North Korean Cyber Threats Target Blockchain and Crypto Sector: GitHub Reveals Attack Strategy and Offers Mitigation Advice

In yet another high-risk, cyber threat development, popular software development and code hosting platform, GitHub, has reported an elaborate social engineering campaign. This cyber-attack targets personal accounts linked predominately to blockchain, cryptocurrency, and online gambling technology sectors. The campaign, unveiled by GitHub, uses an amalgamation of approaches to target these sectors, raising the imperative for…

Written by

Casey Jones

Published on

July 19, 2023
BlogIndustry News & Trends

In yet another high-risk, cyber threat development, popular software development and code hosting platform, GitHub, has reported an elaborate social engineering campaign. This cyber-attack targets personal accounts linked predominately to blockchain, cryptocurrency, and online gambling technology sectors. The campaign, unveiled by GitHub, uses an amalgamation of approaches to target these sectors, raising the imperative for advanced cybersecurity measures.

GitHub’s disclosures paint a clear profile of a cyber threat actor who, with a high degree of certainty, is part of a North Korean group known as Jade Sleet or TraderTraitor. The group has continued targeting cryptocurrency and blockchain-related organizations and their vendors with laser-precision, indicating they are mindful of the potential financial gains in these sectors.

Critical to this threat is the attack chain, a series of well-choreographed events that lead to a successful breach. Jade Sleet creates highly plausible persona accounts on GitHub and other social media platforms such as LinkedIn, Slack, and Telegram. Initiating contact, they then woo the target to transfer a conversation involving collaboration on a GitHub repository. The unsuspecting targets are encouraged to clone and execute the repository’s contents, which is swimming with malicious npm dependencies.

The software themes utilized by the threat actors vary but commonly include media players and cryptocurrency trading tools. Once the victims execute the malicious npm packages, a two-stage malware stealthily creeps into the victim’s machine. The threat actor cleverly times the publishing of packages to elude heightened scrutiny periods, and in some cases, bypasses the clone step altogether, delivering malicious software directly via a messaging or file-sharing platform.

Responding to the unfolding threats, GitHub has taken some decisive mitigatory steps. It has suspended npm and GitHub accounts related to the campaign, published indicators of compromise, and reported domain hosts associated with the illegitimate activities.

For users, particularly those who might have been solicited to clone or download content associated with the suspicious accounts, comprehensive preventative strategies have become essential. Be wary of unsolicited contacts, particularly if they push for a conversation to move off a familiar platform. Always verify the integrity of software and dependencies before executing them. Regularly update your software, employ robust antivirus solutions, and use multi-factor authentication wherever possible.

Summarizing this complex landscape, it’s clear that digital safety is more important than ever, especially for those in the software development sphere and associated fields. In this era of advanced cyber threats, staying cautious and taking action towards preventative measures is the best shield against potential cyber attacks. Staying one step ahead of cybercriminals is of utmost importance to protect your data, money, and digital identity.