Executive Summary
In February 2025, the North Korean state-sponsored hacking group UNC4899, also known as TraderTraitor, orchestrated a sophisticated cyberattack resulting in the theft of approximately $1.5 billion from the cryptocurrency exchange Bybit. The attackers compromised a developer's macOS workstation at Safe{Wallet}, a multisignature wallet platform, by deploying a malicious Docker project. This initial breach allowed them to hijack AWS session tokens, bypass multi-factor authentication, and inject malicious JavaScript into Safe{Wallet}'s application. Consequently, they manipulated a routine Ethereum transfer from Bybit's cold wallet to its hot wallet, redirecting the funds to addresses under their control. (blog.it-expert.net)
This incident underscores the escalating threat posed by state-sponsored cyber actors targeting the cryptocurrency sector. The use of advanced social engineering tactics, exploitation of cloud infrastructure vulnerabilities, and sophisticated supply chain attacks highlight the need for enhanced security measures and vigilance within the industry. (thehackernews.com)
Why This Matters Now
The UNC4899 breach of Bybit in 2025 highlights the urgent need for the cryptocurrency industry to bolster defenses against sophisticated state-sponsored cyberattacks. As threat actors continue to evolve their tactics, exploiting both human and technical vulnerabilities, organizations must prioritize comprehensive security strategies to protect digital assets and maintain trust in the market.
Attack Path Analysis
UNC4899 initiated the attack by deceiving a developer into downloading a malicious archive, which was transferred via AirDrop to the corporate device, leading to the execution of a backdoor. The attackers then escalated privileges by modifying MFA policies on a bastion host, enabling further access. They moved laterally within the cloud environment by exploiting Kubernetes configurations and service account tokens. Command and control were established through backdoors deployed in compromised pods. The attackers exfiltrated sensitive data, including database credentials, to manipulate user accounts. The impact culminated in unauthorized cryptocurrency withdrawals amounting to millions of dollars.
Kill Chain Progression
Initial Compromise
Description
UNC4899 deceived a developer into downloading a malicious archive, which was transferred via AirDrop to the corporate device, leading to the execution of a backdoor.
MITRE ATT&CK® Techniques
Spearphishing Attachment
Malicious File
DLL Side-Loading
Valid Accounts
Pass the Ticket
Compute Hijacking
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Prevent unauthorized code from being deployed into production
Control ID: 6.4.3
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Identity and Access Management
Control ID: Identity
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
Critical exposure through DevOps workflows, cloud environments, and AI-assisted IDEs targeted by sophisticated supply-chain attacks requiring enhanced container security and secrets management.
Financial Services
High-value targets for cryptocurrency theft via compromised cloud databases and multi-factor authentication bypasses, requiring strict egress controls and zero trust segmentation.
Information Technology/IT
Infrastructure vulnerabilities in Kubernetes environments and CI/CD platforms enable privilege escalation and lateral movement, necessitating comprehensive visibility and threat detection capabilities.
Internet
Cloud-native security fabric essential for detecting living-off-the-cloud techniques and preventing peer-to-peer data transfer exploits in hybrid connectivity environments.
Sources
- UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Devicehttps://thehackernews.com/2026/03/unc4899-used-airdrop-file-transfer-and.htmlVerified
- Cloud Threat Horizons Report H1 2026https://cloud.google.com/security/report/resources/cloud-threat-horizons-report-h1-2026Verified
- N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Cryptohttps://thehackernews.com/2025/07/n-korean-hackers-used-job-lures-cloud.htmlVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have constrained the attacker's ability to escalate privileges, move laterally, and exfiltrate data by enforcing strict segmentation and identity-aware policies.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: While Aviatrix CNSF primarily focuses on cloud infrastructure, its integration with identity-aware controls could have limited the backdoor's ability to communicate with cloud resources, thereby reducing the attacker's reach.
Control: Zero Trust Segmentation
Mitigation: Implementing Zero Trust Segmentation could have limited the attacker's ability to modify MFA policies by enforcing strict access controls, thereby reducing the scope of privilege escalation.
Control: East-West Traffic Security
Mitigation: East-West Traffic Security could have restricted lateral movement by monitoring and controlling internal traffic, thereby reducing the attacker's ability to exploit Kubernetes configurations.
Control: Multicloud Visibility & Control
Mitigation: Multicloud Visibility & Control could have detected and constrained command and control communications by providing real-time monitoring and policy enforcement across cloud environments.
Control: Egress Security & Policy Enforcement
Mitigation: Egress Security & Policy Enforcement could have limited data exfiltration by controlling outbound traffic and enforcing strict egress policies, thereby reducing the attacker's ability to transmit sensitive data externally.
While prior controls could have constrained earlier attack stages, the financial impact underscores the need for comprehensive security measures to limit unauthorized transactions.
Impact at a Glance
Affected Business Functions
- Cryptocurrency Transactions
- Customer Account Management
- Financial Operations
- Cloud Infrastructure Management
Estimated downtime: 14 days
Estimated loss: $5,000,000
User identities, account security details, cryptocurrency wallet information
Recommended Actions
Key Takeaways & Next Steps
- • Implement robust endpoint security measures to detect and prevent the execution of malicious code transferred via peer-to-peer methods like AirDrop.
- • Enforce strict multi-factor authentication policies and monitor for unauthorized modifications to MFA settings.
- • Apply zero trust segmentation to limit lateral movement within the cloud environment by enforcing least privilege access controls.
- • Deploy continuous monitoring and anomaly detection systems to identify and respond to unauthorized access and data exfiltration activities.
- • Regularly audit and secure CI/CD pipelines and Kubernetes configurations to prevent exploitation by threat actors.



