How One Infostealer Infection Solved a Global Supply Chain Mystery and Unmasked DPRK Spies in U.S. Crypto

How One Infostealer Infection Solved a Global Supply Chain Mystery and Unmasked DPRK Spies in U.S. Crypto.

Researcher & Law Enforcement Notice: Hudson Rock welcomes researchers and law enforcement teams to contact us in order to receive the full, unredacted infected machine data post-verification via [email protected].

Executive Summary: Key Findings

  • The Infiltrator-in-Chief (Gate.us): The operative successfully infiltrated the American crypto exchange Gate.us. In a staggering display of irony, this sanctioned North Korean actor sat in on Google Meets with Western compliance vendors (Sumsub) to actively define the very AML/KYC logic designed to catch him, mapping their blind spots using real FBI fugitives.
  • The Polyfill.io Mastermind: Definitive forensic evidence links the catastrophic Polyfill.io supply chain attack (which compromised 100,000+ websites) directly to a North Korean state-sponsored actor embedded within a Chinese syndicate.
  • Japanese Scientific Espionage: Transcending simple IT wage theft, the actor exfiltrated sensitive, air-gapped network blueprints from the National Institute for Materials Science (NIMS), demonstrating a pivot from illicit revenue generation to strategic state espionage targeting critical infrastructure.
  • Automated Crypto Laundering: The actor built an automated Telegram-based cryptocurrency gateway to lease out poisoned CDN nodes and wash USDT without manual intervention.
  • A Cybercriminal PIP: Despite orchestrating massive cyber warfare campaigns, the North Korean operative was put on a “Performance Improvement Plan” and given a salary cut to $3,000/month by his Chinese handlers for needing “too much guidance.”

The global cybersecurity community has spent the past year unraveling the catastrophic Polyfill.io supply chain attack, an event that compromised over 100,000 websites globally. Until now, researchers could only attribute the attack to a shadowy Chinese entity named “Funnull” and its ties to transnational organized crime. The missing link was definitive attribution.

That link has just been found. An exhaustive, forensic-level analysis of browsing history, credential dumps, and operational telemetry recovered from a compromised endpoint by Hudson Rock definitively links the Polyfill.io operator to state-sponsored cyber activities aligned with the Democratic People’s Republic of Korea (DPRK).

The evidence was not found via advanced network intrusion. It was found because the elite North Korean operative made a fatal operational security (OPSEC) mistake: they downloaded a fake software setup file and infected their own machine with the LummaC2 infostealer.

/// ENDPOINT COMPROMISE REPORT ///
MALWARE: LummaC2 (Build: Jul 31 2024)
DATE OF INFECTION: 06.08.2024 00:38:21 (UTC-7)
HOSTNAME: DESKTOP-OG1CFR5
IP ADDRESS: 192.161.60.132
OS VERSION: Windows 10 Enterprise (10.0.19041) x64

FORENSIC YIELD: 100+ Credentials, 7,000+ Browsing Logs, Direct Cloudflare Admin Access, Browser Autofill Telemetry, Thousands of Internal Google Translations.
Overview of compromised machine in Hudson Rock's Cavalier
Hudson Rock’s Cavalier intelligence portal displaying the overarching profile of the compromised North Korean endpoint.

The browsing history extracted directly from the machine perfectly captures the exact user journey that led to the compromise. The operative, likely searching for cracked software or IT tools to facilitate their operations, navigated to a MediaFire file-sharing link. They proceeded to download a password-protected ZIP archive deceptively named to appear as a legitimate software installer. This archive contained the trojanized payload:

History.txt Extraction: The Infection Vector
URL: https://www.mediafire.com/file/gflsp6ovigjnvms/@#Full_Istaller_Pc_Setup_2024_PaSSW%E1%B9%8FrD^$.zip/file TITLE: @#Full_Istaller_Pc_Setup_2024_PaSSWṏrD^$ TIME: 06.08.2024 10:31:48
Infection analysis by Hudson Rock AI
Hudson Rock AI’s automated analysis mapping the infection vector via the trojanized, password-protected ZIP archive.

What followed was a massive exfiltration of operational data. This report meticulously deconstructs the actor’s identity matrices, corporate targets, cryptographic financial operations, internal communications, and backend infrastructure. It provides a terrifying look at the convergence of illicit revenue generation (the “DPRK IT Worker” program) and advanced cyber espionage.

1. Persona Architecture and The “Mental Bridge” OPSEC Failure

A defining characteristic of DPRK IT worker operations is the systematic, industrialized creation of synthetic identities. These personas are deployed across global freelance platforms, code repositories, and communication channels to subvert Know Your Customer (KYC) regulations and secure privileged employment within high-value target organizations.

Overview of searches and domain categorization
Categorization of the threat actor’s browsing habits and domain queries, reflecting a heavy focus on IT infrastructure, cryptocurrency, and translation services.
The “Koala” Cluster
Targets: Global Remote IT, Infrastructure Admin
Platforms: LinkedIn, Deel, AWS, Cloudflare, GitHub
Primary Ops
The “Midas” Cluster
Targets: Developer Tools, OPSEC, Communications
Platforms: SignalHire, Alchemy API, SMSAnon, Hushed
Infrastructure
The “Ariel Cruz” Persona
Targets: US Crypto Exchanges, AML/KYC Vendors
Platforms: Sumsub, Elliptic, Outlook Live
Crypto Infiltration
The “Brian” Persona
Targets: Global Supply Chain, DNS Control
Platforms: GitLab, FunnullDNS, Cloudflare Tenant
Supply Chain Attack

The actor relies heavily on stolen identities, but maintaining the digital footprint of these identities is difficult. The translation history shows a panicked internal communication regarding a burned identity: “This issue that has surfaced with Josue’s SSN/ID can that be fixed without further integration?… What can we do that will not require Twilio as of right now?” The actor is trying to figure out how to maintain corporate access for the stolen “Josue” persona without having to pass Twilio’s SMS multi factor authentication.

Crucially, the massive volume of Google Translate URL telemetry definitively exposes the operator’s native language and true location. The actor uses a “Mental Bridge” workflow: constantly receiving English messages from US employers and Chinese messages from the Funnull syndicate, translating both into Korean to comprehend them, formulating thoughts in Korean, and translating outwards.

Input
English (US Boss) / Chinese (Handler)
sl=en&tl=ko
Translate to Korean
DPRK Operative
Native Korean Processing
sl=ko&tl=en
Translate from Korean
Output
Polite Corporate Replies

In one egregious OPSEC failure, this mental bridge caught the actor slipping up on time zones. After crafting a highly professional English excuse to miss a US corporate meeting, the actor immediately messages their Chinese handler (“ggbond”) referencing Beijing time:

Google Translate Telemetry: The Timezone Slip-Up
[Translating Korean to English for US Employer] URL: https://translate.google.com/?sl=ko&tl=en&text=I%20hope%20this%20message%20finds%20you%20well.%0AI%20regret%20to%20inform%20you…I%20have%20an%20appointment%20with%20a%20private%20doctor%20on%20that%20day. [Translating English from Handler to Korean immediately after] URL: https://translate.google.com/?sl=auto&tl=ko&text=how%20about%20having%20a%20meeting%20with%20you%20at%208%20pm%20(Beijing%20time)on%2011th%20to%20discuss%20CMS%20development%2C%20wallet%20screening%20and%20US%20aws%20server%20management%3F

This asynchronous deception allows them to dodge live video standups (which could expose their accent or location) and maintain the facade of a reliable remote worker while hiding their physical reality.

2. Credential Recycling and the Tiered Security Matrix

Despite their sophisticated persona management, the actor exhibits severe credential recycling. This vulnerability allowed analysts to definitively link disparate accounts back to a single operator. The passwords extracted by LummaC2 fall into distinct, functionally segregated groups.

Security Tier Password String Associated Use Cases
Tier 1: Expendable rty20210104, Rty@20210104 Public-facing profiles, HR platforms, daily communication (GitHub, Notion, Lusha, Deel).
Tier 2: Infrastructure QWE@#$qwe234, !QAZXSW@1qazxsw2 High-value technical infrastructure, VPS hosting, Web3 platforms (Cryptomus, Infura, Gate.us admin).
Tier 3: Bulletproof C2 nk******** Exclusive, siloed access to stark-industries.solutions endpoints (Russian state-linked bulletproof hosting).
Tier 4: Polyfill Admin keC************** Exclusive access to [email protected] for managing the weaponized Cloudflare CDN.

Most critically, the Tier 3 password (nk********) is isolated strictly for Stark Industries, a known bulletproof host used by DPRK threat actors. The prefix “nk” within the Stark password likely serves as an internal mnemonic for “North Korea”, highlighting the distinct operational silo of this specific Command and Control (C2) infrastructure.

3. The Smoking Gun: Linking DPRK to Polyfill.io

Perhaps the most globally significant finding in this analysis is the definitive, operational link between this North Korean endpoint and the infrastructure responsible for the massive Polyfill.io supply chain attack of 2024.

In early 2024, a Chinese Content Delivery Network (CDN) company named “Funnull” acquired the ubiquitous open-source JavaScript library polyfill.io. By June, Funnull weaponized the script, injecting malware that redirected mobile users on over 100,000 websites to malicious sports betting and scam sites.

Hudson Rock has been tracking the Funnull nexus closely. In our previous investigation, Infected by GTA 5 Cheats: How an Infostealer Infection Unmasked a North Korean Agent, we revealed how a careless malware infection exposed a DPRK IT worker acting as a core developer for the Funnull network. The forensic evidence recovered from this new endpoint elevates that initial discovery, tying the same DPRK-Funnull cell directly to the administration of the catastrophic Polyfill.io supply chain attack.

The forensic evidence ties the confiscated endpoint directly to the administration of this campaign. We can establish an ironclad chain of evidence linking the North Korean operator to the Chinese syndicate and the Polyfill control panels, all running on the exact same infected machine (DESKTOP-OG1CFR5).

First, the operator used the persona “Brian” to act as a high-level systems administrator for Funnull’s backend infrastructure. The infostealer successfully extracted the actor’s direct developer credentials to Funnull’s dynamically generated DNS management portal:

Developer credentials for Funnull DNS backend
LummaC2 credential extraction showing the actor’s direct developer login to the Funnull DNS management portal (kk5yuzmev2qbgulz.com).
History4.txt Extraction: Funnull Backend Administration
URL: https://gy4q3fpx3gh77gw.kk5yuzmev2qbgulz.com/#/domin/list TITLE: 域名解析FunnullDNS (Domain Name Resolution FunnullDNS) TIME: 01.08.2024 11:30:50 SOFT: Chrome Profile 4 (127.0.6533.89) URL: https://discord.com/register USER: [email protected] PASS: ***************

This technical overlap was independently verified by external threat intelligence. Zach Edwards from Infoblox confirmed the structural ties connecting this DPRK actor’s workspace to the Chinese CDN. Specifically, the DGA-style domain used for the FunnullDNS login (kk5yuzmev2qbgulz.com) shares infrastructure with other test domains (like cctest.kk5yuzmev2qbgulz[.]com) that have reverse PTR records pointing directly to t2.funnull[.]host.

URLScan results showing PTR records linking to Funnull
URLScan data confirming that the threat actor’s dynamically generated DNS management domains share reverse PTR records with core Funnull infrastructure.

Second, the same password dump explicitly contains the master credentials for the Polyfill Cloudflare tenant, proving the actor had direct control over the weaponized domain:

All Passwords.txt Extraction: The Polyfill Admin
SOFT: Chrome Profile 4 URL: https://dash.cloudflare.com/login USER: [email protected] PASS: keC**************

Third, the Google Translate telemetry captures the exact moment the Funnull syndicate discussed modifying the Polyfill domains and DNS routing during the peak of the attack:

Translation Telemetry: Executing the Polyfill Attack
[Internal Syndicate Communications translated to Korean] TEXT: Yo, [6/28/2024 8:24 AM] polyfill.com change domian polyfillcache.com TEXT: summer可以修改dns (summer can modify dns) TEXT: 用白山云 账户你可以问boon (Use Baishan Cloud account you can ask boon)

Even more damning, the logs expose the exact technical directives the Chinese handlers gave the North Korean coder to build and debug the malware. The handlers instructed “Brian” to hide the malicious code (the “injection function”) inside a specific build process of the “GoEdge” CDN network so that open-source users wouldn’t detect it, and actively complained when the payload failed to execute properly:

Translation Telemetry: Hiding and Debugging the Payload
[Chinese Handler instructing DPRK Coder on hiding the payload, translated to Korean] TEXT: “goedgecloud 源码是可能给其他人的,但是 注入功能是不能让其他人知道, 所以需要把注入功能写在一个单独go文件, 编译的时候有这个文件就编译,没有就不编译(Translation: “goedgecloud source code may be given to others, but the injection function cannot be known by others, so the injection function needs to be written in a separate go file. When compiling, if this file exists, it will be compiled, if not, it will not be compiled.”) [Chinese Handler complaining about Polyfill payload execution] TEXT: “Yo, [6/10/2024 12:54 PM] why polyfill 默认没有展示script” (Translation: “Why polyfill defaults to not showing script”) TEXT: “需要修复一下” (Translation: “Needs to be fixed”) TEXT: “是boon 覆盖了吗? 你和他同步一下” (Translation: “Did boon overwrite it? You sync with him”)

This is absolute, irrefutable proof of the supply chain attack mechanics, linking the Chinese Funnull CDN operator directly to the DPRK coding apparatus.

The Operative: “Brian”
DPRK Agent managing [email protected] from the compromised endpoint.
The Front: Funnull CDN
Chinese CDN company used as a corporate wrapper to acquire legacy open-source projects.
The Vector: Polyfill.io Compromise
Malicious JavaScript injected into 100,000+ websites globally.
The Payload: Triad Nexus Traffic Hijacking
Mobile users redirected to Suncity Group gambling sites (linked to transnational organized crime).
The Objective: The Lazarus Pipeline
Gambling ecosystem engineered to launder massive volumes of cryptocurrency back to the North Korean state.

4. The Infiltrator-in-Chief: Spying on Gate.us Compliance

The credential dumps, screenshots, and internal translation logs reveal what is undoubtedly one of the most bizarre and ironic scenarios ever recorded in threat intelligence. The DPRK actor successfully infiltrated Gate.us, an American cryptocurrency exchange, securing a high level administrative role under the synthetic persona Ariel Cruz ([email protected]).

History5.txt Extraction: Direct Access to Compliance Dashboards
URL: https://cockpit.sumsub.com/checkus#/applicant/66a453df5137ba3da8742f58/basicInfo?clientId=gate.us_60664 TITLE: Sumsub | Applicants Dashboard TIME: 06.08.2024 00:58:26
Gate.us credentials for Elliptic in Cavalier
Hudson Rock’s Cavalier portal surfacing the operative’s compromised credentials for Elliptic, confirming direct access to the premier blockchain analytics platform using their Gate.us corporate identity.
DPRK operative inside a Sumsub Google Meet
Screenshot recovered from the infected machine showing the North Korean operative (using the alias “Ariel Cruz”) sitting directly in a Google Meet consultation with Sumsub representatives.

The actor is literally positioned inside a US crypto exchange, directing the implementation of the very AML and KYC tools (Sumsub and Elliptic) designed to keep sanctioned actors like themselves out of the global financial system.

Internal corporate chat titled Elliptic chat
Simultaneous screenshot showing the operative using an internal corporate messenger, conversing with a colleague named “ggbond” in a channel designated for “Elliptic chat”. This proves the actor was deeply embedded within the US exchange’s compliance integration.

To gather intelligence on their own employer’s security posture, the actor scoured internal repositories and search engines to understand the exact technical specifications of the exchange’s KYC implementation.

Search history for Gate.io Sumsub integration
The actor’s browsing history reveals them actively hunting for documentation and technical details regarding Gate.io’s specific implementation of the Sumsub KYC platform.

