Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

North Korea Targets Cybersecurity Community

September 8, 2023
Reading Time: 2 mins read
in Alerts

North Korean threat actors have been actively targeting the cybersecurity community using zero-day exploits, according to Google’s Threat Analysis Group (TAG). These attackers are employing social engineering tactics, setting up fake accounts on platforms like Twitter and Mastodon to establish trust with potential victims.

In some cases, they engage in months-long conversations, eventually shifting communication to encrypted messaging apps. These interactions lead to the delivery of a malicious file containing at least one zero-day vulnerability in widely-used software.

Once executed, this payload performs anti-virtual machine checks and transmits collected data and screenshots to a server controlled by the attackers. This campaign reflects a pattern of North Korean actors using collaboration-themed lures to compromise victims.

TAG found evidence that the attacker had an active account since at least October 2022, releasing proof-of-concept exploit code for high-severity privilege escalation flaws in the Windows Kernel. Additionally, the attackers created a Windows tool named “GetSymbol,” hosted on GitHub, which has been forked multiple times.

While it ostensibly helps download debugging symbols for reverse engineering, it can also download and execute arbitrary code from a command-and-control (C2) domain.These revelations coincide with reports of North Korean nation-state actors, including ScarCruft, using LNK file lures in phishing emails to deliver backdoors capable of data harvesting and executing malicious instructions.

Moreover, Microsoft has identified multiple North Korean threat actors targeting the Russian government and defense industry while providing support for Russia in its conflict with Ukraine. This multifaceted approach suggests that North Korea is deploying various threat actor groups simultaneously to meet high-priority intelligence collection goals and enhance its military capabilities, highlighting the nation’s increasingly complex cyber operations.

Reference:
  • Active North Korean campaign targeting security researchers
Tags: Cyber AlertCyber Alerts 2023CybersecurityGoogleNorth KoreaSeptember 2023Social EngineeringVulnerabilitiesZero-day exploitszero-day vulnerability
ADVERTISEMENT

Related Posts

Intellexa Leak Exposes Predator Zero Days

Silver Fox Spreads ValleyRAT In China

December 5, 2025
Intellexa Leak Exposes Predator Zero Days

Intellexa Leak Exposes Predator Zero Days

December 5, 2025
Hackers Exploit ArrayOS AG VPN Flaw

Hackers Exploit ArrayOS AG VPN Flaw

December 5, 2025
WordPress Elementor Addon Flaw Exploited

Record DDoS Linked To Massive Botnet

December 4, 2025
WordPress Elementor Addon Flaw Exploited

RSC Bugs Let Hackers Run Remote Code Now

December 4, 2025
WordPress Elementor Addon Flaw Exploited

WordPress Elementor Addon Flaw Exploited

December 4, 2025

Latest Alerts

Silver Fox Spreads ValleyRAT In China

Intellexa Leak Exposes Predator Zero Days

Hackers Exploit ArrayOS AG VPN Flaw

Record DDoS Linked To Massive Botnet

RSC Bugs Let Hackers Run Remote Code Now

WordPress Elementor Addon Flaw Exploited

Subscribe to our newsletter

    Latest Incidents

    ASUS Confirms Vendor Breach By Everest

    Marquis Breach Hits Over 780,000 People

    Leroy Merlin Reports Data Breach

    Freedom Mobile Customer Data Breach Exposed

    Penn Phoenix Data Breach Oracle Hack Now

    Defender Outage Disrupts Threat Alerting

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial