Tag: north-korea
-
8 biggest cybersecurity threats manufacturers face
Tags: access, ai, apt, attack, authentication, automation, awareness, business, china, cloud, computer, control, cyber, cyberattack, cybercrime, cybersecurity, data, data-breach, ddos, detection, email, encryption, exploit, extortion, firmware, framework, group, Hardware, india, infrastructure, intelligence, international, Internet, iot, iran, lazarus, leak, malicious, malware, monitoring, network, nis-2, north-korea, open-source, password, phishing, ransom, ransomware, regulation, risk, risk-analysis, risk-assessment, russia, service, software, strategy, supply-chain, technology, threat, update, vulnerability, windowsThe manufacturing sector’s rapid digital transformation, complex supply chains, and reliance on third-party vendors make for a challenging cyber threat environment for CISOs.Manufacturers, often prime targets for state-sponsored malicious actors and ransomware gangs, face the difficult task of maintaining cost-effective operations while modernizing their network infrastructure.”Many manufacturing systems rely on outdated technology that lacks modern…
-
Kimsuky Group Adopts New Phishing Tactics to Target Victims
North Korean Kimsuky group has escalated their phishing campaigns, using Russian domains to steal credentials First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/kimsuky-adopts-new-phishing-tactics/
-
North Korean hackers masquerade as remote IT workers and venture capitalists to steal crypto and secrets
In itslust for stealing cryptocurrency and sensitive information, North Korean hackers are disguising themselves as remote IT workers, recruiters, and even venture capitalists. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/north-korean-hackers-masquerade-as-remote-it-workers-and-venture-capitalists-to-steal-crypto-and-secrets
-
North Korean Kimsuky Hackers Use Russian Email Addresses for Credential Theft Attacks
Tags: attack, credentials, cybersecurity, email, hacker, korea, north-korea, phishing, russia, service, theft, threatThe North Korea-aligned threat actor known as Kimsuky has been linked to a series of phishing attacks that involve sending email messages that originate from Russian sender addresses to ultimately conduct credential theft.”Phishing emails were sent mainly through email services in Japan and Korea until early September,” South Korean cybersecurity company Genians said. “Then, from…
-
Operation >>Code on Toast<<: A Deep Dive into TA-RedAnt's Exploitation of Zero-Day Flaw (CVE-2024-38178)
North Korean-linked hacking group TA-RedAnt has been implicated in a sophisticated large-scale cyber attack dubbed >>Operation Code on Toast,
-
Nordkoreas Elite Wie Kims Cyberarmee zum globalen Sicherheitsproblem wird
Nordkorea ist international isoliert und seine Ressourcen sind begrenzt doch im Cyberbereich gehört das Land zur Weltspitze. Dass selbst westliche Gro… First seen on welt.de Jump to article: www.welt.de/politik/ausland/article251277348/Nordkorea-Wie-Kims-Cyberarmee-den-Westen-bedroht.html
-
Organized North Korean Remote IT Worker Fraud Compels Organizations to Enhance Hiring Verification Controls With Next-Gen CTI
First seen on resecurity.com Jump to article: www.resecurity.com/blog/article/organized-north-korean-remote-it-worker-fraud-compels-organizations-to-enhance-hiring-verification-controls-with-next-gen-cti-2
-
The Lasting Repercussions of the Sony Hack
The Sony Pictures hack in 2014 by the North Korean Lazarus Group was a seminal event both in Hollywood and in the security community, bringing to ligh… First seen on duo.com Jump to article: duo.com/decipher/the-lasting-repercussions-of-the-sony-hack
-
US Appeals Court Reverses Tornado Cash Sanctions
Department of Treasury Overstepped its Authority, Fifth Circuit Rules. A U.S. federal appeals court ruled U.S. Department of Treasury exceeded its authority by sanctioning Tornado Cash, a cryptocurrency mixing service used by North Korean hackers to launder more than $455 million. Smart contracts are not capable of being owned, the court ruled. First seen on…
-
Appeals court tosses sanctions on Tornado cash crypto mixer
The mixer was sanctioned after a North Korea hacking group used the software to launder more than $455 million. First seen on cyberscoop.com Jump to article: cyberscoop.com/tornado-cash-sanctions-overturned-lazarus-group/
-
North Korean and Chinese Threat Actors Target Crypto, Aerospace, and Government Agencies
Tags: china, crypto, cyber, government, intelligence, korea, microsoft, north-korea, tactics, threatAt CYBERWARCON 2024, Microsoft Threat Intelligence unveiled groundbreaking research on two major nation-state cyber actors: North Korea and China. These revelations provide a closer look at their tactics, techniques, and... First seen on securityonline.info Jump to article: securityonline.info/north-korean-and-chinese-threat-actors-target-crypto-aerospace-and-government-agencies/
-
Smashing Security podcast #390: When security firms get hacked, and your new North Korean remote worker
The SolarWinds have returned to haunt four cybersecurity companies who tried to hide their breaches and ended up with their trousers around their ankl… First seen on grahamcluley.com Jump to article: grahamcluley.com/smashing-security-podcast-390/
-
As North Korean troops march toward Ukraine, does a Russian quid pro quo reach space?
