<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>North-Korea — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/north-korea/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 16:35:39 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/north-korea/feed.xml" rel="self" type="application/rss+xml"/><item><title>Drift Protocol $280M Crypto Theft Linked to North Korean Hackers</title><link>https://feed.craftedsignal.io/briefs/2026-04-drift-hack/</link><pubDate>Mon, 06 Apr 2026 16:35:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-drift-hack/</guid><description>The Drift Protocol suffered a $280 million crypto theft orchestrated by North Korean hackers who spent six months building an in-person operational presence within the Drift ecosystem, engaging with contributors at crypto conferences and via Telegram.</description><content:encoded><![CDATA[<p>On April 1st, 2026, the Solana-based trading platform, Drift Protocol, experienced a sophisticated attack resulting in the theft of over $280 million. Investigations by Elliptic and TRM Labs point to North Korean hackers, possibly UNC4736 (also known as AppleJeus and Labyrinth Chollima), a threat actor previously linked to Lazarus. The attackers cultivated a presence within the Drift ecosystem over six months, posing as a quantitative firm. They approached Drift contributors in person at multiple crypto conferences, building trust and rapport. Communications continued via Telegram, where they discussed trading strategies and potential vault integrations, demonstrating technical proficiency and familiarity with Drift&rsquo;s operations. The Telegram group was deleted immediately after the theft.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Reconnaissance:</strong> The threat actors posed as a quantitative firm to gather information about Drift Protocol and its contributors.</li>
<li><strong>In-Person Engagement:</strong> The actors attended multiple crypto conferences, engaging with specific Drift contributors.</li>
<li><strong>Relationship Building:</strong> They communicated with targets via Telegram, discussing trading strategies and potential vault integrations.</li>
<li><strong>Potential Compromise:</strong> Two contributors were potentially compromised via a malicious code repository exploiting a VSCode/Cursor vulnerability allowing silent code execution, or via a malicious TestFlight application presented as a wallet product.</li>
<li><strong>Privilege Escalation:</strong> The attack allowed the hijacking of the Security Council administrative powers.</li>
<li><strong>Asset Draining:</strong> The attackers drained user assets in approximately 12 minutes.</li>
<li><strong>Data Removal:</strong> The Telegram group used for engaging contributors was deleted immediately after the theft.</li>
<li><strong>Funds Laundering:</strong> The stolen funds were likely transferred to attacker-controlled wallets and prepared for laundering, though the wallets have been flagged across exchanges and bridge operators.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The Drift Protocol suffered a loss of over $280 million, impacting users of the Solana-based trading platform. All Drift Protocol functions remain frozen, and the compromised wallets have been removed from the multisig process. The incident highlights the risks associated with social engineering and the importance of verifying the identities of individuals and organizations interacting with critical infrastructure. The attack has also raised concerns about the security practices within the cryptocurrency sector.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for unusual network activity and potential exploitation of VSCode/Cursor vulnerabilities via <code>process_creation</code> and <code>network_connection</code> logs using the &ldquo;Detect Suspicious VSCode Code Execution&rdquo; Sigma rule.</li>
<li>Monitor for suspicious applications installed via TestFlight, especially those presented as wallet products, using <code>file_event</code> logs and the &ldquo;Detect Suspicious TestFlight Application Installation&rdquo; Sigma rule.</li>
<li>Implement strict identity verification procedures for individuals and organizations interacting with sensitive systems and data.</li>
