North Korean Hackers Exploit Job Offers and Cloud Services to Steal Millions in Cryptocurrency

In a series of sophisticated cyberattacks, the North Korean state-sponsored hacking group known as UNC4899 has been implicated in targeting employees through deceptive job offers, leading to significant cryptocurrency thefts. Operating under aliases such as Jade Sleet, PUKCHONG, Slow Pisces, and TraderTraitor, this group has been active since at least 2020, focusing primarily on the cryptocurrency and blockchain sectors.

Deceptive Recruitment Tactics

UNC4899 employs social engineering techniques by posing as recruiters on platforms like LinkedIn and Telegram. They approach individuals with enticing freelance software development opportunities, convincing them to execute malicious Docker containers on their workstations. This method not only compromises the individual’s system but also provides a foothold into the organization’s broader network.

Major Cryptocurrency Heists

The group’s activities have led to some of the most significant cryptocurrency thefts in recent history. Notable incidents include:

– Axie Infinity (March 2022): $625 million stolen.

– DMM Bitcoin (May 2024): $308 million stolen.

– Bybit (February 2025): $1.4 billion stolen.

These heists underscore the group’s capability and determination in exploiting vulnerabilities within the cryptocurrency industry.

Cloud Infrastructure Exploitation

Beyond individual systems, UNC4899 has demonstrated a keen interest in cloud environments. They have been suspected of exploiting infrastructure of cloud service providers to target downstream customers within the cryptocurrency sector. For instance, the group has been linked to the exploitation of JumpCloud’s infrastructure, aiming to compromise companies that are customers of cloud platforms rather than the platforms themselves.

Attack Methodology

The group’s attack vectors are multifaceted:

1. Job-Themed Lures: By offering fake job opportunities, they entice victims to execute malicious code.

2. Malicious npm Packages: They upload harmful packages to repositories, then approach employees to collaborate on projects that require these packages, leading to system compromise.

3. Cloud Service Exploitation: Utilizing stolen credentials, they interact with cloud services like Google Cloud and AWS. In one instance, they used Google Cloud CLI over an anonymous VPN to perform reconnaissance and credential theft. Although multi-factor authentication (MFA) initially thwarted their efforts, they managed to disable and later re-enable MFA to evade detection.

Implications and Recommendations

The activities of UNC4899 highlight the evolving nature of cyber threats, especially those emanating from state-sponsored actors. Organizations, particularly within the cryptocurrency and blockchain sectors, must remain vigilant. Implementing robust security measures, such as enforcing MFA, conducting regular security audits, and educating employees about social engineering tactics, is crucial.

As cyber adversaries continue to refine their methods, a proactive and comprehensive security posture is essential to safeguard assets and maintain trust in the digital ecosystem.