{"id":"unc4736-citrine-sleet","title":"UNC4736 (Citrine Sleet)","content":"**UNC4736**, also known as **Citrine Sleet**, is a sophisticated, allegedly state-sponsored advanced persistent threat (APT) group attributed to North Korea. The group is primarily financially motivated, specializing in large-scale cybercrime and espionage operations targeting the [cryptocurrency,](https://iq.wiki/wiki/cryptocurrency) [decentralized finance (DeFi)](https://iq.wiki/wiki/defi), and financial technology (fintech) sectors. UNC4736 is known for executing complex, multi-stage campaigns that include software supply chain compromises, the exploitation of zero-day vulnerabilities, and elaborate social engineering schemes to generate revenue for the North Korean regime. Its activities are closely associated with the long-running [cryptocurrency](https://iq.wiki/wiki/cryptocurrency)-focused campaign \"Operation AppleJeus\" (MITRE ATT\\&CK ID: G1049). [\\[1\\]](#cite-id-qxUq2UdFDr4NVGX3) [\\[2\\]](#cite-id-jUpUVoONCHP64uFC) [\\[7\\]](#cite-id-LfnZYYcmhi63b0Yb)​\n\n## Overview\n\nUNC4736 is tracked under several names by various cybersecurity organizations. Mandiant uses the designation UNC4736, where \"UNC\" signifies an \"uncategorized\" threat group at the time of discovery. Microsoft tracks the actor as Citrine Sleet. Other aliases include **Labyrinth Chollima**, **Gleaming Pisces**, **Hidden Cobra**, and **UNC1720**. The group's activities are also widely associated with the \"AppleJeus\" campaign (group G1049), a term that refers to both the malware family they deploy and the threat cluster itself. [\\[3\\]](#cite-id-PV5WXGhg3wiaENhw) [\\[1\\]](#cite-id-qxUq2UdFDr4NVGX3) [\\[7\\]](#cite-id-LfnZYYcmhi63b0Yb) [\\[8\\]](#cite-id-w6BZRrlGEPgYa8kx)​\n\nThe group is attributed to North Korea’s Reconnaissance General Bureau (RGB), specifically Bureau 121. It is considered a sub-cluster of the notorious Lazarus Group and shows significant tactical overlap with another North Korean actor, APT43 (also known as \"Kimusky\"). [\\[4\\]](#cite-id-nb2OZgQhulN3gjSA) [\\[2\\]](#cite-id-jUpUVoONCHP64uFC) [\\[8\\]](#cite-id-w6BZRrlGEPgYa8kx) The primary objective of UNC4736 is to acquire foreign currency by stealing cryptocurrency assets to help the Democratic People's Republic of Korea (DPRK) circumvent international sanctions and fund its state activities, including its weapons programs. Targets typically include [cryptocurrency](https://iq.wiki/wiki/cryptocurrency) exchanges, DeFi protocols, venture capital firms, [blockchain](https://iq.wiki/wiki/blockchain)-based gaming companies, and high-value individuals such as software developers and executives within the industry. [\\[5\\]](#cite-id-165wiR1gvBJtggMM) [\\[9\\]](#cite-id-p7A9PLLpksfttTYw)​\n\n## History and Major Incidents\n\nUNC4736 has been linked to some of the most significant and complex cyberattacks against the digital asset industry, demonstrating a continuous evolution in its tactics and technical capabilities.\n\n### Operation AppleJeus (2018–Ongoing)\n\nThe \"Operation AppleJeus\" campaign (G1049), first identified around 2018, marked a concerted effort by North Korean actors to target the cryptocurrency industry. The initial campaigns involved developing and distributing trojanized but functional [cryptocurrency](https://iq.wiki/wiki/cryptocurrency) trading applications, such as CelasTradePro and UnionCryptoTrader. These applications were designed to lure investors and employees at crypto firms, initially focusing on macOS users before expanding to Windows. The applications contained backdoors that allowed the actor to conduct surveillance and steal funds. [\\[1\\]](#cite-id-qxUq2UdFDr4NVGX3) [\\[2\\]](#cite-id-jUpUVoONCHP64uFC) [\\[7\\]](#cite-id-LfnZYYcmhi63b0Yb)​\n\n### 3CX Supply Chain Compromise (2022–2023)\n\nIn one of the most notable supply chain attacks of 2023, UNC4736 was identified as the group behind the compromise of the popular VoIP software company 3CX. This was a sophisticated, two-stage supply chain attack. The operation began when a 3CX employee downloaded a trojanized version of the X\\_TRADER software package from the legitimate but compromised website of Trading Technologies. This provided the actors with initial access to the 3CX corporate network, which was later escalated using legitimate VPN credentials. [\\[3\\]](#cite-id-PV5WXGhg3wiaENhw) [\\[1\\]](#cite-id-qxUq2UdFDr4NVGX3) [\\[7\\]](#cite-id-LfnZYYcmhi63b0Yb)​\n\nFrom there, the group compromised the 3CX build environment for both Windows and macOS. They embedded malware into legitimate software updates for the 3CX desktop application, which were then distributed to thousands of 3CX customers worldwide. While the initial malicious update was widespread, the threat actor selectively deployed secondary payloads, such as the Gopuram backdoor and VEILEDSIGNAL malware, to a small number of high-value targets, particularly those in the cryptocurrency and defense sectors. This selective targeting demonstrated a clear focus on espionage and high-value financial theft, using tools like ICONICSTEALER to exfiltrate browser data from victims. [\\[3\\]](#cite-id-PV5WXGhg3wiaENhw) [\\[7\\]](#cite-id-LfnZYYcmhi63b0Yb)​\n\n### Chromium Zero-Day Campaign (August 2024)\n\nIn August 2024, Microsoft’s Threat Intelligence team reported that Citrine Sleet was actively exploiting a then-undisclosed zero-day vulnerability in the open-source Chromium web browser engine. The campaign involved a sophisticated attack chain that began with social engineering lures, such as fraudulent job offers, directed at blockchain developers. [\\[1\\]](#cite-id-qxUq2UdFDr4NVGX3) [\\[4\\]](#cite-id-nb2OZgQhulN3gjSA)​\n\nTargets were directed to an exploit domain, `voyagorclub[.]space`, which leveraged a type confusion vulnerability in Chromium's V8 JavaScript engine (CVE-2024-7971) to achieve remote code execution. This was immediately followed by the exploitation of a Windows kernel vulnerability (CVE-2024-38106) to escape the browser sandbox and gain system-level access. The final payload was an updated version of the FudModule rootkit, loaded directly into memory to establish stealthy persistence and disrupt security tools like Microsoft Defender, Crowdstrike Falcon, and HitmanPro. This was followed by the deployment of the AppleJeus trojan to steal credentials and cryptocurrency assets. This campaign highlighted the group's top-tier capability to acquire and operationalize high-value zero-day exploits. [\\[4\\]](#cite-id-nb2OZgQhulN3gjSA) [\\[8\\]](#cite-id-w6BZRrlGEPgYa8kx)​\n\n### Radiant Capital Heist (September–October 2024)\n\nIn late 2024, UNC4736 successfully attacked Radiant Capital, a decentralized finance lending platform, resulting in the theft of approximately $50 million in cryptocurrency. The infiltration began in September 2024 with a social engineering attack where the actor impersonated a former contractor on Telegram to build