<li>Educate employees about social engineering tactics and the risks of interacting with unknown individuals or organizations.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>drift-protocol</category><category>crypto-theft</category><category>north-korea</category><category>unc4736</category><category>lazarus-group</category><category>social-engineering</category><category>supply-chain</category></item><item><title>NICKEL ALLEY Targeting Developers with Fake Job Opportunities</title><link>https://feed.craftedsignal.io/briefs/2026-05-nickel-alley/</link><pubDate>Wed, 25 Mar 2026 10:25:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-nickel-alley/</guid><description>NICKEL ALLEY, a North Korean threat group, is targeting technology professionals with fake job opportunities and malicious code repositories to deliver malware like PyLangGhost RAT and BeaverTail, aiming to steal cryptocurrency.</description><content:encoded><![CDATA[<p>NICKEL ALLEY, a threat group operating on behalf of the North Korean government, continues to target professionals in the technology sector using sophisticated social engineering tactics. Since at least mid-2025, the group has been observed creating fake LinkedIn company pages, GitHub repositories, and job opportunities to deceive prospective candidates and deliver malware. They employ tactics such as &ldquo;ClickFix,&rdquo; where victims are tricked into running malicious commands under the guise of fixing technical issues. Additionally, they&rsquo;ve compromised npm package repositories and used typosquatting to distribute malicious packages. The group leverages cloud platforms like Vercel for payload hosting, tailoring malware delivery based on victim system configurations. This activity is primarily motivated by cryptocurrency theft.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Contact:</strong> The attacker contacts a technology professional with a fake job opportunity, often advertised through LinkedIn or email.</li>
<li><strong>Fake Company Profile:</strong> The attacker establishes credibility by creating a fake company profile on LinkedIn and/or GitHub.</li>
<li><strong>Malicious Repository:</strong> The attacker creates a GitHub repository containing malicious code disguised as a software development project or crypto game (e.g., web3-social-platform).</li>
<li><strong>ClickFix Delivery (PyLangGhost RAT):</strong> During a fake interview process, the attacker instructs the victim to perform a &ldquo;fix&rdquo; by running a command which downloads and executes a VBScript file.</li>
<li><strong>VBScript Execution:</strong> The VBScript file (e.g., update.vbs, start.vbs) decompresses an archive (Lib.zip) containing library files and executes a renamed Python interpreter (csshost.exe) with a malicious Python script (nvidia.py).</li>
<li><strong>BeaverTail Delivery (GitHub):</strong> The victim is convinced to clone the GitHub repository and execute commands like <code>npm install</code> and <code>npm start</code>. The <code>index.js</code> file retrieves the BeaverTail malware from a Base64-encoded URL hosted on Vercel.</li>
<li><strong>Malware Execution:</strong> PyLangGhost RAT or BeaverTail malware executes on the victim&rsquo;s system, enabling file exfiltration, arbitrary command execution, and system profiling.</li>
<li><strong>Data Theft:</strong> The malware targets browser credentials, cookies, and cryptocurrency wallet data, leading to financial theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>NICKEL ALLEY&rsquo;s activities primarily target software developers and blockchain professionals. Successful attacks lead to the compromise of developer systems, theft of sensitive credentials, and exfiltration of cryptocurrency. The group&rsquo;s persistent targeting of the technology sector highlights their continued focus on financial gain through cryptocurrency theft. Compromised systems can be used to further propagate attacks or to steal intellectual property.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for the execution of <code>wscript.exe</code> launching VBScript files from the <code>%TEMP%</code> directory and followed by execution of renamed python.exe (csshost.exe) as described in the Attack Chain above. Deploy the Sigma rule <code>Detect NICKEL ALLEY VBScript ClickFix</code> to detect this activity.</li>
<li>Inspect network connections from unusual processes (not browsers or standard networking tools) to newly registered domains or infrastructure providers like Vercel, using the <code>Detect NICKEL ALLEY Outbound Connection</code> Sigma rule.</li>
<li>Block access to the IOC domains <code>talentacq[.]pro</code>, <code>publicshare[.]org</code>, and <code>astrabytesyncs[.]com</code> at the DNS resolver.</li>
<li>Educate employees, especially those in software development, about social engineering tactics such as fake job opportunities and the ClickFix technique.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>NICKEL ALLEY</category><category>North Korea</category><category>cryptocurrency</category><category>supply-chain</category></item></channel></rss>