Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Water monitoring finds UK chemicals permanently reduced

CISA, SolarWinds, Ivanti, Workspace One vulnerabilities reported as being actively exploited

Founders Fund is nearing a $6 billion offering for its latest growth fund, sources say

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » UNC4899 Developer compromises encryption company after airdropping Trojanized files onto work devices
Identity

UNC4899 Developer compromises encryption company after airdropping Trojanized files onto work devices

userBy userMarch 9, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 9, 2026DevOps/Threat Intelligence

A North Korean threat actor known as UNC4899 is suspected of being behind a sophisticated cloud breach campaign that targeted crypto organizations in 2025 and stole millions of dollars in cryptocurrencies.

This activity has been determined with some confidence to be from a state-sponsored adversary and has also been tracked under the code names Jade Sleet, PUKCHONG, Slow Pisces, and TraderTraitor.

“This incident is notable for its combination of social engineering, exploitation of peer-to-peer data (P2P) transfer mechanisms of devices from individuals to businesses, workflow exploitation, and ultimately migration to the cloud to adopt Living Off the Cloud (LOTC) technology,” the tech giant noted in its Cloud Threat Horizons report for the first half of 2026. [PDF] Shared with Hacker News.

Once in the cloud environment, the attackers allegedly exploited legitimate DevOps workflows to obtain credentials, breach container boundaries, and modify Cloud SQL databases to facilitate cryptocurrency theft.

According to Google Cloud, the attack chain begins with a developer’s personal device compromising a corporate workstation and moves to the cloud to make unauthorized changes to financial logic.

It all started when threat actors used social engineering tactics to trick developers into downloading archive files under the guise of collaborating on an open source project. The developer then transferred the same file to the company’s device via AirDrop.

“The victim used an AI-assisted integrated development environment (IDE) to manipulate the contents of the archive and ultimately execute the embedded malicious Python code, generating and executing a binary disguised as a Kubernetes command-line tool,” Google said.

This binary then connected to an attacker-controlled domain and acted as a backdoor into the victim’s corporate machine, giving the attacker the means to migrate into the Google Cloud environment using an authenticated session and available credentials. This step was followed by an initial reconnaissance phase aimed at gathering information about various services and projects.

The attack advances to the next phase with the discovery of the bastion host, where the attacker modifies its multi-factor authentication (MFA) policy attributes to gain access to it and perform additional reconnaissance, such as navigating to specific pods within the Kubernetes environment.

UNC4899 then took a living-off-the-cloud (LotC) approach and configured a persistence mechanism by modifying the Kubernetes deployment configuration so that bash commands are automatically run when a new pod is created. The command itself downloaded a backdoor.

Here are some of the other steps taken by threat actors:

The Kubernetes resource associated with the victim’s CI/CD platform solution was modified to inject a command that displays the service account token in the logs. The attackers were able to obtain the token of a highly privileged CI/CD service account and escalate their privileges, allowing them to perform lateral movement specifically targeting pods that handle network policy and load balancing. Stolen service account tokens were used to authenticate to sensitive infrastructure pods running in privileged mode, escape from containers, and deploy backdoors for persistent access. The threat actors conducted another round of reconnaissance before shifting their attention to workloads responsible for managing customer information such as user identities, account security, and cryptocurrency wallet information. The attacker used this to extract static database credentials that were not securely stored in the pod’s environment variables. The credentials were then misused to access the production database via Cloud SQL Auth Proxy and execute SQL commands to modify user accounts. This includes resetting passwords and updating MFA seeds for several high-value accounts. The attack successfully used the compromised accounts to extract millions of dollars in digital assets.

The incident “highlights the significant risks posed by P2P data transfer methods and other data bridges, privileged container modes, and insecure handling of secrets in cloud environments,” Google said. “Organizations should adopt a layered defense-in-depth strategy that strictly validates identities, restricts data transfer at endpoints, and enforces strict isolation within cloud runtime environments to limit the scope of an intrusion event.”

To combat this threat, organizations are recommended to implement context-aware access and phishing-resistant MFA, ensure that only trusted images are deployed, isolate compromised nodes from establishing connections with external hosts, monitor unexpected container processes, implement robust secret management, and enforce policies that disable or restrict peer-to-peer file sharing using AirDrop or Bluetooth and the mounting of unmanaged external media on corporate devices.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleZoox begins mapping Dallas and Phoenix for robotaxis
Next Article Dutch spies warn of Russian government hackers targeting Sign and WhatsApp users
user
  • Website

Related Posts

CISA, SolarWinds, Ivanti, Workspace One vulnerabilities reported as being actively exploited

March 10, 2026

Malicious npm package disguised as OpenClaw installer deploys RAT and steals macOS credentials

March 9, 2026

Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware

March 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Water monitoring finds UK chemicals permanently reduced

CISA, SolarWinds, Ivanti, Workspace One vulnerabilities reported as being actively exploited

Founders Fund is nearing a $6 billion offering for its latest growth fund, sources say

Electric air taxis are about to start operating in 26 states.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.