CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

UNC4899 Exploits AirDrop to Compromise Crypto Firm's Cloud Environment

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

UNC4899, a North Korean threat actor, breached a cryptocurrency firm in 2025 by exploiting an AirDrop file transfer to a developer's work device. The attackers used social engineering to deliver a trojanized file, then pivoted to the cloud environment, employing living-off-the-cloud (LOTC) techniques to steal millions in cryptocurrency. The attack involved abusing DevOps workflows, harvesting credentials, and tampering with Cloud SQL databases. The incident highlights risks associated with personal-to-corporate P2P data transfers, privileged container modes, and insecure handling of secrets in cloud environments.

Timeline

  1. 09.03.2026 16:50 1 articles · 4h ago

    UNC4899 Compromises Crypto Firm via AirDrop and Cloud Environment Exploitation

    In 2025, UNC4899 used social engineering to deceive a developer into downloading a trojanized file via AirDrop. The file executed a backdoor, enabling pivoting to the Google Cloud environment. The attackers abused DevOps workflows, harvested credentials, and tampered with Cloud SQL databases to steal millions in cryptocurrency. The incident highlights the risks of personal-to-corporate P2P data transfers and insecure handling of secrets in cloud environments.

    Show sources

Information Snippets