A sophisticated attack directed at a cryptomoneda ecosystem company has again highlighted how an intrusion that begins in a developer's personal device can end up emptying portfolios for millions of dollars in a cloud environment. According to Google Cloud's semi-annual cloud threat report, attributed with a moderate level of confidence to a group linked to North Korea (tracked under acronyms such as UNC4899 among others), the campaign combined social engineering, abuse of personal-to-corporate transfer mechanisms and pivoting techniques of the call living-off-the-cloud to scale privileges and manipulate financial logic in production ( H1 2026 Cloud Threat Horizon Report).
The point of entry was simple, but effective: the attackers impersonated as collaborators of an open source project and managed to get the developer to download an apparently legitimate compressed file. The same file went from personal phone to corporate team via AirDrop, and was opened within an IA-assisted development environment. The malicious embedded Python code was then executed and deployed a binary that imitated the Kubernetes command line tool, providing a silent back door to the corporate machine.

From that committed machine the attackers collected sessions and credentials available to move to the cloud environment. In an initial phase they made recognition of the projects and services undercut to find a more critical entry door: a base host that, after modifying attributes related to multifactor authentication, allowed them to deepen in concrete pods of the Kubernetes cluster ( What is a base host).
The way operators maintained their presence and the ease with which they pivoted within the environment illustrates why defenders talk about living from the cloud: they modified deployment configurations so that, each time a pod was created, a bash command capable of downloading and running a backdoor was automatically executed. At the same time, they introduced changes in resources linked to the CI / CD platform to record tokens of service accounts on the logs, allowing them to appropriate a high privilege token and use it to move laterally to pods with high permissions and privileged modes of execution.
With this privileged access, the attackers managed to escape the container and deploy persistence in sensitive infrastructure. They later focused their efforts on a workload that stored customer information: identifiers, security configurations and data associated with portfolios. There they extracted static credentials that were in environment variables and used them to connect to the production database using the Cloud SQL proxy, where they made account changes (password restoration and MFA seed update) to finally get control of high-value accounts and remove several million in digital assets.
The incident contains several lessons that are not new but persistent: personal-to-corporate transfers (AirDrop, Bluetooth, unmanaged removable means) continue to be dangerous input vectors; containers executed in privileged mode amplify potential damage; and the handling of secrets in clear text or in environment variables continues to facilitate climbing and exfiltration when it falls into the wrong hands. That is why the authors of the report recommend an in-depth approach that combines identity controls, data bridge restrictions and strict isolation in the cloud runtimes.
In practice, this means continuously validating identity and using phishing-resistant factors, restricting or disabling P2P exchange on corporate devices, requiring reliable container images and policies that prevent committed nodes from establishing unauthorized outgoing communications. It also forces to monitor unusual processes within containers and to migrate credentials and secrets outside environment variables to robust and auditable secret management solutions. In order to better understand how access to databases from managed environments works, the official documentation of the Cloud SQL Auth Proxy.
The cloud security community also has reference material to harden platforms and practices: Kubernetes official documentation on security and pod policies is a good starting point ( Kubernetes: safety concepts), and threat frameworks such as the MITRE catalogue help map techniques observed with known mitigation ( MITRE ATT & CK for Cloud).

It is also useful to review official recommendations on the safe use of interdevice transfer functions. Apple, for example, documents how AirDrop works and what controls exist to limit its use, something relevant if you want to reduce the risk that a malicious file will cross the line between personal and work ( Apple support: AirDrop).
This episode is an invitation to rethink the trusted architecture in the development and operations teams: the comfort of using code assistants and transferring artifacts between devices should not erase the need for basic controls. A combination of contextual access policies, robust MFA, proper secret management and runtime segmentation can drastically reduce the attack surface but it requires organizational discipline and continuous visibility about what happens within clusters and pipelines.
That state-motivated actors resort to such integrated techniques - from social engineering to the manipulation of deployments in Kubernetes - emphasizes that the current risk scenarios are hybrid and chained: a small neglect at the end of the developer can become, if the weaknesses of the cloud environment are exploited, a multimillion-dollar robbery. Prevention is to close these chains in all their links and to invest in controls that hinder lateral movement and persistence once inside.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...