One Article Review

Accueil - L'article:
Source The_Hackers_News.webp The Hacker News
Identifiant 8648389
Date de publication 2025-02-13 19:56:00 (vue: 2025-02-13 15:08:12)
Titre North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks
Texte A nation-state threat actor with ties to North Korea has been linked to an ongoing campaign targeting South Korean business, government, and cryptocurrency sectors. The attack campaign, dubbed DEEP#DRIVE by Securonix, has been attributed to a hacking group known as Kimsuky, which is also tracked under the names APT43, Black Banshee, Emerald Sleet, Sparkling Pisces, Springtail, TA427, and Velvet
A nation-state threat actor with ties to North Korea has been linked to an ongoing campaign targeting South Korean business, government, and cryptocurrency sectors. The attack campaign, dubbed DEEP#DRIVE by Securonix, has been attributed to a hacking group known as Kimsuky, which is also tracked under the names APT43, Black Banshee, Emerald Sleet, Sparkling Pisces, Springtail, TA427, and Velvet
Notes ★★★
Envoyé Oui
Condensat actor also apt43 attack attributed banshee been black business campaign cryptocurrency cyberattacks deep#drive dropbox dubbed emerald government group hacking has kimsuky known korea korean linked names nation north ongoing pisces powershell sectors securonix sleet south sparkling springtail state ta427 targeted targeting threat ties tracked under uses velvet which
Tags Threat
Stories APT 43
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: