north korea ransomware attack

Shadows in the digital domain have grown longer. North Korean state-sponsored hacking group Moonstone Sleet, previously tracked as Storm-1789, has taken a concerning turn in its cyber operations. They’re now deploying Qilin ransomware. First observed in February 2025, this marks a significant shift in their strategy. Pretty alarming stuff.

Moonstone Sleet isn’t playing games. Well, actually, they are – trojanized ones. The group tricks victims through social media apps like Telegram and LinkedIn, convincing them to download malicious software. They’ve even set up fake software development companies like C.C. Waterfall and StarGlow Ventures. Classic North Korean deception tactics.

The digital wolf wears sheep’s clothing—fake companies, social media traps, and trojanized games form Moonstone Sleet’s predatory arsenal.

Qilin isn’t new to the ransomware scene. Active since August 2022 (initially called “Agenda”), this Ransomware-as-a-Service operation has claimed over 310 victims on its dark web leak site. Recent trends show ransom demands have dramatically escalated from modest $25,000 to millions of dollars. They’ve hit big names – automotive giant Yangfeng, American newspaper publisher Lee Enterprises, and even caused outages in major NHS hospitals in London. Not exactly small potatoes.

What’s remarkable is Moonstone Sleet’s progression. They previously relied exclusively on custom ransomware. Now they’re collaborating with third-party RaaS providers. It’s like watching a villain’s origin story unfold in real-time. Terrifying.

This development aligns with broader North Korean cyber activities. Similar groups like Diamond Sleet and Onyx Sleet have used ransomware for financial gain. Remember WannaCry in 2017? Same playbook, new chapter.

The cybersecurity implications are clear. North Korean cyber threats are growing more sophisticated. Organizations need robust defenses. Patches. Updates. Vigilance against social engineering. Small businesses are particularly vulnerable, with 60% shutting down within six months after experiencing a cyber attack.

State-sponsored cyber attacks aren’t going away. They’re adapting. Advancing. Getting smarter. And Moonstone Sleet’s deployment of Qilin ransomware represents just the latest progression in this dangerous environment. Regular data backups are essential for businesses to maintain continuity if they fall victim to these increasingly sophisticated attacks. The digital shadows keep growing. No one is immune.

You May Also Like

Ebyte Ransomware: Elevating Encryption Threats Against Vulnerable Windows Users

This open-source ransomware weaponizes ChaCha20 encryption against vulnerable Windows users while masquerading as “educational.” Learn how the Ebyte threat forces victims to pay cryptocurrency or lose everything forever.

Albabat Ransomware Targets Multiple Platforms, Exploits GitHub for Dangerous Gains

GitHub’s dark side revealed: How cybercriminals weaponize the platform to deploy Albabat ransomware across Windows, Mac, and Linux systems. Your data may be their next target.

Freshly Unleashed VanHelsing Ransomware Sets Its Sights on Windows and ESXi Systems

New menace VanHelsing ransomware demands $500K, evades detection with “Silent Mode,” and encrypts with ruthless efficiency. Government agencies and corporations are already falling victim. Their $10K/hour toll is just the beginning.

Crazyhunter: the Ransomware Threatening to Obliterate Your Data With Unprecedented Ferocity

CrazyHunter isn’t just another ransomware—it’s an AI-powered obliterator that leaves nothing but ashes where your data once lived. Your best defenses are failing against this predator with a 61% evasion rate. Digital extinction awaits.