Supply Chain Attacks

JumpCloud Supply Chain Attack: North Korea's Lazarus Group Strikes Again

How North Korean threat actors compromised JumpCloud's infrastructure to target cryptocurrency firms through a sophisticated supply chain attack in July 2023.

Yukti Singhal
Security Researcher
5 min read

On June 27, 2023, JumpCloud—a cloud-based IT management platform used by over 180,000 organizations—detected anomalous activity on an internal orchestration system. What followed was a textbook example of a nation-state supply chain attack, ultimately attributed to North Korea's Lazarus Group (also tracked as UNC4899 by Mandiant and Labyrinth Chollima by CrowdStrike).

The Attack Timeline

JumpCloud first noticed something off when an internal system showed signs of compromise. The company's security team acted quickly, rotating credentials and rebuilding infrastructure. But the attackers had already injected malicious code into JumpCloud's commands framework—a feature that allows IT administrators to push scripts and configurations to managed devices.

On July 5, JumpCloud discovered that the attackers had used the compromised commands framework to target a specific, small set of customers. The company force-rotated all admin API keys and began notifying affected customers directly.

By July 12, JumpCloud publicly disclosed the incident, confirming it as a sophisticated nation-state attack. The company stated that fewer than five customers and fewer than ten devices were affected—but the precision of the targeting told a bigger story.

Why JumpCloud?

JumpCloud provides directory-as-a-service, essentially acting as the identity backbone for thousands of organizations. Compromising JumpCloud gave the attackers a path into their real targets without having to attack those targets directly.

This is the supply chain attack playbook that security teams have been warning about since SolarWinds: compromise a trusted vendor, abuse that trust to reach high-value downstream targets.

In this case, the downstream targets were cryptocurrency companies. North Korea's Lazarus Group has been aggressively targeting the crypto industry for years, stealing billions to fund the regime's weapons programs. The UN estimated in 2022 that North Korean cyber operations had stolen between $630 million and over $1 billion in cryptocurrency.

Technical Details

The attack involved several phases:

Initial Access: The attackers compromised a JumpCloud engineer's credentials through a targeted spear-phishing campaign. The phishing email contained a link to a malicious site that deployed malware capable of stealing browser session tokens.

Lateral Movement: Once inside JumpCloud's environment, the attackers moved laterally through the network, eventually reaching the commands framework infrastructure. They maintained persistence using custom malware families that communicated over HTTPS to blend in with normal traffic.

Payload Delivery: The malicious commands pushed to targeted devices installed a lightweight backdoor that beaconed to attacker-controlled infrastructure. The backdoor was designed to exfiltrate cryptocurrency wallet data and private keys.

Operational Security: The attackers used multiple layers of VPN and residential proxy infrastructure to obscure their origin. However, operational security mistakes—including the reuse of IP addresses across campaigns—ultimately helped attribute the attack to the Lazarus Group.

Industry Response

SentinelOne's SentinelLabs and Mandiant both published detailed analyses within weeks of the disclosure. CrowdStrike confirmed the attribution to Labyrinth Chollima and noted similarities with previous Lazarus operations targeting cryptocurrency exchanges.

GitHub also revoked compromised credentials associated with a separate but related campaign where North Korean actors had created fake developer personas to embed malicious code in npm packages. The convergence of these campaigns showed a coordinated, multi-vector approach to supply chain compromise.

Lessons for Security Teams

1. Identity providers are crown jewels. Any vendor that manages authentication or device configuration for your organization is a high-value target. Treat them accordingly in your threat models.

2. Supply chain attacks can be surgically targeted. The JumpCloud attack affected fewer than five customers. This wasn't spray-and-pray—it was precision targeting through a supply chain vector. The small blast radius actually made detection harder.

3. Vendor transparency matters. JumpCloud's decision to publicly disclose, provide IOCs, and work with third-party investigators set a positive example. Organizations should factor vendor incident response maturity into their procurement decisions.

4. API key rotation isn't optional. JumpCloud's force-rotation of all admin API keys was disruptive but necessary. Organizations should have runbooks for responding to vendor-side compromises, including credential rotation procedures.

5. Monitor for anomalous commands and configurations. If you use any platform that pushes configurations or scripts to endpoints, you need to monitor what's being pushed and flag anything unexpected.

The Bigger Picture

The JumpCloud attack is part of a broader trend of nation-state actors targeting software supply chains to reach specific downstream victims. Unlike traditional supply chain attacks that aim for maximum spread (like NotPetya), these surgical attacks are harder to detect because the blast radius is intentionally small.

For cryptocurrency companies, the threat from North Korean actors is existential. But the supply chain vector means that any organization using the same vendors could become collateral damage—or the next target.

How Safeguard.sh Helps

Safeguard.sh provides continuous monitoring of your software supply chain, including the third-party services and tools your organization depends on. Our platform tracks vendor security postures, monitors for indicators of compromise across your dependency graph, and alerts you when upstream providers disclose incidents that could affect your environment. By maintaining a comprehensive Software Bill of Materials (SBOM) that includes not just code dependencies but also service dependencies, Safeguard.sh helps you understand your exposure to supply chain attacks like the JumpCloud compromise—before they reach your infrastructure.

Never miss an update

Weekly insights on software supply chain security, delivered to your inbox.