A highly effective supply-chain attack attributed to the Qilin Ransomware-as-a-Service (RaaS) group has severely impacted the South Korean financial sector. By compromising a single managed service provider (MSP), GJTec, the threat actors gained access to the networks of at least 28 downstream financial firms. Dubbed "Korean Leaks" by the attackers, the campaign resulted in the theft of over 2 terabytes of data from more than one million files. The attack's scale and unusual propaganda-style messaging have led researchers at Bitdefender to suspect the involvement of an affiliate with nation-state ties, possibly the North Korean group Moonstone Sleet, indicating a complex hybrid operation aimed at both financial gain and geopolitical disruption.
The campaign unfolded in three waves between September and October 2025. The attackers' strategy centered on compromising a single, trusted upstream provider, GJTec, to gain a foothold in multiple high-value targets simultaneously. This supply-chain vector (T1199 - Trusted Relationship) proved exceptionally efficient, making South Korea the second-most targeted country for ransomware in September 2025. Qilin claimed 25 victims from the country that month, 24 of which were in the financial sector and linked to this single campaign. The attackers exfiltrated vast amounts of data and used their leak site not just for extortion but also to post messages accusing the firms of corruption and threatening to destabilize the South Korean stock market, a tactic more aligned with state-sponsored hacktivism than typical cybercrime.
This attack is a textbook example of a supply-chain compromise with a geopolitical twist.
T1199 - Trusted Relationship. Attackers compromised the MSP, GJTec, likely through phishing, vulnerability exploitation, or stolen credentials. They then used the MSP's legitimate remote management tools and credentials to access the networks of its 28 financial clients.T1567 - Exfiltration Over Web Service, transferring data to attacker-controlled cloud storage.T1486 - Data Encrypted for Impact) across the victim networks, coupled with the threat of leaking the stolen data.Strictly control and monitor network access from third-party vendors like MSPs, ensuring they can only reach necessary systems.
Mapped D3FEND Techniques:
Apply the principle of least privilege to MSP accounts, using just-in-time access and robust auditing for all privileged actions.
Mapped D3FEND Techniques:
Conduct thorough audits of all third-party activities within the network to quickly identify behavior that deviates from the established baseline.
Mapped D3FEND Techniques:
Incorporate third-party risk management into security programs, including assessing the security posture of critical suppliers like MSPs.
To counter the abuse of trusted MSP connections, organizations should implement strict inbound traffic filtering rules for all third-party access. Instead of allowing broad access from an MSP's entire IP range, define granular firewall rules that permit connections only from specific, authorized source IPs to designated destination hosts and ports. All other traffic from the MSP's network should be denied by default. This approach of 'zero trust' for third-party connections drastically reduces the attack surface, preventing a compromised MSP from having free reign to scan and pivot across a client's entire network. This filtering should be paired with regular rule-set audits to ensure policies align with current service agreements.
Implement User and Entity Behavior Analytics (UEBA) to specifically model the typical behavior of MSP service accounts. Establish a baseline of normal activity, such as which systems are accessed, at what times, and what types of data are transferred. A compromised MSP account, now operated by an attacker, will almost certainly deviate from this pattern. For example, an alert should be triggered if an MSP account that normally only accesses servers begins attempting to access financial databases, HR systems, or executive workstations. This behavioral detection layer is critical for identifying the abuse of legitimate credentials, a hallmark of supply-chain attacks.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats