North Korea hackers breached US IT firm in bid to steal cryptocurrency

Sign up now: Get ST's newsletters delivered to your inbox

The hack shows how North Korean cyberspies are now attacking firms that can give them access to multiple sources of digital currencies.

The hack shows how North Korean cyberspies are now attacking firms that can give them access to multiple sources of digital currencies.

PHOTO ILLUSTRATION: PIXABAY

Follow topic:

WASHINGTON - A North Korean government-backed hacking group penetrated an American IT management company and used it as a springboard to target cryptocurrency companies, the firm and cybersecurity experts said on Thursday.

The hackers broke into Louisville, Colorado-based JumpCloud in late June and used their access to the company’s systems to target “fewer than 5” of its clients, it said in a blog post.  

JumpCloud did not identify the customers affected, but cybersecurity firms CrowdStrike Holdings – which is assisting JumpCloud – and Alphabet-owned Mandiant - which is assisting one of JumpCloud’s clients – both said the hackers involved were known to focus on cryptocurrency theft.

Two people familiar with the matter confirmed that the JumpCloud clients targeted by the hackers were cryptocurrency companies.

The hack shows how North Korean cyberspies, once content with going after crypto companies one at a time, are now tackling companies that can give them broader access to multiple victims downstream – a tactic known as a “supply chain attack.”

“North Korea in my opinion is really stepping up their game,” said Mr Tom Hegel, who works for US firm SentinelOne and independently confirmed Mandiant and CrowdStrike’s attribution.

Pyongyang’s mission to the United Nations in New York did not immediately respond to a request for comment.

North Korea has previously denied organising digital currency heists, despite voluminous evidence – including UN reports – to the contrary.

CrowdStrike identified the hackers as Labyrinth Chollima - one of several groups alleged to operate on North Korea’s behalf.

Mandiant said the hackers responsible worked for North Korea’s Reconnaissance General Bureau (RGB), its primary foreign intelligence agency.

The US cyber watchdog agency Cisa and the Federal Bureau of Investigation declined to comment.

The hack on JumpCloud – whose products are used to help network administrators manage devices and servers – first surfaced publicly earlier in July when the firm e-mailed customers to say their credentials would be changed “out of an abundance of caution relating to an ongoing incident”.

In an earlier version of the blog post that acknowledged the incident was a hack, JumpCloud traced the intrusion back to June 27.

Cyber-security-focused podcast Risky Business earlier this week cited two sources as saying that North Korea was a suspect in the intrusion.

Labyrinth Chollima is one of North Korea’s most prolific hacking groups and is said to be responsible for some of the isolated country’s most daring and disruptive cyber intrusions.

Its theft of cryptocurrency has led to the loss of eye-watering sums: Blockchain analytics firm Chainalysis said in 2022 that North Korean-linked groups stole an estimated US$1.7 billion (S$2.3 billion) worth of digital cash across multiple hacks.

CrowdStrike senior Vice-President for intelligence Adam Meyers said Pyongyang’s hacking squads should not be underestimated. 

“I don’t think this is the last we’ll see of North Korean supply chain attacks this year,” he said. REUTERS

See more on