North Korea
-
North Korean Hackers Target Web3 and Crypto Businesses with Nim-based Malware
North Korean hackers are increasingly targeting Web3 and cryptocurrency sectors with sophisticated Nim-based malware, employing advanced tactics including social engineering and remote process injection techniques to extract sensitive information from compromised systems.
-
U.S. Disrupts North Korean IT Worker Scams Targeting American Firms
The U.S. Department of Justice has successfully disrupted North Korean scams involving fake IT workers who infiltrated over 100 American companies, embezzling significant amounts of money and stealing sensitive data intended for Pyongyang.
-
North Korea-Linked Malicious npm Packages Expose Developers to Security Risks
Cybersecurity researchers have uncovered a new wave of malicious npm packages linked to North Korean threat actors, raising significant concerns for software developers. The covert operation targets job seekers and developers, exposing them to sophisticated supply chain attacks designed to steal sensitive information and compromise systems.
-
North Korean Hackers Target Crypto Job Seekers with Sophisticated Malware Scam
Recent research from Cisco Talos reveals a rise in cyber attacks targeting crypto job seekers, attributed to a North Korea-aligned group known as Famous Chollima, using sophisticated malware disguised as video drivers.
-
North Korean Konni APT Expands Phishing Attacks Targeting Ukraine
Konni APT, a North Korean threat actor, is reportedly conducting a phishing campaign aimed at Ukrainian government entities, signaling a strategic shift in its operations from Russia. The group aims to collect critical intelligence on the ongoing conflict, utilizing sophisticated phishing techniques and malware.
-
North Korean Hackers Expand Malicious Software Distribution via npm
North Korean hackers have expanded their distribution of malicious software through the npm ecosystem, targeting developers with newly identified packages that deploy the BeaverTail malware and a remote access trojan. Security experts warn of the persistent threat posed by this group as they adopt sophisticated methods to evade detection.