The North Korean–linked threat group UNC4899, also known as TraderTraitor, Jade Sleet, PUKCHONG, and Slow Pisces, carried out a sophisticated cyberattack against a cryptocurrency organization in 2025, ultimately stealing millions of dollars in digital assets. According to findings published in the Google Cloud H1 2026 Cloud Threat Horizons Report by Google Cloud, the campaign began with social engineering targeting a developer. The attackers convinced the victim to download an archive file under the guise of an open-source collaboration. The developer later transferred the file from a personal device to a corporate workstation using AirDrop, unintentionally introducing a malicious payload into the corporate environment. When the developer interacted with the archive through an AI-assisted IDE, embedded Python code executed a disguised binary that impersonated Kubernetes command-line tools, establishing a backdoor connection to an attacker-controlled server. Once the attackers gained access to the corporate system, they pivoted into the organization’s cloud infrastructure hosted on Google Cloud Platform. Using authenticated sessions and available credentials, the threat actors performed reconnaissance to identify cloud services and resources. They discovered a bastion host and manipulated its multi-factor authentication settings to maintain access. The attackers then navigated through Kubernetes environments and adopted a “living-off-the-cloud” technique, abusing legitimate DevOps workflows instead of deploying obvious malware. Persistence was achieved by modifying Kubernetes deployment configurations to automatically execute malicious bash commands when new pods were created. These commands downloaded additional backdoors and allowed the attackers to maintain stealthy control of the environment while gathering credentials and tokens from CI/CD resources. The attackers escalated privileges by injecting commands into Kubernetes resources tied to the CI/CD platform, exposing service account tokens in logs. With a high-privileged token, they accessed a sensitive infrastructure pod running in privileged mode, escaped the container, and deployed another backdoor for persistence. After further reconnaissance, they targeted workloads responsible for customer identity and cryptocurrency wallet management. By extracting poorly secured database credentials stored in environment variables, the attackers accessed the production database through a Cloud SQL proxy and executed SQL commands to modify user accounts. This included resetting passwords and updating MFA seeds for high-value accounts. Finally, they used these compromised accounts to withdraw millions in cryptocurrency. The incident highlights the risks of personal-to-corporate data transfer methods, insecure secret management, and overly privileged cloud workloads, emphasizing the need for stronger identity controls, secure DevOps practices, and strict endpoint policies.
A critical security vulnerability affecting multiple Hikvision surveillance products has been actively exploited and recently added to the U.S. The flaw has been included in the Kn...
Apache ZooKeeper, a widely used coordination service for distributed systems that manages configuration data, naming services, and synchronization, has recently received security u...
A cyber campaign is targeting macOS users through a fake website impersonating the popular utility CleanMyMac that distributes the infostealer SHub with ClickFix tactic. Instead of...