Kimsuky Deploys ToddleShark Malware
The North Korean hacking group Kimsuky has been exploiting vulnerabilities in ScreenConnect to disseminate a new malware variant named ToddleShark.
The North Korean hacking group Kimsuky has been exploiting vulnerabilities in ScreenConnect to disseminate a new malware variant named ToddleShark.
Kimsuky has unleashed a novel Golang-based information stealer dubbed "Troll Stealer," suspected to be part of a targeted data theft campaign.
Kimsuky, a North Korean APT group, utilizes spear-phishing with tools like AppleSeed and Meterpreter for cyber espionage, per AhnLab.
The United States Treasury Department's Office of Foreign Assets Control has recently enforced sanctions against the North Korean-based Kimsuky hacking group.
Security researchers from SentinelLabs have uncovered a social engineering campaign conducted by the North Korea-linked Advanced Persistent Threat.
The North Korean state-sponsored hacker group known as Kimsuky (APT43) has been conducting spear-phishing campaigns by impersonating journalists.
APT43 is a prolific cyber operator that supports the interests of the North Korean regime. The group combines moderately sophisticated technical capabilities
North Korea-linked Advanced Persistent Threat (APT) group, Kimsuky, has been found to be using a new malware tool named ReconShark in its most recent campaign.
© 2025 | CyberMaterial | All rights reserved