US-based enterprise software company JumpCloud was breached by North Korean Lazarus Group hackers, according to security researchers at SentinelOne and CrowdStrike.
In a report published on Thursday, SentinelOne Senior Threat Researcher Tom Hegel linked the North Korean threat group to the JumpCloud hack based on multiple indicators of compromise shared by the company in a recent incident report.
“Reviewing the newly released indicators of compromise, we associate the cluster of threat activity to a North Korean state sponsored APT,” said Hegel.
“The IOCs are linked to a wide variety of activity we attribute to DPRK, overall centric to the supply chain targeting approach seen in previous campaigns.”
Cybersecurity firm CrowdStrike also formally tagged Labyrinth Chollima (whose activity overlaps with that of Lazarus Group, ZINC, and Black Artemis) as the particular North Korean hacking squad behind the breach based on evidence found while investigating the attack in collaboration with JumpCloud.
“One of their primary objectives has been generating revenue for the regime. I don’t think this is the last we’ll see of North Korean supply chain attacks this year,” CrowdStrike Vice President for Intelligence Adam Meyers told Reuters.
This hacking group has been active for over a decade, since at least 2009, and is known for attacks against high-profile targets worldwide, including banks, government agencies, and media organizations.
The FBI linked Lazarus Group attackers to the breach of Axie Infinity’s Ronin network bridge, the largest cryptocurrency hack ever, which allowed them to steal a record-breaking $620 million in Ethereum.
In April, Mandiant said that another North Korean threat group tracked as UNC4736 was behind the cascading supply chain attack that hit VoIP firm 3CX in March. UNC4736 is related to the Lazarus Group behind Operation AppleJeus, which was connected by Google TAG to the compromise of Trading Technologies’ website, the 3CX developer.
JumpCloud confirms hack by APT group
On June 27th, JumpCloud discovered an incident where “a sophisticated nation-state sponsored threat actor” breached its systems through a spear-phishing attack. Although there was no immediate evidence of customer impact, JumpCloud proactively rotated credentials and rebuilt compromised infrastructure as a precautionary measure.
During the investigation, on July 5th, JumpCloud detected “unusual activity in the commands framework for a small set of customers.” Collaborating with incident response partners and law enforcement, it also analyzed logs for signs of malicious activity and force-rotated all admin API keys.
In an advisory published on July 12th, JumpCloud shared details of the incident and released indicators of compromise (IOCs) to help partners secure their networks against attacks from the same group.
As of now, JumpCloud has not disclosed the number of customers impacted by the attack and has not attributed the APT group behind the breach to a specific state.
In January, the company also disclosed that it was investigating the impact of a CircleCI security incident on its customers.
Headquartered in Louisville, Colorado, JumpCloud operates a directory-as-a-service platform providing single sign-on and multi-factor authentication services to over 180,000 organizations across more than 160 countries.