Click any tag below to further narrow down your results
Links
Security researchers uncovered a North Korean operation that lures engineers into renting their identities for fraudulent activities. The group uses tactics like deep fakes and deception to secure jobs at major companies while the compromised engineers take on the risks. The operation exploits both legitimate and fake identities to carry out espionage and revenue generation.
North Korean hackers are using spear phishing emails that mimic human rights organizations and financial institutions to distribute malware. This campaign, called "Operation Poseidon," is linked to the Konni hacking group and aims to exploit vulnerabilities in email security through deceptive links. Cybersecurity experts warn that these sophisticated tactics make such attacks difficult to defend against.
Five individuals, including four Americans and one Ukrainian, admitted to facilitating North Korea's revenue schemes by using stolen identities to help DPRK agents secure remote jobs with U.S. companies. Their actions impacted 136 firms and generated over $2.2 million for the North Korean regime. The DOJ is also pursuing the seizure of $15 million in cryptocurrency linked to these cyber crimes.
North Korean hackers are using Google’s Find Hub to track and factory reset Android devices of South Korean targets. They initiate attacks via spear-phishing on KakaoTalk, leading to data theft and device wipes to prevent recovery and spread malware to victims' contacts.
North Korean hackers are using malicious Microsoft Visual Studio Code projects to deliver a backdoor that allows remote code execution. By tricking victims into cloning Git repositories and opening them in VS Code, the attackers exploit task configuration files to run harmful JavaScript payloads. This ongoing campaign targets software engineers, particularly in cryptocurrency and fintech sectors.
North Korean hackers behind the Contagious Interview campaign have added 197 new malicious packages to the npm registry, totaling over 31,000 downloads. These packages deliver a variant of the OtterCookie malware, which can capture sensitive information and establish remote access to infected machines. The campaign exploits fake job applications to trick users into installing the malware.
North Korean hackers have been identified as the creators of NimDoor, a new malware targeting macOS users through fake Zoom updates. This malware exploits vulnerabilities to gain unauthorized access to systems, highlighting ongoing cybersecurity threats from state-sponsored hacking groups.
A North Korean hacking group, dubbed Elusive Comet, has been caught using Zoom's remote control feature to hijack victims' computers during seemingly legitimate business calls. By employing social engineering tactics, they trick individuals into granting remote access, allowing malware installation and data exfiltration.
BitMEX successfully thwarted a social engineering attack by the Lazarus Group, a North Korean hacking collective, uncovering potential IP addresses and significant security lapses in the process. The attack involved an employee being targeted for malicious code execution, which led to an investigation revealing critical insights into the group's methods and operational weaknesses.
North Korean IT workers are reportedly engaging in AI recruitment scams to exploit global job markets, using sophisticated techniques to lure potential victims. These scams may be part of a broader strategy to generate revenue for the North Korean regime amid international sanctions. Authorities are concerned about the implications of such operations on cybersecurity and financial fraud.
North Korean workers have been infiltrating Fortune 500 companies, posing as legitimate employees to gain access to sensitive information and technology. This infiltration raises concerns about cybersecurity and the potential for espionage against major corporations.