north korea ransomware attack

Shadows in the digital domain have grown longer. North Korean state-sponsored hacking group Moonstone Sleet, previously tracked as Storm-1789, has taken a concerning turn in its cyber operations. They’re now deploying Qilin ransomware. First observed in February 2025, this marks a significant shift in their strategy. Pretty alarming stuff.

Moonstone Sleet isn’t playing games. Well, actually, they are – trojanized ones. The group tricks victims through social media apps like Telegram and LinkedIn, convincing them to download malicious software. They’ve even set up fake software development companies like C.C. Waterfall and StarGlow Ventures. Classic North Korean deception tactics.

The digital wolf wears sheep’s clothing—fake companies, social media traps, and trojanized games form Moonstone Sleet’s predatory arsenal.

Qilin isn’t new to the ransomware scene. Active since August 2022 (initially called “Agenda”), this Ransomware-as-a-Service operation has claimed over 310 victims on its dark web leak site. Recent trends show ransom demands have dramatically escalated from modest $25,000 to millions of dollars. They’ve hit big names – automotive giant Yangfeng, American newspaper publisher Lee Enterprises, and even caused outages in major NHS hospitals in London. Not exactly small potatoes.

What’s remarkable is Moonstone Sleet’s progression. They previously relied exclusively on custom ransomware. Now they’re collaborating with third-party RaaS providers. It’s like watching a villain’s origin story unfold in real-time. Terrifying.

This development aligns with broader North Korean cyber activities. Similar groups like Diamond Sleet and Onyx Sleet have used ransomware for financial gain. Remember WannaCry in 2017? Same playbook, new chapter.

The cybersecurity implications are clear. North Korean cyber threats are growing more sophisticated. Organizations need robust defenses. Patches. Updates. Vigilance against social engineering. Small businesses are particularly vulnerable, with 60% shutting down within six months after experiencing a cyber attack.

State-sponsored cyber attacks aren’t going away. They’re adapting. Advancing. Getting smarter. And Moonstone Sleet’s deployment of Qilin ransomware represents just the latest progression in this dangerous environment. Regular data backups are essential for businesses to maintain continuity if they fall victim to these increasingly sophisticated attacks. The digital shadows keep growing. No one is immune.

You May Also Like

Tata Technologies Faces Data Crisis After Ransomware Attack – Will They Survive the Aftermath?

Tata Technologies battles devastating 1.4TB data breach as Hunters International threatens to expose 730,000 files. Could this be the final blow for India’s tech giant? Cybersecurity failures have consequences.

Spearwing Raas Group Escalates Cyber Warfare With Medusa Ransomware Surge

Russian hackers expand their criminal empire while competitors falter. Spearwing’s Medusa ransomware quietly doubled attacks in 2025, demanding up to $15 million from victims. Your organization could be next.

Bis Industries Faces Dark Cyber Challenges in Investigating Ransomware Claims

Bis Industries grapples with a Christmas-period ransomware attack that exposed 500GB of sensitive data. RansomHub’s darknet threats could devastate the mining giant’s operations. Most companies never recover.

Ebyte Ransomware: Elevating Encryption Threats Against Vulnerable Windows Users

This open-source ransomware weaponizes ChaCha20 encryption against vulnerable Windows users while masquerading as “educational.” Learn how the Ebyte threat forces victims to pay cryptocurrency or lose everything forever.