Noticias

North Korean hackers stole millions of dollars in cryptocurrencies. Their work was impeccable

North Korean hackers stole millions of dollars in cryptocurrencies. Their work was impeccable

Chema Carvajal Sarabia

  • 10 de marzo de 2026
  • Actualizado: 11 de marzo de 2026, 13:24
North Korean hackers stole millions of dollars in cryptocurrencies. Their work was impeccable

A North Korean threat actor known as UNC4899 is suspected of carrying out a cloud compromise campaign that targeted a cryptocurrency organization in 2025, with the aim of stealing millions of dollars.

This activity, moderately attributed to a state-sponsored adversary, is also tracked under the cryptonyms Jade Sleet, PUKCHONG, Slow Pisces, and TraderTraitor.

Ocean’s 14

According to Google’s Cloud Threat Horizons Report, this incident stands out for its complex combination of social engineering and exploitation of data transfer mechanisms between personal and corporate devices. The attackers tricked a developer into downloading a malicious file under the guise of a supposed open-source collaboration, which then allowed unauthorized access to their corporate machine and, subsequently, to the cloud infrastructure.

Once inside the cloud environment, attackers abused legitimate DevOps workflows to steal credentials and manipulate Cloud SQL databases, thereby facilitating cryptocurrency theft. Through modifications to Kubernetes configurations and the execution of malicious commands, the attackers managed to establish a persistent presence in the environment, employing techniques known as “living-off-the-cloud” (LoTC).

This incident highlights the critical risks associated with data transfer methods between personal and corporate devices, as well as the unsecured handling of secrets in a cloud environment. In response, organizations are advised to implement a defense-in-depth strategy that includes rigorous identity validation, restrictions on data transfer, and isolation within cloud execution environments to mitigate damage in the event of an intrusion event.

Experts warn about the importance of adopting policies that discourage the use of external devices and insecure connections, such as file sharing via AirDrop or Bluetooth, to protect the critical infrastructure of organizations against increasingly sophisticated threats.

Chema Carvajal Sarabia

Content Manager - Periodista especializado en tecnología, entretenimiento y videojuegos. Escribir sobre lo que me apasiona (cacharros, juegos y cine) me permite seguir cuerdo y despertarme con una sonrisa cuando suena el despertador. PD: esto no es cierto el 100 % de las veces.

Directrices editoriales

Últimos artículos

Cargando el siguiente artículo