Friday, May 9, 2025
Homecyber securityNorth Korean Moonstone Sleet Uses Creative Tactics to Deploy Custom Ransomware

North Korean Moonstone Sleet Uses Creative Tactics to Deploy Custom Ransomware

Published on

SIEM as a Service

Follow Us on Google News

In a recent development, Microsoft has identified a new North Korean threat actor known as Moonstone Sleet, which has been employing a combination of traditional and innovative tactics to achieve its financial and cyberespionage objectives.

Moonstone Sleet, formerly tracked as Storm-1789, has demonstrated a sophisticated approach by using fake companies, trojanized software, and even a malicious game to infiltrate targets.

Exploiting New Vectors

Moonstone Sleet has been observed using trojanized versions of legitimate tools like PuTTY to gain initial access to organizations.

- Advertisement - Google News

This method involves delivering a modified PuTTY executable via platforms such as LinkedIn and Telegram, which, when executed, decrypts and loads additional malicious payloads.

Moonstone Sleet
Moonstone Sleet attack chain using trojanized PuTTY

The actor has also leveraged malicious npm packages to target software developers, often disguising these as part of a skills assessment or project collaboration.

According to Microsoft Report, these tactics highlight the actor’s ability to adapt and evolve its strategies, mirroring techniques used by other North Korean threat actors like Diamond Sleet.

Custom Ransomware and Malicious Games

One of the most notable tactics employed by Moonstone Sleet is the deployment of a custom ransomware variant named FakePenny.

This ransomware was used in an attack in April 2024, following a previous compromise in February.

The ransom demand was substantial, at $6.6 million in Bitcoin, indicating a significant financial objective.

Additionally, Moonstone Sleet has developed a fully functional malicious game called DeTankWar, which requires player registration and is used to deliver malware.

Moonstone Sleet
Page from the DeTankWar website

The game is promoted through fake companies and social media personas, adding a layer of legitimacy to the actor’s campaigns.

Moonstone Sleet’s operations are characterized by their breadth and sophistication.

The actor has created fake companies, such as StarGlow Ventures and C.C. Waterfall, to engage with potential targets in the education and software development sectors.

These companies are used to build relationships with organizations, potentially for future malicious access or revenue generation.

Moonstone Sleet’s ability to conduct concurrent operations across multiple campaigns suggests it is well-resourced and capable of expanding its capabilities, including the use of ransomware for disruptive operations.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...