Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

XCTDH Crypto Heist Part 2 - Ellis Stannard

0
Medium
Published: Wed Oct 29 2025 (10/29/2025, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: type
Product: osint

Description

XCTDH Crypto Heist Part 2 - Ellis Stannard

AI-Powered Analysis

AILast updated: 12/13/2025, 10:19:59 UTC

Technical Analysis

The XCTDH Crypto Heist Part 2 is a sophisticated cyber threat attributed to North Korean actors, characterized by a combination of attack techniques identified in the MITRE ATT&CK framework. The attack leverages external remote services (T1133) to gain initial access or lateral movement within networks. It employs automated exfiltration methods (T1020) to stealthily extract sensitive data, potentially including cryptocurrency assets or credentials. User execution (T1204) indicates the use of social engineering or phishing to trick users into executing malicious payloads. Additionally, the compromise of software dependencies and development tools (T1195.001) suggests a supply chain attack vector where attackers inject malicious code into legitimate software components, thereby achieving persistence and widespread impact. The threat involves persistent payload delivery and network activity designed to maintain long-term access and control. Despite the absence of known exploits in the wild or available patches, the threat's complexity and multi-vector approach pose significant challenges for detection and remediation. The lack of specific affected versions or products implies a broad targeting strategy, focusing on organizations with vulnerable external services or software supply chains. The association with North Korea highlights a potential geopolitical motivation, possibly targeting financial or strategic assets. The threat's medium severity rating may underestimate its potential impact given the combination of techniques and persistence mechanisms involved.

Potential Impact

For European organizations, the XCTDH Crypto Heist Part 2 could result in significant confidentiality breaches through data exfiltration, including theft of sensitive financial information or intellectual property. The compromise of software dependencies threatens the integrity of critical applications, potentially leading to widespread malware distribution and operational disruption. Availability could be affected if attackers deploy ransomware or destructive payloads following initial compromise. Financial institutions, cryptocurrency exchanges, and technology companies are at heightened risk due to their reliance on external services and complex software supply chains. The persistent nature of the threat increases the likelihood of prolonged undetected access, enabling attackers to conduct extensive reconnaissance and data theft. Regulatory and reputational impacts could be severe, especially under stringent European data protection laws such as GDPR. The geopolitical context suggests that organizations involved in sectors of strategic interest to North Korea, including defense, energy, and critical infrastructure, may face targeted attacks. Overall, the threat could undermine trust in software ecosystems and external service providers, necessitating robust security postures.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy focusing on supply chain security by rigorously vetting and monitoring software dependencies and development tools for integrity and authenticity. Employ code signing and integrity verification mechanisms to detect unauthorized modifications. Enhance network segmentation and restrict access to external remote services, applying the principle of least privilege and multi-factor authentication to reduce attack surface. Conduct regular user awareness training emphasizing phishing and social engineering risks to mitigate user execution vectors. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying anomalous behaviors related to automated exfiltration and persistence mechanisms. Implement continuous network monitoring with anomaly detection to identify unusual data flows indicative of exfiltration. Establish incident response plans tailored to supply chain and persistent threats, including rapid isolation and forensic analysis capabilities. Collaborate with software vendors and industry groups to share threat intelligence and coordinate patching efforts once vulnerabilities or exploits are identified. Finally, consider adopting zero trust architecture principles to limit lateral movement and contain potential breaches.

Need more detailed analysis?Get Pro

Technical Details

Uuid
e73730af-7409-4d76-aa96-f174ece74809
Original Timestamp
1761834843

Indicators of Compromise

File

ValueDescriptionCopy
fileC250618A
payload marker

Hash

ValueDescriptionCopy
hashee3cc7c6bd58113f4a654c74052d252bfd0b0a942db7f71975ce698101aec305
hashce47fef68059f569d00dd6a56a61aa9b2986bee1899d3f4d6cc7877b66afc2a6
hasheefe39fe88e75b37babb37c7379d1ec61b187a9677ee5d0c867d13ccb0e31e30
DEV#POPPER.js RAT
hash8c0233a07662934977d1c5c29b930f4acd57a39200162cbd7d2f2a201601e201
OmniStealer Stager
hash7a62286e68d879b45da710e1daa495978dcae31ae8f0709018a7d82343ec57e8
Python OmniStealer
hashc330c5328746c38e1873874263e5349c
hash5340dacf1deb8c2f1a7278622d4c32ef9c05c89f
hasheefe39fe88e75b37babb37c7379d1ec61b187a9677ee5d0c867d13ccb0e31e30

Ip

ValueDescriptionCopy
ip23.27.20.143
C2
ip136.0.9.8
C2
ip23.27.202.27
C2
ip166.88.4.2
C2

Email

ValueDescriptionCopy
emailkarsy117@gmail.com
emaildmgoodner@gmail.com

Tlsh

ValueDescriptionCopy
tlsht18a63094b26dab5ea112f26b332d7667cb51e9cd1b80c9145e805ecbcbe212bdd1d3c18

Ssdeep

ValueDescriptionCopy
ssdeep1536:clLLpB2wmEgljJeBUsVuhfFBAE+MiyVjt3bQtsDrDbuuRB4R/+u:clLDyVe67hNBzRZQe3HuY2

Link

ValueDescriptionCopy
linkhttps://ransom-isac.org/blog/cross-chain-txdatahiding-crypto-heist-part-2/

Text

ValueDescriptionCopy
textDetailed analysis of the DEV#POPPER.js RAT and OmniStealer malware used in the sophisticated cross-chain attack campaign, revealing the complete kill chain from initial compromise through data exfiltration.
textCross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 2)
textBlog

Threat ID: 6903ded8aebfcd54749e6436

Added to database: 10/30/2025, 9:55:36 PM

Last enriched: 12/13/2025, 10:19:59 AM

Last updated: 12/16/2025, 6:38:33 PM

Views: 491

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats