Saturday, May 24, 2025
HomeAWSResearchers Simulate DPRK's Largest Cryptocurrency Heist Through Compromised macOS Developer and AWS...

Researchers Simulate DPRK’s Largest Cryptocurrency Heist Through Compromised macOS Developer and AWS Pivoting

Published on

SIEM as a Service

Follow Us on Google News

Security researchers at Elastic have recreated the intricate details of the February 21, 2025, ByBit cryptocurrency heist, where approximately 400,000 ETH-valued at over a billion dollars-was stolen.

Attributed to North Korea’s elite cyber unit, TraderTraitor, this attack exploited a trusted vendor relationship with Safe{Wallet}, a multisig wallet platform, turning a routine transaction into one of the largest crypto thefts in history.

By simulating the attack from initial access to cloud exploitation, the team not only dissected the tactics of the Democratic People’s Republic of Korea (DPRK) but also tested robust detection and prevention strategies using Elastic’s security solutions.

- Advertisement - Google News

The simulation began with the compromise of a developer’s macOS workstation through social engineering, mirroring the real-world incident on February 4, 2025.

From macOS Compromise to AWS Intrusion: A Step-by-Step Replay

Researchers emulated the execution of a malicious Python application, likely delivered via platforms like Telegram or Discord, which exploited a remote code execution (RCE) vulnerability in the PyYAML library via unsafe deserialization.

This led to the deployment of a second-stage loader and the MythicC2 Poseidon agent-a stealthy Golang payload-enabling attackers to harvest AWS session tokens from the developer’s environment.

AWS Pivoting
Mythic C2 Payload Builder

These temporary credentials, often cached in ~/.aws files or environment variables, provided a gateway to Safe{Wallet}’s AWS infrastructure within 24 hours.

The emulation meticulously replicated reconnaissance activities between February 5 and 17, including enumeration of S3 buckets, culminating in the discovery of a statically hosted Next.js application at app.safe.global.

By tampering with the frontend JavaScript on February 19, attackers injected malicious code to redirect ByBit transactions to DPRK-controlled wallets, a tactic validated in Elastic’s controlled environment by modifying transaction logic within a test app.

The AWS phase of the simulation underscored the attackers’ precision. Using stolen session tokens, they attempted persistence by registering a virtual MFA device-an effort thwarted by AWS safeguards-and focused on overwriting S3-hosted JavaScript bundles to manipulate transactions.

Elastic’s researchers recreated this by syncing bucket contents, reverse-engineering the application, and injecting conditional logic to alter wallet addresses, demonstrating the ease of frontend tampering without integrity controls like Subresource Integrity (SRI) or S3 Object Lock.

AWS Pivoting
Python Application Directory Structure

The exercise also highlighted detection opportunities, with Elastic’s SIEM rules identifying suspicious activities such as Python script self-deletion, sensitive file access, and unusual S3 uploads via CloudTrail logs.

According to the Report, Elastic’s Attack Discovery feature further correlated endpoint and cloud events into a cohesive narrative, showcasing how defenders can accelerate response times.

This emulation, rooted in detailed reports from Sygnia, Mandiant, SlowMist, and Unit42, offers a rare glimpse into nation-state cyber tactics targeting the crypto ecosystem.

DPRK’s strategy of supply chain attacks and social engineering, responsible for over $6 billion in thefts since 2017, was laid bare through this hands-on approach.

Beyond technical insights, it emphasized the need for robust defenses-user awareness training, short-lived session tokens via AWS SSO, and immutable S3 configurations-to thwart such sophisticated intrusions.

Elastic’s platform proved instrumental in detecting and mitigating each attack stage, reinforcing the importance of unified endpoint and cloud visibility in combating advanced persistent threats like TraderTraitor.

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...