The post North Korean Hackers Exploit Dev Device, Steal Millions in Crypto appeared on BitcoinEthereumNews.com. UNC4899 tricked a developer via AirDrop, pivotedThe post North Korean Hackers Exploit Dev Device, Steal Millions in Crypto appeared on BitcoinEthereumNews.com. UNC4899 tricked a developer via AirDrop, pivoted

North Korean Hackers Exploit Dev Device, Steal Millions in Crypto

For feedback or concerns regarding this content, please contact us at [email protected]
  • UNC4899 tricked a developer via AirDrop, pivoted to the cloud, and stole millions in cryptocurrency.
  • Hackers exploited Kubernetes, altered MFA settings, and accessed sensitive databases to steal digital assets.
  • North Korea-linked groups increasingly use AI malware and fake freelancers to target blockchain developers.

A North Korean threat actor, UNC4899, launched a sophisticated attack on a cryptocurrency firm in 2025, stealing millions in digital assets. The hackers tricked a developer into downloading a seemingly legitimate archive as part of an open-source collaboration. 

The developer transferred it to a corporate device using AirDrop. As a result, the embedded malicious Python code executed a binary masquerading as a Kubernetes command-line tool. This backdoor enabled attackers to pivot to the cloud, harvest credentials, and manipulate critical infrastructure. 

Google Cloud described the attack as a mix of “social engineering, exploitation of personal-to-corporate device peer-to-peer data transfer mechanisms, workflows, and eventual pivot to the cloud to employ living-off-the-cloud (LOTC) techniques.”

Cloud Attackers Drain Crypto via Kubernetes

Once UNC4899 got inside the system, they explored the company’s Kubernetes setup and used stolen service account tokens to gain higher-level access. They even changed multi-factor authentication settings to make entry easier. The hackers then reached sensitive parts of the system that handled network controls and customer information, including cryptocurrency wallets.

Next, they grabbed database login details stored insecurely in the system, accessed the production database, and made changes to user accounts. This included resetting passwords and updating MFA codes for high-value accounts. In the end, the attackers were able to withdraw several million dollars in digital currency.

Related: Crypto Laundering Network Used $107M in USDT to Influence Moldova Elections

UNC4899 also targeted the company’s automated development processes to stay hidden in the cloud. They planted commands in Kubernetes deployments so that every time a new pod started, it automatically downloaded a backdoor. 

Google suggests that companies keep cloud environments strictly separated, limit peer-to-peer file sharing, and watch for unusual activity in containers. Additionally, organizations should use phishing-resistant multi-factor authentication and strong secrets management to reduce the risk of a breach.

Broader North Korean Cyber Activity

Other North Korea-related groups, such as Konni, are using AI-generated malware with the help of PowerShell to target blockchain developers. These attackers send malicious Discord messages with malware that can steal money and data.

Reports show that over $16.5 million went to North Korean IT workers pretending to be legitimate freelancers in 2025 alone. This shows how risky hiring practices can be and highlights the need for stronger background checks and better cybersecurity awareness.

Related: U.S. DOJ To Retry Tornado Cash Co-Founder Roman Storm This Fall

Disclaimer: The information presented in this article is for informational and educational purposes only. The article does not constitute financial advice or advice of any kind. Coin Edition is not responsible for any losses incurred as a result of the utilization of content, products, or services mentioned. Readers are advised to exercise caution before taking any action related to the company.

Source: https://coinedition.com/north-korean-hackers-exploit-dev-device-steal-millions-in-crypto/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

The $40 Million ‘Free Money’ Glitch in Crypto Prediction Markets

The $40 Million ‘Free Money’ Glitch in Crypto Prediction Markets

The post The $40 Million ‘Free Money’ Glitch in Crypto Prediction Markets appeared on BitcoinEthereumNews.com. In brief Researchers found $40 million in “risk-free” profits from mispriced markets on Polymarket in one year. Prices on some markets didn’t add up to 100%, letting traders lock in guaranteed gains. The same inefficiencies likely exist on other platforms like Myriad and Kalshi, though arbitrageurs help correct them. A new academic paper suggests there’s been a steady stream of “free money” lying around on Polymarket—and smart traders have been scooping it up. The paper, Unravelling the Probabilistic Forest: Arbitrage in Prediction Markets, is the most detailed look yet at how mispricing creeps into crypto’s most popular prediction platform. The researchers combed through a year of data, from April 2024 to April 2025, and found thousands of instances where market prices simply didn’t add up. In some cases, the prices of “Yes” and “No” shares in a single market didn’t sum to one dollar as they theoretically should, creating a risk-free profit for anyone quick enough to pounce.  In other cases, the mispricing was more subtle, involving logically related markets. For example, a market on “Trump wins the presidency” might trade at very different odds than “Republican wins the presidency,” even though those outcomes are tightly linked. By buying and selling combinations of these contracts, a savvy trader could lock in a profit no matter what happens. The researchers estimate more than $40 million in profits have already been pulled from the system by arbitrageurs, traders who specialize in sniffing out and exploiting these kinds of inconsistencies. Far from being a theoretical curiosity, this is a live and lucrative business model. Is this pattern true across all prediction markets? What’s striking is how common these opportunities are. The study found more than 7,000 markets with measurable mispricing, many in highly liquid, closely watched contracts. “Prediction markets are often treated…
Share
BitcoinEthereumNews2025/09/18 14:34
Trump Iran War Resolution: President Claims He Can End Conflict Anytime, Expects Swift Conclusion

Trump Iran War Resolution: President Claims He Can End Conflict Anytime, Expects Swift Conclusion

BitcoinWorld Trump Iran War Resolution: President Claims He Can End Conflict Anytime, Expects Swift Conclusion WASHINGTON, D.C. — President Donald Trump asserted
Share
bitcoinworld2026/03/11 22:50
Will the crypto market rally after February U.S. CPI holds at 2.4% as forecasted?

Will the crypto market rally after February U.S. CPI holds at 2.4% as forecasted?

The crypto market showed a muted reaction after US CPI data held at 2.4%, leaving investors watching Federal Reserve policy and Bitcoin price levels. The latest
Share
Crypto.news2026/03/11 22:37