N. Korean ScarCruft: RokRAT Espionage
Cybersecurity researchers have analyzed the RokRAT remote access trojan used by the North Korean state-sponsored group ScarCruft.
Cybersecurity researchers have analyzed the RokRAT remote access trojan used by the North Korean state-sponsored group ScarCruft.
APT43 is a prolific cyber operator that supports the interests of the North Korean regime. The group combines moderately sophisticated technical capabilities
The Lazarus Group, a state-backed hacking group linked to North Korea, has been identified targeting vulnerable Windows Internet Information Services.
State-Aligned Hackers Targeting SMBs, Financial Services, and Supply Chains State-aligned hackers from Russia, Iran, and North Korea are increasingly.
The BlueNoroff hacker group, associated with North Korea's military, has shifted its tactics by using RustBucket malware to target macOS systems.
North Korea-linked Advanced Persistent Threat (APT) group, Kimsuky, has been found to be using a new malware tool named ReconShark in its most recent campaign.
North Korea-linked ScarCruft APT group, has changed its deployment methods for the ROKRAT RAT malware, according to Check Point researchers.
The US Department of Justice has indicted Huihui Wu and Hung Man Cheng for their role in converting stolen cryptocurrency into hard currency and goods.
VoIP communications company 3CX has confirmed that a North Korean hacking group was responsible for a supply chain attack on its systems last month.
APT38 is a financially-motivated threat group that is backed by the North Korean regime. The group mainly targets banks and financial institutions...
© 2024 | CyberMaterial | All rights reserved