Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 2 / 3
43 résultats taggé north-korea  ✕
N. Korean hacking group stole massive amount of personal info from S. Korean court computer network https://m-en.yna.co.kr/view/AEN20240511001900320?ref=news.risky.biz
15/05/2024 11:29:45
QRCode
archive.org
thumbnail

A North Korean hacking group had stolen a massive amount of personal information from a South Korean court computer network, probe results showed on Saturday.

A total of 1,014 gigabytes worth of data and documents were leaked from Seoul's court computer network between January 2021 and February 2023 by the hacking group, presumed to be Lazarus, according to the joint probe by the police, the prosecution and the National Intelligence Service.

m-en.yna.co.kr North-Korea stolen Seoul Lazarus Court South-Korea
From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering  | Proofpoint US https://www.proofpoint.com/us/blog/threat-insight/social-engineering-dmarc-abuse-ta427s-art-information-gathering
16/04/2024 14:18:04
QRCode
archive.org
thumbnail

Key takeaways   TA427 regularly engages in benign conversation starter campaigns to establish contact with targets for long-term exchanges of information on topics of strategic importance to the No...

proofpoint EN 2024 DMARC Abuse TA427 analysis North-Korea
North Korea’s Post-Infection Python Payloads – One Night in Norfolk https://norfolkinfosec.com/north-koreas-post-infection-python-payloads/
04/04/2024 13:29:13
QRCode
archive.org

Throughout the past few months, several publications have written about a North Korean threat actor group’s use of NPM packages to deploy malware to developers and other unsuspecting victims. This blog post provides additional details regarding the second and third-stage malware in these attacks, which these publications have only covered in limited detail.

norfolkinfosec EN 2024 NPM packages Phlyum malware North-Korea phyton payloads
A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask https://www.wired.com/story/p4x-north-korea-internet-hacker-identity-reveal/
04/04/2024 13:28:34
QRCode
archive.org
thumbnail

As “P4x,” Alejandro Caceres single-handedly disrupted the internet of an entire country. Then he tried to show the US military how it can—and should—adopt his methods.

wired EN 2024 P4x North-Korea Vigilante military attack
The Updated APT Playbook: Tales from the Kimsuky threat actor group | Rapid7 Blog https://www.rapid7.com/blog/post/2024/03/20/the-updated-apt-playbook-tales-from-the-kimsuky-threat-actor-group/
21/03/2024 08:45:29
QRCode
archive.org
thumbnail

Within Rapid7 Labs we continually track and monitor threat groups. As part of this process, we routinely identify evolving tactics from threat groups in what is an unceasing game of cat and mouse.

Rapid7 EN 2024 APT TTPs Kimsuky Black Banshee Thallium North-Korea
Bundesamt für Verfassungsschutz - Counter-intelligence - Joint Cyber Security Advisory https://www.verfassungsschutz.de/SharedDocs/kurzmeldungen/EN/2024/2024-02-19-joint-cyber-security-advisory.html
28/02/2024 11:51:48
QRCode
archive.org

Warning of North Korean cyber threats targeting the Defense Sector

verfassungsschutz EN 2024 Advisory North North-Korea Counter-intelligence Defense-Sector
N. Korean Hackers 'Mixing' macOS Malware Tactics to Evade Detection https://thehackernews.com/2023/11/n-korean-hackers-mixing-and-matching.html
02/12/2023 13:03:23
QRCode
archive.org
thumbnail

The North Korean threat actors behind macOS malware strains such as RustBucket and KANDYKORN have been observed "mixing and matching" different elements of the two disparate attack chains, leveraging RustBucket droppers to deliver KANDYKORN.

thehackernews EN 2023 North-Korea macOS malware KANDYKORN
DPRK Crypto Theft | macOS RustBucket Droppers Pivot to Deliver KandyKorn Payloads https://www.sentinelone.com/blog/dprk-crypto-theft-macos-rustbucket-droppers-pivot-to-deliver-kandykorn-payloads/
27/11/2023 20:52:43
QRCode
archive.org
thumbnail

Two apparently separate North Korean crypto theft campaigns targeting macOS users appear to be linked as threat actors mix and match droppers and payloads.

sentinelone EN 2023 North-Korea macOS KandyKorn RustBucket DPRK
Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors https://unit42.paloaltonetworks.com/two-campaigns-by-north-korea-bad-actors-target-job-hunters/
22/11/2023 15:44:33
QRCode
archive.org
thumbnail

Two ongoing campaigns bear hallmarks of North Korean state-sponsored threat actors, posing in job-seeking roles to distribute malware or conduct espionage.

unit42 EN 2023 North-Korea Job-Related Campaigns threat-actor job-seeking malware espionage
Active North Korean campaign targeting security researchers https://blog.google/threat-analysis-group/active-north-korean-campaign-targeting-security-researchers/
11/09/2023 23:04:57
QRCode
archive.org
thumbnail

Threat Analysis Group shares findings on a new campaign by North Korean actors targeting security researchers.

Google EN 2023 threat-analysis-group North-Korea security researchers Symbols
North Korea-backed hackers target security researchers with 0-day https://arstechnica.com/security/2023/09/north-korea-backed-hackers-target-security-researchers-with-0-day/
11/09/2023 23:03:12
QRCode
archive.org
thumbnail

Google researchers say currently unfixed vulnerability affects a popular software package.

arstechnica EN 2023 North-Korea security researchers 0-day popular software
How North Korea’s Hacker Army Stole $3 Billion in Crypto, Funding Nuclear Program https://archive.ph/4J5cE
12/06/2023 07:22:54
QRCode
archive.org
thumbnail

Regime has trained cybercriminals to impersonate tech workers or employers, amid other schemes

WSJ EN 2023 North-Korea crypto stolen Funding Nuclear
X_Trader Supply Chain Attack Affects Critical Infrastructure Organizations in U.S. and Europe https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/xtrader-3cx-supply-chain
21/04/2023 23:25:08
QRCode
archive.org
thumbnail

North Korean-linked operation affected more organizations beyond 3CX, including two critical infrastructure organizations in the energy sector.

symantec EN 2023 North North-Korea 3CX X_Trader Supply-Chain-Attack
3CX Breach Was a Double Supply Chain Compromise https://krebsonsecurity.com/2023/04/3cx-breach-was-a-double-supply-chain-compromise/
21/04/2023 08:44:36
QRCode
archive.org

We learned some remarkable new details this week about the recent supply-chain attack on VoIP software provider 3CX, a complex, lengthy intrusion that has the makings of a cyberpunk spy novel: North Korean hackers using legions of fake executive accounts…

krebsonsecurity EN 2023 3CX Double Supply-Chain-Attack North North-Korea
ZINC weaponizing open-source software - Microsoft Security Blog https://www.microsoft.com/en-us/security/blog/2022/09/29/zinc-weaponizing-open-source-software/
28/12/2022 11:39:07
QRCode
archive.org
thumbnail

In recent months, Microsoft has detected a wide range of social engineering campaigns using weaponized legitimate open-source software by an actor we track as ZINC. Microsoft Threat Intelligence Center (MSTIC) observed activity targeting employees in organizations across multiple industries including media, defense and aerospace, and IT services in the US, UK, India, and Russia. Based on the observed tradecraft, infrastructure, tooling, and account affiliations, MSTIC attributes this campaign with high confidence to ZINC, a state-sponsored group based out of North Korea with objectives focused on espionage, data theft, financial gain, and network destruction.

microsoft EN 2022 Microsoft weaponized ZINC open-source MSTIC apt North-Korea
Lazarus hackers abuse Dell driver bug using new FudModule rootkit https://www.bleepingcomputer.com/news/security/lazarus-hackers-abuse-dell-driver-bug-using-new-fudmodule-rootkit/
02/10/2022 12:36:22
QRCode
archive.org
thumbnail

The notorious North Korean hacking group 'Lazarus' was seen installing a Windows rootkit that abuses a Dell hardware driver in a Bring Your Own Vulnerable Driver attack.

bleepingcomputer EN 2022 CVE-2021-21551 BYOVD Dell Driver Lazarus-Group Malware North-Korea Rootkit
MagicRAT: Lazarus’ latest gateway into victim networks https://blog.talosintelligence.com/2022/09/lazarus-magicrat.html
08/09/2022 23:21:24
QRCode
archive.org
thumbnail
  • Cisco Talos has discovered a new remote access trojan (RAT) we're calling "MagicRAT," developed and operated by the Lazarus APT group, which the U.S. government believes is a North Korean state-sponsored actor.
  • Lazarus deployed MagicRAT after the successful exploitation of vulnerabilities in VMWare Horizon platforms.
  • We've also found links between MagicRAT and another RAT known as "TigerRAT," disclosed and attributed to Lazarus by the Korean Internet & Security Agency (KISA) recently.
  • TigerRAT has evolved over the past year to include new functionalities that we illustrate in this blog.
talosintelligence EN 2022 MagicRAT Lazarus Lazarus-Group North-Korea TigerRAT RAT
Kimsuky’s GoldDragon cluster and its C2 operations | Securelist https://securelist.com/kimsukys-golddragon-cluster-and-its-c2-operations/107258/
28/08/2022 16:28:02
QRCode
archive.org
thumbnail

Kimsuky is a prolific and active threat actor primarily targeting Korea-related entities. In early 2022, we observed this group was attacking the media and a think-tank in South Korea.

securelist 2022 EN APT Keyloggers Kimsuky Malware-Descriptions Microsoft-Word Spear-phishing Targeted-attacks North-Korea
Operation In(ter)ception: Aerospace and military companies in the crosshairs of cyberspies | WeLiveSecurity https://www.welivesecurity.com/2020/06/17/operation-interception-aerospace-military-companies-cyberspies/
18/08/2022 08:58:19
QRCode
archive.org
thumbnail

ESET research uncovers attacks against several high-profile aerospace and military companies in Europe and the Middle East, with several hints suggesting a possible link to the Lazarus group.

welivesecurity EN 2022 Lazarus-Group military Europe Lazarus Operation North-Korea
North Korean hackers use signed macOS malware to target IT job seekers https://www.bleepingcomputer.com/news/security/north-korean-hackers-use-signed-macos-malware-to-target-it-job-seekers/
18/08/2022 08:54:14
QRCode
archive.org
thumbnail

North Korean hackers from the Lazarus group have been using a signed malicious executable for macOS to impersonate Coinbase and lure in employees in the financial technology sector.

bleepingcomputer EN 2022 Coinbase CryptoCurrency Lazarus-Group North-Korea macOS malware
page 2 / 3
4514 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio