UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device
嗯,用户让我用中文总结一下这篇文章的内容,控制在一百个字以内。而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述就行。 首先,我需要通读整篇文章,抓住主要信息。文章讲的是一个朝鲜的威胁行为者UNC4899,在2025年针对一家加密货币组织发动了一次复杂的云入侵活动,窃取了数百万美元的加密货币。 接下来,文章详细描述了攻击过程:他们使用社会工程学欺骗一名开发者下载恶意文件,然后通过AirDrop传到公司设备。恶意代码伪装成Kubernetes工具,获取了访问权限,并利用合法的DevOps流程窃取凭证,突破容器限制,篡改数据库,最终盗取资金。 然后,文章还提到攻击者采用了“living-off-the-cloud”的技术,在云环境中配置持久机制,进一步扩大了攻击范围。 最后,谷歌建议组织采取多层次防御策略,包括身份验证、限制数据传输、隔离云环境等措施。 现在要将这些信息浓缩到100字以内。我需要抓住关键点:威胁行为者、目标、攻击手段、结果以及防御建议。 可能的结构是:描述攻击事件(谁、何时、目标)、主要手段(社会工程学、云技术)、结果(资金损失)、以及防御建议。 比如:“朝鲜黑客组织UNC4899利用社会工程学和云技术入侵一家加密货币公司,在2025年窃取数百万美元。攻击者通过伪装成开发工具获取访问权限,并利用DevOps流程窃取凭证和篡改数据库。谷歌建议加强身份验证和数据传输限制以防范此类攻击。” 这样大概控制在100字左右,并且涵盖了主要信息。 </think> 朝鲜黑客组织UNC4899利用社会工程学和云技术入侵一家加密货币公司,在2025年窃取数百万美元。攻击者通过伪装成开发工具获取访问权限,并利用DevOps流程窃取凭证和篡改数据库。谷歌建议加强身份验证和数据传输限制以防范此类攻击。 2026-3-9 14:50:0 Author: thehackernews.com(查看原文) 阅读量:7 收藏

DevOps / Threat Intelligence

The North Korean threat actor known as UNC4899 is suspected to be behind a sophisticated cloud compromise campaign targeting a cryptocurrency organization in 2025 to steal millions of dollars in cryptocurrency.

The activity has been attributed with moderate confidence to the state-sponsored adversary, which is also tracked under the cryptonyms Jade Sleet, PUKCHONG, Slow Pisces, and TraderTraitor. 

"This incident is notable for its blend of social engineering, exploitation of personal-to-corporate device peer-to-peer data (P2P) transfer mechanisms, workflows, and eventual pivot to the cloud to employ living-off-the-cloud (LOTC) techniques," the tech giant noted in its H1 2026 Cloud Threat Horizons Report [PDF] shared with The Hacker News.

Upon gaining access to the cloud environment, the attackers are said to have abused legitimate DevOps workflows to harvest credentials, break out of the confines of containers, and tamper with Cloud SQL databases to facilitate the cryptocurrency theft.

The attack chain, Google Cloud said, represents a progression of what started with the compromise of a developer's personal device to their corporate workstation, before jumping to the cloud to make unauthorized modifications to the financial logic.

It all started with the threat actors using social engineering ploys to deceive the developer into downloading an archive file as part of a supposed open-source project collaboration. The developer then transferred the same file to their company device over AirDrop.

"Using their AI-assisted Integrated Development Environment (IDE), the victim then interacted with the archive's contents, eventually executing the embedded malicious Python code, which spawned and executed a binary that masqueraded as the Kubernetes command-line tool," Google said.

The binary then contacted an attacker-controlled domain and acted as a backdoor to the victim's corporate machine, giving the attackers a way to pivot to the Google Cloud environment by likely using authenticated sessions and available credentials. This step was followed by an initial reconnaissance phase aimed at gathering information about various services and projects.

The attack moved to the next phase with the discovery of a bastion host, with the adversary modifying its multi-factor authentication (MFA) policy attribute to access it and perform additional reconnaissance, including navigating to specific pods within the Kubernetes environment.

Subsequently, UNC4899 adopted a living-off-the-cloud (LotC) approach to configure persistence mechanisms by altering Kubernetes deployment configurations so as to execute a bash command automatically when new pods are created. The command, for its part, downloaded a backdoor.

Some of the other steps carried out by the threat actor are listed below -

  • Kubernetes resources tied to the victim's CI/CD platform solution were modified to inject commands that displayed the service account tokens onto the logs.
  • The attacker obtained a token for a high-privileged CI/CD service account, permitting them to escalate their privileges and conduct lateral movement, specifically targeting a pod that handled network policies and load balancing.
  • The stolen service account token was used to authenticate to the sensitive infrastructure pod running in privileged mode, escape the container, and deploy a backdoor for persistent access.
  • Another round of reconnaissance was conducted by the threat actor before shifting their attention to a workload responsible for managing customer information, such as user identities, account security, and cryptocurrency wallet information.
  • The attacker used it to extract static database credentials that were stored insecurely in the pod's environment variables.
  • The credentials were then abused to access the production database via Cloud SQL Auth Proxy and execute SQL commands to make user account modifications. This included password resets and MFA seed updates for several high-value accounts.
  • The attack culminated with the use of the compromised accounts to successfully withdraw several million dollars in digital assets.

The incident "highlights the critical risks posed by the personal-to-corporate P2P data transfer methods and other data bridges, privileged container modes, and the unsecured handling of secrets in a cloud environment," Google said. "Organizations should adopt a defense-in-depth strategy that rigorously validates identity, restricts data transfer on endpoints, and enforces strict isolation within cloud runtime environments to limit the blast radius of an intrusion event."

To counter the threat, organizations are advised to implement context-aware access and phishing-resistant MFA, ensure only trusted images are deployed, isolate compromised nodes from establishing connectivity with external hosts, monitor for unexpected container processes, adopt robust secrets management, enforce policies to disable or restrict peer-to-peer file sharing using AirDrop or Bluetooth and mounting of unmanaged external media on corporate devices.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/unc4899-used-airdrop-file-transfer-and.html
如有侵权请联系:admin#unsafe.sh