• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
north korean state sponsored hackers suspected in jumpcloud supply chain attack

North Korean State-Sponsored Hackers Suspected in JumpCloud Supply Chain Attack

You are here: Home / General Cyber Security News / North Korean State-Sponsored Hackers Suspected in JumpCloud Supply Chain Attack
July 20, 2023

An investigation of the indicators of compromise (IoCs) affiliated with the JumpCloud hack has uncovered proof pointing to the involvement of North Korean state-sponsored teams, in a fashion that’s reminiscent of the provide chain attack targeting 3CX.

The conclusions arrive from SentinelOne, which mapped out the infrastructure pertaining to the intrusion to uncover underlying styles. It really is worth noting that JumpCloud, very last week, attributed the attack to an unnamed “innovative nation-point out sponsored threat actor.”

In a linked improvement, CrowdStrike, which is doing the job with JumpCloud to probe the incident, pinned the attack to a North Korean actor recognised as Labyrinth Chollima, a sub cluster inside the notorious Lazarus Team, according to Reuters.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The infiltration was utilized as a “springboard” to concentrate on cryptocurrency corporations, the news company claimed, indicating an endeavor on component of the adversary to crank out unlawful revenues for the sanctions-strike nation.

They also coincide with a small-quantity social engineering marketing campaign discovered by GitHub that targets the own accounts of employees of technology firms, applying a combine of repository invitations and destructive npm deal dependencies. The qualified accounts are related with blockchain, cryptocurrency, or on the net gambling sectors.

The Microsoft subsidiary attributed the marketing campaign to a North Korean hacking team it tracks below the title Jade Sleet (aka TraderTraitor).

“Jade Sleet generally targets users affiliated with cryptocurrency and other blockchain-associated companies, but also targets suppliers utilised by individuals companies,” GitHub’s Alexis Wales stated.

The attack chains entail location up bogus personas on GitHub and other social media providers these kinds of as LinkedIn, Slack, and Telegram, although in some cases the risk actor is believed to have taken control of genuine accounts.

Beneath the assumed persona, Jade Sleet initiates get in touch with with the targets and invites them to collaborate on a GitHub repository, convincing the victims into cloning and running the contents, which characteristic decoy program with destructive npm dependencies that act as to start with-stage malware to down load and execute 2nd-phase payloads on the infected machine.

Upcoming WEBINARShield Towards Insider Threats: Learn SaaS Security Posture Management

Worried about insider threats? We have obtained you coated! Join this webinar to explore practical procedures and the secrets and techniques of proactive security with SaaS Security Posture Administration.

Be part of Nowadays

The destructive npm deals, for each GitHub, are component of a marketing campaign that very first came to light-weight past thirty day period, when Phylum in-depth a provide chain risk involving a exclusive execution chain that works by using a pair of fraudulent modules to fetch an unknown piece of malware from a distant server.

SentinelOne, in its most recent assessment, reported 144.217.92[.]197, an IP deal with joined to the JumpCloud attack, resolves to npmaudit[.]com, one particular of the eight domains mentioned by GitHub as made use of to fetch the second-stage malware. A next IP tackle 23.29.115[.]171 maps to npm-pool[.]org.

“It is obvious that North Korean threat actors are repeatedly adapting and exploring novel strategies to infiltrate specific networks,” SentinelOne security researcher Tom Hegel mentioned. “The JumpCloud intrusion serves as a crystal clear illustration of their inclination in the direction of supply chain focusing on, which yields a multitude of opportunity subsequent intrusions.”

“The DPRK demonstrates a profound knowing of the benefits derived from meticulously picking superior-value targets as a pivot stage to carry out source chain attacks into fruitful networks,” Hegel included.

Discovered this posting interesting? Comply with us on Twitter  and LinkedIn to read more distinctive information we article.


Some components of this article are sourced from:
thehackernews.com

Previous Post: «a few more reasons why rdp is insecure (surprise!) A Few More Reasons Why RDP is Insecure (Surprise!)
Next Post: Apache OpenMeetings Web Conferencing Tool Exposed to Critical Vulnerabilities apache openmeetings web conferencing tool exposed to critical vulnerabilities»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.