Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Threat Actors

UNC5537 – Threat Actor

June 14, 2024
Reading Time: 31 mins read
in Threat Actors
UNC5537 – Threat Actor

UNC5537

Other Names

Unknown

Location

Unknown

Date of initial activity

2024

Suspected attribution

Unknown

Government Affiliation

Unknown

Associated Groups

Unknown

Motivation

Financial gain through data theft and extortion

Associated tools

FROSTBITE (Rapeflake), DBeaver Ultimate, VIDAR, RISEPRO, REDLINE, RACOON STEALER, LUMMA and METASTEALER

Active

Yes

Overview

UNC5537 has only recently been formally identified and tracked by Mandiant, thus appearing solely in Mandiant’s taxonomy for the time being. This financially motivated threat actor, unrelated to any nation state, has targeted hundreds of organizations globally. Its members are primarily located in North America, with one confirmed collaborator traced to Turkey, and potential associations with other groups. Operating under various aliases, they coordinate through Telegram channels and cybercrime forums, mainly accessing victim instances using Mullvad or Private Internet Access (PIA) virtual private network (VPN) IP addresses. Stolen data is transmitted through virtual private servers (VPS) provided by Alexhost, based in Moldova, and stored on systems of several other VPS providers, as well as the cloud-storage provider Mega. Mandiant notes that UNC5537’s campaign lacks novelty or sophistication. Its broad impact primarily results from the increasing use of infostealers, coupled with missed opportunities by victims to secure themselves.

Common targets

Multi-industry companies worldwide

Attack Vectors

Compromised credentials

How they operate

Initial access to Snowflake customer instances often occurred via the native web-based UI (Snowflake UI, also known as SnowSight) and the command-line interface (CLI) tool (SnowSQL) running on Windows Server 2022. Mandiant identified additional access methods involving a utility named “rapeflake,” which Mandiant tracks as FROSTBITE. Both .NET and Java versions of FROSTBITE have been observed. The .NET version interacts with the Snowflake .NET driver, while the Java version interacts with the Snowflake JDBC driver. FROSTBITE has been seen performing SQL reconnaissance activities, including listing users, current roles, current IPs, session IDs, and organization names. Mandiant also observed UNC5537 using a publicly available database management utility, DBeaver Ultimate, to connect to and run queries across Snowflake instances. Mandiant observed UNC5537 repeatedly executing similar SQL commands across numerous customer Snowflake instances to stage and exfiltrate data. The following commands were observed for data staging and exfiltration: SHOW TABLES UNC5537 utilized the SHOW TABLES command to perform reconnaissance, listing all databases and associated tables present across the impacted customer environments. SELECT * FROM UNC5537 used the SELECT command to download individual tables of interest to the threat actor. LIST/LS UNC5537 attempted to enumerate other stages using the LIST command before creating temporary stages. CREATE (TEMP|TEMPORARY) STAGE UNC5537 created temporary stages for data staging using the CREATE STAGE command. Stages are named tables that store data files for loading and unloading into database tables. If the stage is identified as temporary upon creation, it is deleted once the creator’s current Snowflake session ends. COPY INTO UNC5537 used the COPY INTO command to copy data into the previously created temporary stages. The COPY INTO command can transfer information to/from internal stages, external stages tied to cloud services, and internal Snowflake tables. The threat actor compressed the results as a GZIP file using the COMPRESSION parameter to reduce the overall size of data before exfiltration. GET Finally, UNC5537 used the GET command to exfiltrate data from the temporary stages to locally specified directories. UNC5537 operates under various aliases on Telegram channels and cybercrime forums. Mandiant has identified members with associations to other tracked groups and assesses with moderate confidence that UNC5537 comprises members based in North America, collaborating with an additional member in Turkey. Attacker Infrastructure UNC5537 primarily used Mullvad or Private Internet Access (PIA) VPN IP addresses to access victim Snowflake instances. When exfiltrating data, Mandiant observed the use of VPS systems from ALEXHOST SRL (AS200019), a Moldovan provider. UNC5537 was also seen storing stolen victim data on several international VPS providers as well as the cloud storage provider MEGA.

Significant Attacks

  • A threat actor, tracked as UNC5537, “has been observed using stolen customer credentials to target organizations utilizing Snowflake databases” to conduct data theft and extortion-related activity. (May 2024)
References:
  • Threat actor compromising Snowflake database customers
  • NC5537 Targets Snowflake Customer Instances for Data Theft and Extortion
Tags: AlexhostIndustryMandiantMegaMoldovaNorth AmericaPrivate Internet AccessSnowflakeThreat ActorsTurkeyUNC5537VPNWorldwide
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

Google Patches Chrome Account Takeover Bug

Horabot Malware Targets LatAm Via Phishing

HTTPBot DDoS Threat To Windows Systems

Microsoft Defender Bug Allows SYSTEM Access

Uncanny Automator Bug Risks WordPress Sites

Devs Hit By PyPI Solana Token Secret Theft

Subscribe to our newsletter

    Latest Incidents

    Dior Breach Exposes Asian Customer Data

    Australian Human Rights Body Files Leaked

    Nucor Cyberattack Halts Plants Networks

    Alabama Cybersecurity Event Hits Services

    Andy Frain Data Breach Impacts 100k People

    Hong Kong DSC Hit By Ransomware Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial