Home OSINT News Signals
CRYPTO

UNC4899 Breaches Crypto Firm via AirDropped Trojan in Sophisticated Cloud Attack Chain

đź•“ 2 min read

A North Korean state-sponsored threat actor, tracked as UNC4899, has been identified as the perpetrator behind a sophisticated cloud compromise campaign targeting a cryptocurrency organization in 2025, resulting in the theft of millions of dollars in digital assets. The group, also known by the aliases Jade Sleet, PUKCHONG, Slow Pisces, and TraderTraitor, executed a multi-stage attack that cleverly blended social engineering with the exploitation of personal-to-corporate device workflows. According to Google's H1 2026 Cloud Threat Horizons Report, the incident is notable for its initial compromise vector—leveraging peer-to-peer (P2P) data transfer mechanisms like AirDrop—and its subsequent pivot to the cloud to employ "living-off-the-cloud" (LOTC) techniques, which abuse legitimate cloud services and workflows to evade detection.

The attack chain began with a highly targeted social engineering ploy. Threat actors deceived a developer into downloading a malicious archive file, presented as part of a legitimate open-source project collaboration. The developer then transferred this file from their personal Apple device to their corporate workstation using Apple's AirDrop feature, inadvertently bridging the gap between personal and corporate networks. Once on the company device, the developer used an AI-assisted Integrated Development Environment (IDE) to interact with the archive's contents. This action triggered the execution of embedded malicious Python code, which spawned a binary masquerading as the legitimate Kubernetes command-line tool (kubectl). This binary then established a connection to an attacker-controlled domain, functioning as a backdoor and providing the initial foothold on the corporate network.

With access secured, UNC4899 pivoted to the organization's Google Cloud environment. The attackers demonstrated a deep understanding of cloud-native technologies, abusing legitimate DevOps workflows to harvest credentials, escape container confines, and ultimately tamper with Cloud SQL databases. This phase of the attack exemplifies the LOTC methodology, where adversaries use the cloud environment's own tools and services—such as metadata servers, workload identities, and managed databases—to maintain persistence, move laterally, and execute their final objective without deploying traditional malware. In this case, the objective was to manipulate financial logic and transaction systems to facilitate the large-scale theft of cryptocurrency.

This campaign underscores a significant evolution in the tactics of North Korean cyber units, which are increasingly focused on financing the regime through cryptocurrency theft. The operation highlights several critical security challenges: the risks of blurred lines between personal and corporate devices, the vulnerabilities introduced by AI-assisted development tools that may auto-execute code, and the sophisticated abuse of cloud infrastructure. For organizations, particularly in the high-value crypto sector, the incident is a stark reminder to enforce strict policies on data transfer between devices, implement robust cloud security posture management (CSPM), and assume that sophisticated adversaries will attempt to "live off the land" within their cloud environments.

Telegram X LinkedIn
Back to News