists and News Organizations Cyber Security News
AI-Powered Cyber Attacks Accelerate Threat Landscape AI-Powered Cyber Attacks Accelerate Threat Landscape Cyber Security News
North Korean Cyber Threats Exploit IT Hiring Processes North Korean Cyber Threats Exploit IT Hiring Processes Cyber Security News
Link11 Identifies Five Cybersecurity Trends Shaping European Defense Strategies in 2026 Link11 Identifies Five Cybersecurity Trends Shaping European Defense Strategies in 2026 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Hackers Target Crypto Firms in Sophisticated Attacks
  • Cybercriminal Group Funnull Unleashes RingH23 Attack Arsenal
  • Threat Actors Exploit AI Tool to Spread Infostealer
  • Malware Campaign Targets Crypto Pros with Fake LinkedIn VCs
  • Cisco Highlights Exploitation of Catalyst SD-WAN Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Hackers Target Crypto Firms in Sophisticated Attacks
  • Cybercriminal Group Funnull Unleashes RingH23 Attack Arsenal
  • Threat Actors Exploit AI Tool to Spread Infostealer
  • Malware Campaign Targets Crypto Pros with Fake LinkedIn VCs
  • Cisco Highlights Exploitation of Catalyst SD-WAN Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News