trust with a Radiant developer. The developer was eventually tricked into downloading a malicious ZIP archive. [\\[6\\]](#cite-id-szJXVyqE1jJ0V3Kv) [\\[9\\]](#cite-id-p7A9PLLpksfttTYw)​\n\nThe malicious archive contained the macOS malware variant `InletDrift`, which installed a backdoor on the developer's machine. After gaining an initial foothold, the group moved laterally, compromising multiple developer devices to escalate privileges. Ultimately, they compromised the platform's multi-signature (multi-sig) process to authorize fraudulent transactions and drain funds from Radiant's markets on [Arbitrum](https://iq.wiki/wiki/arbitrum) and [Binance](https://iq.wiki/wiki/binance) Smart Chain in October 2024. The group was noted to use third-party intermediaries with meticulously crafted identities designed to pass due diligence checks. The attack's success, despite Radiant's use of standard security simulations, underscored the deceptive and evasive nature of the group's TTPs. [\\[6\\]](#cite-id-szJXVyqE1jJ0V3Kv) [\\[9\\]](#cite-id-p7A9PLLpksfttTYw)​\n\n## Drift Protocol Exploit (Fall 2025–April 2026)\n\nOn April 1, 2026, the decentralized exchange [Drift](https://iq.wiki/wiki/drift) Protocol announced that a catastrophic exploit resulting in the loss of approximately 1 million to establish legitimacy. The core of the attack was not a smart contract flaw, but the social engineering of multisig signers. One contributor was compromised after cloning a malicious code repository, while another was manipulated into downloading a malicious TestFlight application. [\\[12\\]](#cite-id-pPxV1cFhowr3YFoW) [\\[11\\]](#cite-id-apuFF4S3vnFDNYfb) [\\[10\\]](#cite-id-FxoVbQi2ma7mqdM2)​\n\nTo execute the exploit, using the compromised access to the multisig signers, the attackers manufactured a fictitious token (CarbonVote Token, or CVT), and deployed pre-signed transactions to list it as legitimate collateral. They used wash trading to create an artificial price history, tricking [Drift](https://iq.wiki/wiki/drift)'s oracles into valuing the worthless token as hundreds of millions of dollars. On April 1, this manipulation allowed them to drain the protocol of approximately $285 million in real assets, such as [USDC](https://iq.wiki/wiki/usdc) and JLP. On-chain analysis connected initial funding for the attack to a withdrawal from the sanctioned mixer Tornado Cash and showed stolen funds were rapidly bridged from [Solana](https://iq.wiki/wiki/solana) to [Ethereum](https://iq.wiki/wiki/ethereum) post-heist. [\\[11\\]](#cite-id-apuFF4S3vnFDNYfb) [\\[5\\]](#cite-id-165wiR1gvBJtggMM) [\\[12\\]](#cite-id-pPxV1cFhowr3YFoW)​\n\n## Tactics, Techniques, and Procedures (TTPs)\n\nUNC4736 employs a diverse and sophisticated set of TTPs, blending advanced social engineering with high-level technical expertise.\n\n### Social Engineering and Reconnaissance\n\nThe group's operations are often preceded by meticulous reconnaissance and long-term social engineering campaigns.\n\n* **Long-Con Operations:** They engage targets for months to build trust and bypass suspicion, as seen in the six-month operation against [Drift](https://iq.wiki/wiki/drift) Protocol. This includes posing as legitimate entities like trading firms, VCs, or headhunters. [\\[5\\]](#cite-id-165wiR1gvBJtggMM)\n* **Use of Intermediaries:** The group employs non-North Korean nationals with fabricated identities to act as a public face, enabling them to attend in-person meetings at international conferences and pass due diligence checks. These personas are supported by complete, fabricated employment histories and professional networks. [\\[5\\]](#cite-id-165wiR1gvBJtggMM) [\\[9\\]](#cite-id-p7A9PLLpksfttTYw) [\\[10\\]](#cite-id-FxoVbQi2ma7mqdM2)\n* **Impersonation and Spearphishing:** They impersonate known colleagues or professionals on platforms like LinkedIn and Telegram to deliver spearphishing attacks, often luring victims with fraudulent job offers or technical discussions. [\\[6\\]](#cite-id-szJXVyqE1jJ0V3Kv)\n\n### Initial Access\n\nUNC4736 uses a variety of methods to gain initial entry into target networks.\n\n* **Software Supply Chain Compromise:** A hallmark tactic, exemplified by the nested compromise of X\\_TRADER and then 3CX. [\\[3\\]](#cite-id-PV5WXGhg3wiaENhw)\n* **Zero-Day Exploitation:** The group has demonstrated the ability to use previously unknown vulnerabilities, such as the Chromium zero-day (CVE-2024-7971), to achieve initial access. [\\[4\\]](#cite-id-nb2OZgQhulN3gjSA)\n* **Trojanized Applications:** Distributing malicious code through legitimate-seeming software, such as trojanized crypto trading apps or malicious packages on npm. [\\[1\\]](#cite-id-qxUq2UdFDr4NVGX3) [\\[7\\]](#cite-id-LfnZYYcmhi63b0Yb)\n* **Exploitation of Public-Facing Applications:** They leverage vulnerabilities in widely used developer tools like VSCode and Cursor to achieve arbitrary code execution. [\\[12\\]](#cite-id-pPxV1cFhowr3YFoW) [\\[5\\]](#cite-id-165wiR1gvBJtggMM)\n\n### Execution, Persistence, and Defense Evasion\n\nOnce inside a network, the group uses advanced techniques to maintain access and avoid detection.\n\n* **Code Signing:** Malicious files are often signed with legitimate, sometimes stolen or expiring, digital certificates to appear trustworthy. [\\[3\\]](#cite-id-PV5WXGhg3wiaENhw)\n* **Process Injection and Reflective Loading:** The group injects C2 modules into the memory of legitimate browser processes and uses open-source tools like DAVESHELL to load payloads directly into memory, bypassing disk-based detection. The tool SigFlip has also been used to inject code into signed files without invalidating the signature. [\\[3\\]](#cite-id-PV5WXGhg3wiaENhw)\n* **Payload Obfuscation and Delayed Execution:** Payloads are frequently encrypted using methods like AES-256 GCM or RC4. Malware is often configured to remain dormant for a random period (1 to 4 weeks) to evade sandboxing and behavioral analysis. [\\[3\\]](#cite-id-PV5WXGhg3wiaENhw) [\\[7\\]](#cite-id-LfnZYYcmhi63b0Yb)\n* **Persistence Mechanisms:** The group uses macOS Launch Daemons to persist the POOLRAT backdoor and DLL search order hijacking to load the TAXHAUL backdoor via the IKEEXT service on Windows. [\\[3\\]](#cite-id-PV5WXGhg3wiaENhw)\n* **C2 Communication:** The group has used GitHub repositories to host dead drop resolvers, with C2 communication occurring over HTTPS and using cookie headers for data exfiltration. [\\[7\\]](#cite-id-LfnZYYcmhi63b0Yb)\n\n### On-Chain Attack Techniques\n\nUNC4736 has demonstrated proficiency in blockchain-specific attack vectors. These include oracle manipulation, where the group creates a fictitious token, generates an artificial price history through wash trading, and has the protocol's oracles register a false, high value for the worthless asset, which is then used as collateral. This was a key component of the [Drift](https://iq.wiki/wiki/drift) Protocol exploit. The group is also known for leveraging features like the **Durable Nonce Attack**, where a transaction signed by a victim under a plausible pretext does not expire, allowing an attacker to execute it at a much later, more opportune time. [\\[5\\]](#cite-id-165wiR1gvBJtggMM) [\\[11\\]](#cite-id-apuFF4S3vnFDNYfb) [\\[12\\]](#cite-id-pPxV1cFhowr3YFoW)\n\n### On-chain Money Laundering\n\nUNC4736 employs aggressive and rapid on-chain money laundering techniques to obscure the origin of stolen funds. This includes using sanctioned cryptocurrency mixers like [Tornado Cash](https://iq.wiki/wiki/tornado-cash), not only for laundering post-heist but also for sourcing initial funding for an operation, thus obscuring the attack's origins. After an exploit, the group moves quickly to bridge stolen assets across different blockchains (e.g., from [Solana](https://iq.wiki/wiki/solana) to [Ethereum](https://iq.wiki/wiki/ethereum)) in large, individual transactions. They utilize methods such as peel chains, where funds are moved through a complex series of transactions to multiple new wallets to break the on-chain trail and complicate tracing efforts. [\\[11\\]](#cite-id-apuFF4S3vnFDNYfb)\n\n## Malware and Tools\n\nUNC4736 utilizes a mix of custom, shared, and open-source tools in its operations.\n\n| Tool Name | Type | Description |\n| :--- | :--- | :--- |\n| **AppleJeus (G1049)** | Malware Family | Overarching name for malware used in the campaign, often delivered via trojanized crypto apps. Deployed as a final payload to steal crypto assets. [\\[7\\]](#cite-id-LfnZYYcmhi63b0Yb) |\n| **Gopuram** | Backdoor | A sophisticated second-stage backdoor deployed on high-value targets for persistence and data theft. [\\[3\\]](#cite-id-PV5WXGhg3wiaENhw) |\n| **POOLRAT** | Backdoor | A backdoor designed specifically for macOS systems, used for persistence. [\\[1\\]](#cite-id-qxUq2UdFDr4NVGX3) [\\[7\\]](#cite-id-LfnZYYcmhi63b0Yb) |\n| **TAXHAUL** | Backdoor | A backdoor used for data exfiltration, notably deployed in the 3CX compromise. [\\[1\\]](#cite-id-qxUq2UdFDr4NVGX3) |\n| **FudModule Rootkit**| Rootkit | A sophisticated data-only Windows rootkit operating at the kernel level to achieve persistence and evade security software. An updated version can disrupt protected processes of security tools such as Microsoft Defender, Crowdstrike Falcon, and HitmanPro. [\\[4\\]](#cite-id-nb2OZgQhulN3gjSA) [\\[8\\]](#cite-id-w6BZRrlGEPgYa8kx) |\n| **ICONICSTEALER**| Information Stealer| A tool deployed during the 3CX incident to exfiltrate browser history, cookies, and credentials from infected systems. [\\[3\\]](#cite-id-PV5WXGhg3wiaENhw) [\\[7\\]](#cite-id-LfnZYYcmhi63b0Yb) |\n| **InletDrift** | macOS Malware | A custom malware variant used in the Radiant Capital heist to create a backdoor on a developer's system. [\\[6\\]](#cite-id-szJXVyqE1jJ0V3Kv) |\n| **VEILEDSIGNAL** | Malware Module | A malware family used by the group for communication and execution, using process injection and Windows named pipes. Key payload in the 3CX compromise. [\\[1\\]](#cite-id-qxUq2UdFDr4NVGX3) [\\[7\\]](#cite-id-LfnZYYcmhi63b0Yb) |\n| **Kaolin RAT** | Remote Access Trojan | A RAT that serves as a loader for other payloads, including the FudModule rootkit. [\\[4\\]](#cite-id-nb2OZgQhulN3gjSA) |\n| **RustBucket** | Malware Toolchain | A multi-stage malware framework written in Rust, indicating a modernization of the group's toolset. [\\[2\\]](#cite-id-jUpUVoONCHP64uFC) |\n| **SigFlip** | Post-Exploitation Tool | A tool used to inject code into digitally signed executables without breaking the signature. [\\[3\\]](#cite-id-PV5WXGhg3wiaENhw) |\n\n## Relationships and Overlaps\n\nUNC4736/Citrine Sleet, also tracked by MITRE as **AppleJeus (G1049)** and known by other aliases like **Labyrinth Chollima** and **Gleaming Pisces**, operates within a complex ecosystem of North Korean state-sponsored threat actors. The group is widely considered a subgroup or activity cluster operating under the umbrella of the Lazarus Group and is also associated with TEMP.hermit. Its toolset and infrastructure show overlaps with other North Korean actors, most notably **Diamond Sleet**, with which it shares the FudModule rootkit. In at least one instance, a target of Citrine Sleet had also been previously targeted by another group, **Sapphire Sleet**, suggesting overlapping targeting priorities or coordination among different DPRK hacking units. [\\[4\\]](#cite-id-nb2OZgQhulN3gjSA) [\\[6\\]](#cite-id-szJXVyqE1jJ0V3Kv) [\\[7\\]](#cite-id-LfnZYYcmhi63b0Yb) [\\[8\\]](#cite-id-w6BZRrlGEPgYa8kx)","summary":"UNC4736, also known as Citrine Sleet, is a state-sponsored North Korean APT group. Financially motivated, it targets the crypto sector using advanced social engineering, supply chain attacks, and zero-day exploits to steal funds for the DPRK regime.","images":[{"id":"QmfRJdSiyuvFdfQLXF7ikrqxGnTtNTQEkijm17gdrZfoCS","type":"image/jpeg, image/png"}],"categories":[{"id":"organizations","title":"organizations"}],"tags":[{"id":"Organizations"}],"media":[],"metadata":[{"id":"references","value":"[{\"id\":\"qxUq2UdFDr4NVGX3\",\"url\":\"https://malpedia.caad.fkie.fraunhofer.de/actor/unc4736\",\"description\":\"Malpedia profile of UNC4736\",\"timestamp\":1775406047657},{\"id\":\"jUpUVoONCHP64uFC\",\"url\":\"https://www.binance.com/en/square/post/309107843409409\",\"description\":\"Binance Square on UNC4736 and crypto threats\",\"timestamp\":1775406047657},{\"id\":\"PV5WXGhg3wiaENhw\",\"url\":\"https://attack.mitre.org/campaigns/C0057/\",\"description\":\"MITRE ATT\\\\&CK campaign C0057 details\",\"timestamp\":1775406047657},{\"id\":\"nb2OZgQhulN3gjSA\",\"url\":\"https://www.microsoft.com/en-us/security/blog/2024/08/30/north-korean-threat-actor-citrine-sleet-exploiting-chromium-zero-day/\",\"description\":\"Microsoft security blog on Citrine Sleet\",\"timestamp\":1775406047657},{\"id\":\"165wiR1gvBJtggMM\",\"url\":\"https://www.coindesk.com/markets/2026/04/05/drift-says-usd270-million-exploit-was-a-six-month-north-korean-intelligence-operation\",\"description\":\"CoinDesk article on the Drift Protocol exploit\",\"timestamp\":1775406047657},{\"id\":\"szJXVyqE1jJ0V3Kv\",\"url\":\"https://www.scworld.com/brief/north-korean-apt-blamed-for-radiant-capital-crypto-heist\",\"description\":\"SCWorld article on the Radiant Capital heist\",\"timestamp\":1775406047657},{\"id\":\"LfnZYYcmhi63b0Yb\",\"url\":\"https://attack.mitre.org/groups/G1049/\",\"description\":\"MITRE ATT\\\\&CK profile for AppleJeus (G1049)\",\"timestamp\":1775406349107},{\"id\":\"w6BZRrlGEPgYa8kx\",\"url\":\"https://www.darkreading.com/vulnerabilities-threats/north-korean-apt-exploits-novel-chromium-windows-bugs-steal-crypto\",\"description\":\"Dark Reading report on Citrine Sleet campaign\",\"timestamp\":1775406349107},{\"id\":\"p7A9PLLpksfttTYw\",\"url\":\"https://phemex.com/news/article/north-korean-group-unc4736-linked-to-radiant-capital-attack-71063\",\"description\":\"Phemex on UNC4736 and Radiant Capital\",\"timestamp\":1775406349107},{\"id\":\"FxoVbQi2ma7mqdM2\",\"url\":\"https://www.theblock.co/post/396361/drift-links-280-million-exploit-to-six-month-social-engineering-op-run-by-suspected-north-korean-actors?utm\\\\_source=twitter\\\\&utm\\\\_medium=social\",\"description\":\"The Block on Drift Protocol exploit attribution\",\"timestamp\":1775406349107},{\"id\":\"apuFF4S3vnFDNYfb\",\"url\":\"https://www.trmlabs.com/resources/blog/north-korean-hackers-attack-drift-protocol-in-285-million-heist\",\"description\":\"TRM Labs report on the Drift Protocol hack\",\"timestamp\":1775407123397},{\"id\":\"pPxV1cFhowr3YFoW\",\"url\":\"https://bitpinas.com/cryptocurrency/drift-protocol-exploit/\",\"description\":\"Drift Protocol exploit analysis\",\"timestamp\":1775407337711}]"},{"id":"commit-message","value":"\"Added new organization page for UNC4736\""}],"events":[{"id":"8da130e2-21d5-4cb0-8870-0a2fd4bd437c","date":"2018-01","title":"Operation AppleJeus Campaign Begins","type":"CREATED","description":"The 'Operation AppleJeus' campaign begins, marking a concerted effort by North Korean actors to target the cryptocurrency industry with trojanized applications.","link":null,"multiDateStart":null,"multiDateEnd":null,"continent":null,"country":null},{"id":"adc6b9fc-c298-4f3d-9068-50aee32b35d2","date":"2023-04","title":"3CX Software Supply Chain Compromise Identified","type":"DEFAULT","description":"Mandiant formally identifies UNC4736 as the group behind the double supply chain compromise of 3CX's VoIP software, initiated via a trojanized X_TRADER app.","link":"https://attack.mitre.org/campaigns/C0057/","multiDateStart":null,"multiDateEnd":null,"continent":null,"country":null},{"id":"35ecf746-310a-40ac-89a9-a0c111e75826","date":"2024-08","title":"Chromium Zero-Day Exploit Campaign","type":"DEFAULT","description":"Microsoft reports on Citrine Sleet exploiting a zero-day vulnerability (CVE-2024-7971) in the Chromium browser engine to compromise targets in the crypto sector.","link":"https://www.microsoft.com/en-us/security/blog/2024/08/30/north-korean-threat-actor-citrine-sleet-exploiting-chromium-zero-day/","multiDateStart":null,"multiDateEnd":null,"continent":null,"country":null},{"id":"98240493-bba2-4fe4-89e2-0b7f77a8614b","date":"2024-10","title":"Radiant Capital Heist","type":"DEFAULT","description":"The group executes a heist targeting Radiant Capital, a DeFi lending platform, resulting in the theft of approximately $50 million in cryptocurrency.","link":"https://www.scworld.com/brief/north-korean-apt-blamed-for-radiant-capital-crypto-heist","multiDateStart":null,"multiDateEnd":null,"continent":null,"country":null},{"id":"ca766a36-1f8c-4392-8113-4ed02369b348","date":"2026-04","title":"Drift Protocol Heist","type":"DEFAULT","description":"After a six-month intelligence operation, the group executes an attack on Drift Protocol, stealing approximately $270 million in digital assets.","link":"https://www.coindesk.com/markets/2026/04/05/drift-says-usd270-million-exploit-was-a-six-month-north-korean-intelligence-operation","multiDateStart":null,"multiDateEnd":null,"continent":null,"country":null}],"user":{"id":"0x8af7a19a26d8fbc48defb35aefb15ec8c407f889"},"author":{"id":"0x8af7a19a26d8fbc48defb35aefb15ec8c407f889"},"operator":{"id":"0x1E23b34d3106F0C1c74D17f2Cd0F65cdb039b138"},"language":"en","version":1,"linkedWikis":{"blockchains":[],"founders":["anon"],"speakers":[]}}