
From AirDrop to Cloud Heist: How North Korea's UNC4899 Stole Millions From a Crypto Firm Through a Single Developer's Mistake
From AirDrop to Cloud Heist: How North Korea's UNC4899 Stole Millions From a Crypto Firm Through a Single Developer's Mistake A detailed technical breakdown of one of the most sophisticated state-sponsored crypto thefts of 2025-2026 — and the defense patterns every crypto organization needs. The Kill Chain Nobody Saw Coming In March 2026, Google Cloud published their H1 2026 Cloud Threat Horizons Report detailing a devastating attack against a cryptocurrency firm. The attacker wasn't a lone hacker exploiting a smart contract bug. It was UNC4899 — a North Korean state-sponsored threat group (also tracked as Jade Sleet, TraderTraitor, Slow Pisces) — and they turned a single developer's mistake into a multi-million-dollar cryptocurrency theft. The attack didn't start with a zero-day exploit or a phishing email. It started with AirDrop . Phase 1: Social Engineering → Developer Compromise The attack chain began with a classic approach: social engineering a developer through a fake open-sour
Continue reading on Dev.to DevOps
Opens in a new tab



