APT43 – Kimsuky, Thallium – North Korea
APT43 is a prolific cyber operator that supports the interests of the North Korean regime. The group combines moderately sophisticated technical capabilities
APT43 is a prolific cyber operator that supports the interests of the North Korean regime. The group combines moderately sophisticated technical capabilities
The Lazarus Group, a state-backed hacking group linked to North Korea, has been identified targeting vulnerable Windows Internet Information Services.
State-Aligned Hackers Targeting SMBs, Financial Services, and Supply Chains State-aligned hackers from Russia, Iran, and North Korea are increasingly.
The BlueNoroff hacker group, associated with North Korea's military, has shifted its tactics by using RustBucket malware to target macOS systems.
North Korea-linked Advanced Persistent Threat (APT) group, Kimsuky, has been found to be using a new malware tool named ReconShark in its most recent campaign.
North Korea-linked ScarCruft APT group, has changed its deployment methods for the ROKRAT RAT malware, according to Check Point researchers.
The US Department of Justice has indicted Huihui Wu and Hung Man Cheng for their role in converting stolen cryptocurrency into hard currency and goods.
VoIP communications company 3CX has confirmed that a North Korean hacking group was responsible for a supply chain attack on its systems last month.
APT38 is a financially-motivated threat group that is backed by the North Korean regime. The group mainly targets banks and financial institutions...
APT37 is a suspected North Korean cyber espionage group that has been active since at least 2012. The group has targeted victims primarily in South Korea..
© 2024 | CyberMaterial | All rights reserved