The internal translation logs reveal a stunning dynamic. The DPRK operative was not just writing code; they were intercepting, translating, and studying high-level executive communications between Gate.us leadership and their compliance vendors. The telemetry (showing English being translated to Korean via sl=en&tl=ko) proves the North Korean spy was silently monitoring his American employers (R., C., and Dr. H.) as they negotiated biometric data liability with Sumsub:

Translation Telemetry: Spying on Executive Legal Negotiations
[Translating intercepted internal US company emails TO Korean (sl=en&tl=ko)] TEXT: “C. assured the agreement w/ memo will be out today. I have aligned w/ R. who will share w/ Dr. H. today as well… We ran into a legal issue where SumSub (SS) was asking for indemnification for biometric data storage, meaning they wanted no liability for anything. I denied that. We cannot take liability from a provider as we are paying them to use THEIR tech. Its legal crazy. Plus its super expensive. .24 cents per customer. Additionally, SumSub has been sued in Illinois court for $100MM for biometric data in a class action lawsuit”

By covertly feeding these internal executive emails into Google Translate to read in his native Korean, the operative gained a masterclass in US legal vulnerabilities, corporate liability fears, and exactly how Western exchanges evaluate the cost of identity verification (down to the 24 cent per user margin).

This reconnaissance wasn’t limited to intercepted emails. The operative successfully exfiltrated highly sensitive internal architecture diagrams detailing exactly how the crypto exchange routes user data through Sumsub’s verification engine.

Sensitive diagram of Gate.io and Sumsub integration
A highly sensitive internal workflow diagram recovered from the endpoint, illustrating the exact logic and data routing Gate.io uses for Sumsub KYC verification. The DPRK now possesses the literal blueprint to this exchange’s compliance perimeter.

But the infiltration goes deeper than eavesdropping. To ensure Gate.us’s compliance systems worked (or to map their exact blind spots), the US team tasked the actor with testing the staging environment. The actor didn’t just use dummy data; they actively searched for and translated the profiles of real FBI fugitives and heavily sanctioned individuals to feed into the test environment. Translation logs show them researching Bernard Madoff (the architect of the largest Ponzi scheme in history), George Wright (a fugitive hijacker), and Milovan Bjelica (a sanctioned Bosnian politician).

Translation Telemetry: Testing Real Fugitives against US KYC
[Translating Wikipedia Profiles to Korean for testing] TEXT: “Donna Joan Borup is wanted for her alleged participation in a violent anti-apartheid demonstration at JFK International Airport…” TEXT: “On September 26, 2011, after more than 40 years as a fugitive, Wright was arrested in Portugal… Wright is the sole hijacker to remain at large.” TEXT: “Milovan Bjelica Cicko je rođen 1958. godine u Rogatici…” (Bosnian politician under OFAC Sanctions) [Translating US Boss message to Korean regarding the test results] TEXT: “A. at SS states the approval of the Saddam Hussein was due to him being deceased. I reiterated any usage of a deceased persons PII is fraud and should have been stopped by their tool” TEXT: “we will be getting prod access with SS next week. We will have an alottment of 200 screenings. So 15 customers can be ran 10 times each.”

By pushing real world criminal and sanctioned profiles through the staging environment (including testing “Saddam Hussein” and getting an approval), the North Korean operative was successfully reverse-engineering the precise detection thresholds, fuzzy matching logic, and blind spots of the West’s premier anti-money laundering algorithms.

5. The “So What?” of NIMS: A Pivot to Strategic Espionage

While the DPRK IT worker program is widely understood as an illicit revenue generation scheme, the recovered telemetry proves this actor used their access to conduct strategic, state-sponsored data exfiltration.

Overview of stolen files
Overview of the files stolen from the endpoint, highlighting the sheer volume of corporate data, source code, and credentials exposed to the infostealer.

The telemetry explicitly identifies the compromised Japanese consultancy as LR Techs (lrtechs.co.jp). Embedded deep within their internal development team under the alias “Wenyi Han” ([email protected] and GitHub handle wenyidev921), the DPRK operative secured a devastating supply-chain foothold. By infiltrating LR Techs’ Backlog workspaces, Slack channels, and AWS environments, the actor didn’t just breach a single target, they gained lateral access to a massive portfolio of downstream Japanese enterprise clients.

Passwords.txt & History.txt Extraction: The LR Techs Supply-Chain Vector
SOFT: Chrome Profile 1 URL: https://github.com/login USER: dev-lrtechs PASS: ********** SOFT: Chrome Profile 1 URL: https://eu-north-1.signin.aws.amazon.com/changepassword USER: l-one-user PASS: ************ SOFT: Chrome Profile 1 URL: https://apps.nulab.com/signup/verify USER: [email protected] PASS: ********** URL: https://lrtechs.backlog.com/dashboard TITLE: [開発チーム] ダッシュボード | Backlog TIME: 01.08.2024 08:25:09

But the espionage goes much further than financial data. The Autofills.txt telemetry captures the exact moment the North Korean operative exfiltrated highly sensitive, air-gapped network blueprints from the National Institute for Materials Science (NIMS).

