Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Matrix Botnet

Citrine Sleet – Threat Actor

February 16, 2025
Reading Time: 4 mins read
in Threat Actors
Citrine Sleet – Threat Actor

Citrine Sleet

Other Names

AppleJeus
Labyrinth Chollima
UNC4736
Hidden Cobra

Location

North Korea

Date of initial activity

2023

Suspected Attribution 

State Sponsored Actors

Government Affiliation

Bureau 121 of North Korea’s Reconnaissance General Bureau

Motivation

Financial Gain
Data Theft

Software

Windows

Overview

Citrine Sleet is a North Korean state-sponsored cyber threat actor that has gained notoriety for its targeted attacks on the cryptocurrency sector. Operating under the broader umbrella of North Korea’s cyber operations, Citrine Sleet primarily focuses on financial gains through sophisticated and well-orchestrated cyberattacks. The group is closely tied to North Korea’s Bureau 121, the state’s elite cyber warfare division, which is responsible for conducting high-profile cyber espionage and financial theft campaigns worldwide. Citrine Sleet’s operations, particularly their exploitation of vulnerabilities and deployment of custom malware, demonstrate a sophisticated and relentless pursuit of economic objectives aligned with the North Korean regime’s broader goals. Since its emergence, Citrine Sleet has employed various tactics, techniques, and procedures (TTPs) to infiltrate financial institutions, specifically those dealing with cryptocurrency. By exploiting zero-day vulnerabilities, social engineering schemes, and custom-built malware, the group has successfully targeted individuals and organizations within the cryptocurrency and financial technology sectors. One of the hallmark tools of Citrine Sleet is the AppleJeus trojan, a malicious software designed to steal sensitive data, including cryptocurrency wallet information. This malware enables the threat actor to gain control over victim systems, providing them with the ability to exfiltrate assets and engage in financial fraud.

Common targets

Finance and Insurance

Australia

Attack Vectors

Phishing

Software Vulnerabilities

How they operate

One of the central elements of Citrine Sleet’s technical operations is the exploitation of zero-day vulnerabilities. In August 2024, for example, the group leveraged the Chromium zero-day vulnerability CVE-2024-7971, a type confusion flaw in the V8 JavaScript engine. This vulnerability allowed them to gain remote code execution (RCE) within the Chromium browser’s sandboxed renderer process. By exploiting this flaw, Citrine Sleet bypassed browser-level security restrictions, enabling them to execute malicious code within the compromised system. This capability demonstrates the group’s technical expertise in identifying and exploiting vulnerabilities in widely used software, which is crucial for evading detection and achieving long-term persistence in their targets’ systems. Once Citrine Sleet gained access to a target system through the Chromium exploit, the next phase of their attack involved deploying shellcode containing a Windows sandbox escape exploit. The group used CVE-2024-38106, a vulnerability in the Windows kernel, to break out of the sandbox and execute further malicious payloads. This stage allowed them to install their custom FudModule rootkit, which is designed to maintain persistence and avoid detection by traditional security mechanisms. The FudModule rootkit operates by hiding its presence on infected systems, ensuring that even if the malware is detected, it is difficult to fully remove without complete system reinstalls. Citrine Sleet’s malware payloads are also tailored to target specific sectors, with cryptocurrency being the primary focus. Their custom malware, notably the AppleJeus trojan, is specifically crafted to steal sensitive information from cryptocurrency wallets and trading applications. Once installed, AppleJeus collects critical data, such as private keys, wallet information, and transaction histories, allowing the threat actor to seize control of the victim’s digital assets. The trojan typically masquerades as a legitimate cryptocurrency trading application, making it harder for victims to recognize the threat. By luring individuals and organizations into downloading these weaponized applications through social engineering tactics, Citrine Sleet successfully compromises high-value targets. In addition to exploiting vulnerabilities and deploying malware, Citrine Sleet is also known for its use of fake websites and phishing campaigns. The group often sets up fraudulent cryptocurrency exchange sites or fake job offers to attract potential victims. These social engineering tactics are paired with malicious links or attachments that, once opened, deploy the malware. This combination of technical exploits and social engineering is highly effective in infiltrating organizations and stealing valuable assets. Citrine Sleet’s ability to blend technical sophistication with social manipulation makes it a formidable adversary, particularly within the high-stakes cryptocurrency environment. To ensure the success of their operations, Citrine Sleet also uses sophisticated infrastructure, including command and control (C2) servers, which are used to maintain communication with compromised systems and exfiltrate stolen data. The group is known to use a combination of legitimate and obfuscated domains to avoid detection by network security solutions. The use of C2 servers allows them to control infected devices remotely, enabling further exploitation and data theft. This technical control over compromised systems gives Citrine Sleet a significant advantage in terms of persistence and operational flexibility. The group’s operations are marked by a high level of adaptability. Citrine Sleet consistently updates its malware and exploitation techniques to bypass evolving cybersecurity defenses. For instance, after the identification of CVE-2024-7971, the group swiftly adapted its exploitation methods, demonstrating a dynamic and proactive approach to cyberattacks. This continuous evolution ensures that Citrine Sleet remains a persistent and evolving threat, particularly within the cryptocurrency sector, which continues to attract attention due to its high value and relative lack of regulatory oversight compared to traditional financial systems. In conclusion, Citrine Sleet operates with a high degree of technical proficiency, leveraging zero-day vulnerabilities, custom malware, rootkits, and social engineering tactics to infiltrate targeted systems. Their ability to adapt and innovate in response to evolving security measures makes them a significant threat to cryptocurrency exchanges, financial institutions, and individuals within the industry. As cryptocurrency becomes an increasingly attractive target for state-sponsored actors like Citrine Sleet, organizations must remain vigilant and implement robust security measures to defend against such sophisticated cyber threats.  
References:
  • North Korean threat actor Citrine Sleet exploiting Chromium zero-day
Tags: AppleJeusAustraliaChromiumCitrine SleetCryptocurrenciesHidden CobraJavascriptLabyrinth ChollimaNorth KoreaPhishingState-sponsored actorsThreat ActorsUNC4736Vulnerabilities
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

Google Patches Chrome Account Takeover Bug

Horabot Malware Targets LatAm Via Phishing

HTTPBot DDoS Threat To Windows Systems

Microsoft Defender Bug Allows SYSTEM Access

Uncanny Automator Bug Risks WordPress Sites

Devs Hit By PyPI Solana Token Secret Theft

Subscribe to our newsletter

    Latest Incidents

    Dior Breach Exposes Asian Customer Data

    Australian Human Rights Body Files Leaked

    Nucor Cyberattack Halts Plants Networks

    Alabama Cybersecurity Event Hits Services

    Andy Frain Data Breach Impacts 100k People

    Hong Kong DSC Hit By Ransomware Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial