Kimsuky’s Shift to CHM Files for Malware
The North Korea-associated threat actor Kimsuky, also known as Black Banshee, Emerald Sleet, or Springtail, has been observed altering its strategies by...
The North Korea-associated threat actor Kimsuky, also known as Black Banshee, Emerald Sleet, or Springtail, has been observed altering its strategies by...
The North Korean hacking group Kimsuky has been exploiting vulnerabilities in ScreenConnect to disseminate a new malware variant named ToddleShark.
Kimsuky has unleashed a novel Golang-based information stealer dubbed "Troll Stealer," suspected to be part of a targeted data theft campaign.
Kimsuky, a North Korean APT group, utilizes spear-phishing with tools like AppleSeed and Meterpreter for cyber espionage, per AhnLab.
The United States Treasury Department's Office of Foreign Assets Control has recently enforced sanctions against the North Korean-based Kimsuky hacking group.
Security researchers from SentinelLabs have uncovered a social engineering campaign conducted by the North Korea-linked Advanced Persistent Threat.
The North Korean state-sponsored hacker group known as Kimsuky (APT43) has been conducting spear-phishing campaigns by impersonating journalists.
APT43 is a prolific cyber operator that supports the interests of the North Korean regime. The group combines moderately sophisticated technical capabilities
North Korea-linked Advanced Persistent Threat (APT) group, Kimsuky, has been found to be using a new malware tool named ReconShark in its most recent campaign.