North Korea-Linked UNC4899 Uses AirDrop and Cloud Exploits to Steal Millions from Crypto Firm

Related

Cybersecurity Leaders to Watch in Florida’s Retail Industry

Florida’s retail sector spans national e-commerce platforms, grocery chains,...

Cybersecurity Leaders to Watch in Florida’s Business Consulting Industry

Florida’s business consulting sector includes firms advising clients on...

CISOs to Watch in Florida’s Insurance Industry

Florida’s insurance sector includes national carriers, specialty insurers, and...

New KadNap Malware Compromises 14,000+ Edge Devices to Build Stealth Proxy Botnet

What happened: Security researchers have uncovered a new malware strain...

Share

What happened

Researchers have linked a sophisticated cyberattack to the North Korea-aligned threat group UNC4899, which breached a cryptocurrency organization and stole millions in digital assets. The attack began when a developer was tricked through social engineering into downloading a malicious archive disguised as part of an open-source collaboration. The developer later transferred the file from a personal device to a corporate workstation using AirDrop. 

Once executed, the malicious code installed a backdoor that allowed attackers to pivot into the company’s cloud environment. From there, the attackers abused legitimate DevOps workflows, escalated privileges within Kubernetes environments, extracted credentials, and modified Cloud SQL databases to reset account credentials and withdraw cryptocurrency funds.

Who is affected

The primary targets appear to be cryptocurrency and blockchain organizations, especially those running cloud-native environments and DevOps pipelines. However, any enterprise with developers transferring files between personal and corporate devices or managing Kubernetes-based cloud infrastructure could face similar risks. 

Why CISOs should care

This attack highlights how modern adversaries blend social engineering, endpoint compromise, and cloud privilege escalation into a single campaign. By exploiting peer-to-peer transfer methods like AirDrop and then “living off the cloud” using legitimate tools, attackers can bypass many traditional detection controls and move laterally inside cloud environments.

For security leaders, it reinforces the importance of controlling device-to-device file transfers, enforcing strong identity controls in cloud environments, and protecting secrets within containerized workloads.

3 practical actions

  1. Restrict peer-to-peer file transfers (e.g., AirDrop or Bluetooth) between personal and corporate devices.
  2. Enforce phishing-resistant MFA and context-aware access controls across cloud infrastructure and administrative accounts.
  3. Implement strong secrets management and container security monitoring to prevent exposure of credentials in Kubernetes workloads.