Tag: north-korea
-
Breach Roundup: Microsoft Edge Turns Passwords Into Targets
Tags: attack, breach, data, data-breach, ddos, government, ivanti, microsoft, north-korea, password, scamAlso, Taiwan Rail Hack, Massive DDoS Attack and Karakurt Jail Sentence. This week, Microsoft Edge exposed passwords, Taiwan police make arrests in high-speed rail hack and a 2.45 billion-request DDoS attack. A Karakurt negotiator jailed, North Korean IT worker scams led to prison terms and France detained a teen over a government data breach. Another…
-
Cryptohack Roundup: Bitcoin Core Reveals High-Severity Flaw
Also: TrustedVolumes, Wasabi Protocol and Ekubo Hacks. This week, Bitcoin Core revealed a memory safety flaw, hackers exploited TrustedVolumes, Wasabi Protocol and Ekubo, Bithumb suspension paused, sentencing in U.S. theft case, prosecutors seek 20-year sentence for Delio CEO and North Korea denied that it’s a thief. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/cryptohack-roundup-bitcoin-core-reveals-high-severity-flaw-a-31625
-
American duo sentenced for hosting laptop farms for North Korean IT workers
Tags: north-koreaThe men’s separate schemes impacted almost 70 U.S. companies and generated a combined $1.2 million in revenue for the North Korean regime. First seen on cyberscoop.com Jump to article: cyberscoop.com/north-korea-it-worker-scheme-laptop-farm-facilitators-sentenced/
-
Americans sentenced for running ‘laptop farms’ for North Korea
Two U.S. nationals were sentenced to 18 months in prison each for operating so-called laptop farms that helped North Korean IT workers fraudulently obtain remote employment at nearly 70 American companies. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/americans-sentenced-for-running-laptop-farms-for-north-korea/
-
North Korean hackers targeted ethnic Koreans in China with Android ‘BirdCall’ malware
Researchers at cybersecurity firm ESET attributed the campaign to APT37 and said the hackers used a backdoor attached to a suite of card games from a company called Sqgame. First seen on therecord.media Jump to article: therecord.media/north-korean-hackers-target-ethnic-koreans-in-china
-
North Korean APT Targets Yanbian Gamers via Trojanized Platform
ESET warns that North Korean hackers compromised a Yanbian gaming site in a supply”‘chain attack, trojanizing Windows and Android software to spy on users First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/scarcruft-birdcall-android-yanbian/
-
ScarCruft Targets Gaming Platform With Windows, Android Backdoors
A sophisticated multiplatform supply-chain attack orchestrated by the North Korea-aligned APT group ScarCruft, targeting ethnic Koreans in China’s Yanbian region through a compromised gaming platform. The attack, believed to have been ongoing since late 2024, weaponized both Windows and Android components of sqgame[.]net, a video game platform that hosts traditional Yanbian-themed card and board games.…
-
North Koreans Spy on Defectors Via Android Game Apps
Website Popular in Korean Ethnic Enclave in China Hosts Apps Laced With a Backdoor. A North Korean hacking group has been spying on a Korean ethnic enclave in China by infiltrating the Android apps of a regional gaming platform that hosts digital card and board games. Researchers attributed the supply-chain attack to a threat actor…
-
ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows
The North Korea-aligned state-sponsored hacking group known as ScarCruft has compromised a video game platform in a supply chain espionage attack, trojanizing its components with a backdoor called BirdCallto likely target ethnic Koreans residing in China.While prior versions of the backdoor have primarily targeted Windows users only, the supply chain attack is assessed to have…
-
North Korean hackers trojanize gaming platform to spy on ethnic Koreans in China
A gaming platform built for ethnic Koreans in China has been serving backdoored Windows and Android software to its users since late 2024. The platform, sqgame[.]net, hosts … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/05/05/china-scarcruft-supply-chain-attack/
-
ScarCruft hackers push BirdCall Android malware via game platform
The North Korean hacker group APT37 has been delivering an Android version of a backdoor called BirdCall in a supply-chain attack through a video game platform. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/scarcruft-hackers-push-birdcall-android-malware-via-game-platform/
-
The fake IT worker problem CISOs can’t ignore
Tags: access, ai, breach, business, captcha, cio, ciso, compliance, computer, control, credentials, crowdstrike, data, detection, edr, endpoint, fedramp, fraud, gartner, iam, identity, jobs, linkedin, mitigation, monitoring, network, north-korea, office, phone, risk, skills, tool, training, zero-trustWhat to do if you suspect a fake IT worker: When a CIO suspects a fake IT worker, next steps are important as the issue shifts from recruitment to insider risk management.During his time at MongoDB, George Gerchow, IANS faculty advisor and Bedrock Data CSO, oversaw the investigation after the company detected it had unknowingly…
-
76% of All Crypto Stolen in 2026 Is Now in North Korea
North Korean threat actors are pulling off historic cryptocurrency heists on a yearly, sometimes weekly basis now. AI might be helping them. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-analytics/crypto-stolen-2026-north-korea
-
North Korea’s Enormous Crypto Hacks Redefine Scale and Strategy
A pair of tightly executed cyberattacks have become milestones in cryptocurrency theft in 2026 due to their sheer size. These two incidents, targeting Drift Protocol and KelpDAO, account for roughly three quarters of all recorded crypto losses through April, revealing a shift toward fewer, higher-dollar operations. Based on a report from TRM Labs, security researchers..…
-
ISMG Editors: North Korea’s Fake Meetings Fuel Crypto Heists
Also: Google’s $40B AI Bet, Insights From Google Next Conference. In this week’s panel, four ISMG editors discussed North Korea’s use of fake video meetings to fuel crypto fraud, Google’s $40 billion investment in Anthropic and what it signals for the AI race, and key takeaways from Google Next in Las Vegas on enterprise AI…
-
Cryptohack Roundup: North Korea Steals Bulk of Crypto So Far
Also: Cartier Heir Imprisoned, Believe Founder Benjamin Pasternak Arrested. This week, North Korea hacks, Cartier heir jailed, Believe founder arrested, Cambodia scam network sanctioned. A U.S. Army soldier’s insider bet, Litecoin, sentences in laundering and romance fraud cases, France probed crypto kidnapping. Tennessee banned crypto ATMs, Kelp DAO and Alex Mashinsky. First seen on govinfosecurity.com…
-
CISA adds Microsoft, ConnectWise vulnerabilities to active exploitation catalog
Russia has used one of the flaws, security experts said, while North Korea has used the other. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisa-microsoft-connectwise-kev-update/818817/
-
CISA adds Microsoft, ConnectWise vulnerabilities to active exploitation catalog
Russia has used one of the flaws, security experts said, while North Korea has used the other. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisa-microsoft-connectwise-kev-update/818817/
-
CISA adds Microsoft, ConnectWise vulnerabilities to active exploitation catalog
Russia has used one of the flaws, security experts said, while North Korea has used the other. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisa-microsoft-connectwise-kev-update/818817/
-
BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures
The North Korean group is using stolen victim videos, AI-generated avatars, and fake Zoom calls to scale malware attacks against cryptocurrency executives. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/bluenoroff-turns-victims-into-new-attack-lures
-
BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures
The North Korean group is using stolen victim videos, AI-generated avatars, and fake Zoom calls to scale malware attacks against cryptocurrency executives. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/bluenoroff-turns-victims-into-new-attack-lures
-
North Korean Hackers Target Drug Companies in New Cyber Campaign
Pharmaceutical companies sit at the intersection of innovation, intellectual property, and global supply chains. This makes them highly attractive targets for nation-state actors seeking both strategic and financial advantage. New reporting from Cybersecurity News reveals that North Korean threat actors are actively targeting pharmaceutical organizations, aiming to compromise systems and access sensitive research and operational…
-
North Korean Hackers Target Drug Companies in New Cyber Campaign
Pharmaceutical companies sit at the intersection of innovation, intellectual property, and global supply chains. This makes them highly attractive targets for nation-state actors seeking both strategic and financial advantage. New reporting from Cybersecurity News reveals that North Korean threat actors are actively targeting pharmaceutical organizations, aiming to compromise systems and access sensitive research and operational…
-
North Korean Hackers Target Drug Companies in New Cyber Campaign
Pharmaceutical companies sit at the intersection of innovation, intellectual property, and global supply chains. This makes them highly attractive targets for nation-state actors seeking both strategic and financial advantage. New reporting from Cybersecurity News reveals that North Korean threat actors are actively targeting pharmaceutical organizations, aiming to compromise systems and access sensitive research and operational…
-
North Korean Hackers Target Crypto Firms with ClickFix and AI-Made Zoom Lures
Arctic Wolf attributed this large-scale spear-phishing campaign to BlueNoroff, a financially motivated subgroup of the Lazarus Group First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/bluenoroff-dprk-hackers-target/

