6 links tagged with all of: cybersecurity + north-korea + malware
Click any tag below to further narrow down your results
Links
North Korean hackers are using spear phishing emails that mimic human rights organizations and financial institutions to distribute malware. This campaign, called "Operation Poseidon," is linked to the Konni hacking group and aims to exploit vulnerabilities in email security through deceptive links. Cybersecurity experts warn that these sophisticated tactics make such attacks difficult to defend against.
North Korean hackers are using Google’s Find Hub to track and factory reset Android devices of South Korean targets. They initiate attacks via spear-phishing on KakaoTalk, leading to data theft and device wipes to prevent recovery and spread malware to victims' contacts.
North Korean hackers are using malicious Microsoft Visual Studio Code projects to deliver a backdoor that allows remote code execution. By tricking victims into cloning Git repositories and opening them in VS Code, the attackers exploit task configuration files to run harmful JavaScript payloads. This ongoing campaign targets software engineers, particularly in cryptocurrency and fintech sectors.
North Korean hackers behind the Contagious Interview campaign have added 197 new malicious packages to the npm registry, totaling over 31,000 downloads. These packages deliver a variant of the OtterCookie malware, which can capture sensitive information and establish remote access to infected machines. The campaign exploits fake job applications to trick users into installing the malware.
North Korean hackers have been identified as the creators of NimDoor, a new malware targeting macOS users through fake Zoom updates. This malware exploits vulnerabilities to gain unauthorized access to systems, highlighting ongoing cybersecurity threats from state-sponsored hacking groups.
A North Korean hacking group, dubbed Elusive Comet, has been caught using Zoom's remote control feature to hijack victims' computers during seemingly legitimate business calls. By employing social engineering tactics, they trick individuals into granting remote access, allowing malware installation and data exfiltration.