NIMS is not just another corporate target; it is the absolute backbone of Japanese aerospace, defense, and nanotechnology research. In Google Workspace (Docs/Drive), when a user clicks “Make a copy” to clone a document to their own private drive, the browser captures the title in the DOM element ID copy-filename-input. The autofill logs definitively prove the actor wasn’t just reading these documents, they were actively cloning the closed-network architecture blueprints of NIMS for exfiltration.

Autofills.txt Extraction: NIMS Scientific Data Exfiltration
[Proof of Cloning NIMS Network Blueprints] FORM: copy-filename-input VALUE: 国立研究開発法人 物质・材料研究机构_闭域で动作するデータ管理システム_インフラ情報缠め (Translation: National Institute for Materials Science_Data Management System Operating in a Closed Network_Infrastructure Information Summary) [Proof of Cloning Other Proprietary Databases] FORM: 1cx6be:qs.copy-filename-input VALUE: Copy of 専門誌販売会社の販売管理システム _BE環境構築手順 (Translation: Copy of Specialized Magazine Sales Company Sales Management System _BE Environment Construction Procedure)

Cloning “closed-network” infrastructure blueprints indicates a terrifying pivot. This operative was not just stealing wages, they were conducting strategic state espionage targeting critical national infrastructure.

6. Automated Crypto Laundering and the “Cybercriminal PIP”

As a revenue generating arm of the DPRK, the threat actor’s endpoint exhibits significant interaction with cryptocurrency infrastructure. The actor was building an automated Telegram-based payment gateway designed to route and wash USDT using rented TRON energy to avoid transaction fees entirely, directly supporting the Lazarus and Suncity money laundering pipeline.

Translated internal chats expose exactly what this bot was for: automating the sale of malicious CDN infrastructure. The actor writes a status report to his Chinese handlers detailing the exact mechanics of the API integration to wash the funds:

Translation Telemetry: Syndicate Crypto Infrastructure
[Translating Chinese to Korean: The laundering mechanics] TEXT: “目前,我们已经引入了使用feee.io的能源贷款机制… 我们向feee.io平台提交订单,将能源贷给用户的钱包地址… 原始费率:13-40 TRX(平均:26 TRX) 采用能源贷款后的费率:平均3.8 TRX” (Translation: “Currently, we have introduced the energy lending mechanism using feee.io… We submit an order to the feee.io platform to loan energy to the user’s wallet address… Original rate: 13-40 TRX (Average: 26 TRX) Rate after using energy loan: Average 3.8 TRX“) [Translating Handler instructions to Korean] TEXT: “电报的钱包会帮你处理好各种问题,例如到账确认。 你自己做的话, 得确认是否到账, 甚至得给每个用户生成一个地址。 不然你确认不了是哪个用户发给你的。” (Translation: “The telegram wallet will help you handle various problems, such as account confirmation. If you do it yourself, you have to confirm whether the payment has arrived, and you even have to generate an address for each user. Otherwise, you can’t confirm which user sent it to you.”)

The team is extremely paranoid about operational security regarding this bot’s source code, stating: “Severe Warning: The current repository code belongs to core commercial secrets, and must never be leaked!”

However, despite the massive scale of the global supply chain attack they were facilitating, the telemetry reveals a hilarious, almost mundane reality. The Chinese Triad bosses were apparently unsatisfied with the North Korean hacker’s CDN coding efficiency. In a chat reminiscent of a toxic corporate HR meeting, his handlers formally docked his pay and put him on a literal “Cybercriminal Performance Improvement Plan” (PIP):

Translation Telemetry: The Cybercriminal PIP
[Translating Chinese Handler to Korean (sl=zh-CN&tl=ko)] TEXT: “Brian, 和团队沟通讨论, 你的工作情况并未能符合我们对于高级开发的期待, 相反的还需要比较多的沟通指导, 因此本月开始薪资将会调整为 3000$, 后续能满足项目的要求, 会逐步调回, 请知悉” (Translation: “Brian, communicated and discussed with the team. Your work performance has failed to meet our expectations for a senior developer. On the contrary, it requires more communication and guidance. Therefore, starting this month, your salary will be adjusted to $3,000. If you can meet the project requirements later, it will be gradually adjusted back. Please be aware.”)

Even state-sponsored elite hackers, responsible for compromising 100,000+ global websites, aren’t immune to the soul-crushing bureaucracy of middle management. Slapped with a PIP, the APT had his salary slashed by his organized crime bosses for needing “too much guidance.” Cyber warfare, it turns out, still has micromanagers.

7. Malicious Infrastructure and Contagious Interview

To sustain operations while evading detection, the actor relies heavily on Stark Industries Solutions. The credentials recovered include logins for vision.stark-industries.solutions and friday.stark-industries.solutions. Stark Industries is a notorious bulletproof hosting provider sanctioned by the EU for enabling Russian hybrid threats.

All Passwords.txt Extraction: Bulletproof C2
SOFT: Chrome Default URL: https://vision.stark-industries.solutions/auth/login USER: [email protected] PASS: nk************

Prior to these sanctions, threat intelligence analysts identified Stark Industries as the primary infrastructure provider for a North Korean-aligned threat group tracked as “Contagious Interview” (G1052). The presence of these credentials confirms that this operator is a constituent member of the G1052 cluster.

Defensive Playbook: Spotting the Infiltrator

The forensic analysis of this endpoint dictates that organizations must move beyond simple identity verification and implement stringent behavioral analytics for remote contractors. Key markers of infiltration include:

  • Latency/IP Audits: Flag “domestic” workers with consistent 200ms+ latency. This is a primary signature of residential proxy networks and commercial VPNs masking overseas traffic.
  • Clock-Skew Analysis: Monitor for burst activity, commits, and logins that consistently align with Pyongyang or Beijing working hours (UTC+8/UTC+9) rather than the employee’s stated local time zone.
  • The “Google Translate” Pattern: Monitor for high volumes of translation queries paired with “Make a copy” events (copy-filename-input) in Google Workspace, especially when those events involve sensitive internal infrastructure, network diagrams, or PII databases.

Conclusion

The forensic analysis of this endpoint yields profound implications. It conclusively proves that DPRK IT workers are not merely low level coders generating freelance wages. They are highly capable advanced persistent threats (APTs) who embed themselves into the core infrastructure of foreign targets to conduct strategic espionage.

The attribution of the Polyfill.io supply chain attack to a coordinated operation involving North Korean cyber elements and transnational organized crime is a watershed moment in threat intelligence. Furthermore, their ability to gain employment writing the very KYC compliance code designed to stop them demonstrates a catastrophic failure of current corporate vetting paradigms.

Infostealers have become a powerful, evidence-based tool for researchers, law enforcement, and security agencies conducting deep-dive investigations. Hudson Rock specializes in customizing and analyzing this raw telemetry to fit the exact needs of these critical investigations, uncovering the hidden mechanics of global cybercrime.

To learn more about how Hudson Rock protects companies from imminent intrusions caused by info-stealer infections of employees, partners, and users, as well as how we enrich existing cybersecurity solutions with our cybercrime intelligence API, please schedule a call with us, here: https://www.hudsonrock.com/schedule-demo

We also provide access to various free cybercrime intelligence tools that you can find here: www.hudsonrock.com/free-tools

Thanks for reading, Rock Hudson Rock!

Follow us on LinkedIn: https://www.linkedin.com/company/hudson-rock
Follow us on Twitter: https://twitter.com/RockHudsonRock

Don’t Stop Here

More To Explore

BE THE FIRST TO KNOW

Get FREE access to Cavalier GPT

Stay informed with the latest insights in our Infostealers weekly report.

Receive a notification if your email is involved in an Infostealer infection.

No Spam, We Promise

BE THE FIRST TO KNOW

Get FREE access to Cavalier GPT

Stay informed with the latest insights in our Infostealers weekly report.

Receive a notification if your email is involved in an Infostealer infection.

No Spam, We Promise