The budding partnership between Russia and North Korea may now be blossoming into space. First seen on arstechnica.com Jump to article: arstechnica.com/space/2024/11/in-exchange-for-troops-in-ukraine-russian-aid-to-north-korea-may-extend-to-space/
-
North Korea Deploying Fake IT Workers in China, Russia, Other Countries
The North Korean fake IT workers have infiltrated businesses in China, Russia, and other countries aside from the US. The post North Korea Deploying Fake IT Workers in China, Russia, Other Countries appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/north-korea-deploying-fake-it-workers-in-china-russia-other-countries/
-
North Korea’s Cyber Evolution and China’s Storm-2077 Unveiled by Microsoft Analysts
Tags: attack, china, cyber, cybersecurity, intelligence, korea, microsoft, north-korea, strategy, tactics, threatMicrosoft Threat Intelligence analysts has shared new insights into North Korean and Chinese threat actors. At the recent CYBERWARCON, cybersecurity analyst shared details into the rise of attacks, the evolution of threat actor tactics, and the strategies employed by various state-backed groups. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/microsoft-insights-on-chinese-threat-actor/
-
Fake Identities, Real Profits: Exposing North Korea’s IT Front Companies
SentinelLabs has exposed a sophisticated network of front companies linked to North Korean IT workers. These entities, operating under the guise of legitimate businesses, were recently disrupted by U.S. law... First seen on securityonline.info Jump to article: securityonline.info/fake-identities-real-profits-exposing-north-koreas-it-front-companies/
-
North Korean IT Workers Using Fake Sites to Evade Detection
Researches Find Deep Ties to North Korea Among Fake IT Services Firms Websites. North Korean state actors are using fake websites of foreign technology services firms sidestep sanctions and raise funding for Kim Jong-un regime’s weapons development programs. SentinelLabs found many of these sites shared similar infrastructure, owners and locations. First seen on govinfosecurity.com Jump…
-
US Cyber Force Surges Global Operations Amid Rising Threats
US Cyber Command Says National Mission Force was Deployed Over 85 Times in 2024. A secretive U.S. military unit has surged its support to partner nations across the globe in 2024 while combatting escalating threats from foreign adversaries like China and North Korea, a top official from Cyber Command told the Cyberwarcon summit on Friday.…
-
North Korean IT worker scam linked to Chinese front companies
First seen on scworld.com Jump to article: www.scworld.com/news/north-korean-it-worker-scam-linked-to-chinese-front-companies
-
U.S. Agencies Seize Four North Korean IT Worker Scam Websites
U.S. law enforcement agencies seized the websites of four North Korean fake IT worker scams that were uncovered by SentinelOne threat researchers and linked to a larger network of Chinese front companies. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/11/u-s-agencies-seize-four-north-korean-it-worker-scam-websites/
-
North Korean Hackers Behind 2019 42 Million Ethereum Heist
First seen on packetstormsecurity.com Jump to article: packetstormsecurity.com/news/view/36621/North-Korean-Hackers-Behind-2019-42-Million-Ethereum-Heist.html
-
Active network of North Korean IT front companies exposed
An analysis of the websites belonging to companies that served as a front for getting North Korean IT workers remote jobs with businesses worldwide has revealed an active … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/11/21/north-korean-it-front-companies/
-
North Korean Front Companies Impersonate U.S. IT Firms to Fund Missile Programs
Threat actors with ties to the Democratic People’s Republic of Korea (DPRK) are impersonating U.S.-based software and technology consulting businesses in order to further their financial objectives as part of a broader information technology (IT) worker scheme.”Front companies, often based in China, Russia, Southeast Asia, and Africa, play a key role in masking the workers’…
-
North Korean IT Worker Using Weaponized Video Conference Apps To Attack Job Seakers
North Korean IT workers, operating under the cluster CL-STA-0237, have been implicated in recent phishing attacks leveraging malware-infected video conference apps. The group, likely based in Laos, has demonstrated a sophisticated approach, infiltrating a U.S.-based SMB IT services company to gain access to sensitive information and secure a position at a major tech company. It…
-
North Korean Hackers Target Job Seekers with Malware-Laced Video Apps
A recent report by Unit 42 researchers uncovers a complex phishing campaign linked to a cluster of North Korean IT workers tracked as CL-STA-0237. This group used malware-infected video conference... First seen on securityonline.info Jump to article: securityonline.info/north-korean-hackers-target-job-seekers-with-malware-laced-video-apps/

