The North Korean–linked threat group UNC4899, also known as TraderTraitor, Jade Sleet, PUKCHONG, and Slow Pisces, carried out a sophisticated cyberattack against a cryptocurrency organization in 2025, ultimately stealing millions of dollars in digital assets. According to findings published in the Google Cloud H1 2026 Cloud Threat Horizons Report by Google Cloud, the campaign began with social engineering targeting a developer. The attackers convinced the victim to download an archive file under the guise of an open-source collaboration. The developer later transferred the file from a personal device to a corporate workstation using AirDrop, unintentionally introducing a malicious payload into the corporate environment. When the developer interacted with the archive through an AI-assisted IDE, embedded Python code executed a disguised binary that impersonated Kubernetes command-line tools, establishing a backdoor connection to an attacker-controlled server. Once the attackers gained access to the corporate system, they pivoted into the organization’s cloud infrastructure hosted on Google Cloud Platform. Using authenticated sessions and available credentials, the threat actors performed reconnaissance to identify cloud services and resources. They discovered a bastion host and manipulated its multi-factor authentication settings to maintain access. The attackers then navigated through Kubernetes environments and adopted a “living-off-the-cloud” technique, abusing legitimate DevOps workflows instead of deploying obvious malware. Persistence was achieved by modifying Kubernetes deployment configurations to automatically execute malicious bash commands when new pods were created. These commands downloaded additional backdoors and allowed the attackers to maintain stealthy control of the environment while gathering credentials and tokens from CI/CD resources. The attackers escalated privileges by injecting commands into Kubernetes resources tied to the CI/CD platform, exposing service account tokens in logs. With a high-privileged token, they accessed a sensitive infrastructure pod running in privileged mode, escaped the container, and deployed another backdoor for persistence. After further reconnaissance, they targeted workloads responsible for customer identity and cryptocurrency wallet management. By extracting poorly secured database credentials stored in environment variables, the attackers accessed the production database through a Cloud SQL proxy and executed SQL commands to modify user accounts. This included resetting passwords and updating MFA seeds for high-value accounts. Finally, they used these compromised accounts to withdraw millions in cryptocurrency. The incident highlights the risks of personal-to-corporate data transfer methods, insecure secret management, and overly privileged cloud workloads, emphasizing the need for stronger identity controls, secure DevOps practices, and strict endpoint policies.
High value organizations across South, Southeast, and East Asia have been targeted in a long-running cyber campaign attributed to a Chinese-linked threat cluster known as CL UNK 10...
Cybersecurity researchers have discovered that two Google Chrome extensions—QuickLens – Search Screen with Google Lens and ShotBird – Scrolling Screenshots, Tweet Images & Ed...
The .arpa TLD is a special namespace in the Domain Name System (DNS) intended solely for technical infrastructure purposes—primarily reverse DNS lookups that map IP addresses bac...