Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2024-10-24 13:02:10 |
Les pirates nord-coréens ont exploité Chrome Zero-Day pour le vol de crypto-monnaie North Korean Hackers Exploited Chrome Zero-Day for Cryptocurrency Theft (lien direct) |
> Le Lazarus APT a créé un site Web trompeur qui a exploité un chrome zéro-jour pour installer des logiciels malveillants et voler la crypto-monnaie.
>The Lazarus APT created a deceptive website that exploited a Chrome zero-day to install malware and steal cryptocurrency.
|
Malware
Vulnerability
Threat
|
APT 38
|
★★
|
 |
2024-08-19 15:35:53 |
Attaque de Windows Zero-Day liée à la Corée du Nord Lazarus Apt Windows Zero-Day Attack Linked to North Korea\\'s Lazarus APT (lien direct) |
> La vulnérabilité, suivie en CVE-2024-38193 et marquée comme \\ 'activement exploitée \' par Microsoft, permet des privilèges système sur les derniers systèmes d'exploitation Windows.
>The vulnerability, tracked as CVE-2024-38193 and marked as \'actively exploited\' by Microsoft, allows SYSTEM privileges on the latest Windows operating systems.
|
Vulnerability
Threat
|
APT 38
|
★★
|
 |
2024-02-29 10:28:36 |
Windows Zero-Day exploité par des pirates nord-coréens dans Rootkit Attack Windows Zero-Day Exploited by North Korean Hackers in Rootkit Attack (lien direct) |
> Le groupe nord-coréen Lazarus a exploité le conducteur Applocker Zero-Day CVE-2024-21338 pour l'escalade des privilèges dans les attaques impliquant Fudmodule Rootkit.
>North Korean group Lazarus exploited AppLocker driver zero-day CVE-2024-21338 for privilege escalation in attacks involving FudModule rootkit.
|
Vulnerability
Threat
|
APT 38
|
★★★
|
 |
2022-08-18 12:54:17 |
North Korean Hackers Use Fake Job Offers to Deliver New macOS Malware (lien direct) |
Researchers with cybersecurity company ESET have observed a new macOS malware sample developed by the infamous North Korean advanced persistent threat (APT) actor Lazarus.
|
Malware
Threat
|
APT 38
|
|
 |
2022-01-31 15:41:44 |
North Korean Hackers Abuse Windows Update Client in Attacks on Defense Industry (lien direct) |
The North Korean threat group Lazarus was observed abusing the Windows Update client for the execution of malicious code during a campaign this month, Malwarebytes reports.
|
Threat
|
APT 38
APT 28
|
|
 |
2021-02-26 04:48:42 |
Here\'s How North Korean Hackers Stole Data From Isolated Network Segment (lien direct) |
During an attack on the defense industry, the North Korea-linked threat group known as Lazarus was able to exfiltrate data from a restricted network segment by taking control of a router and setting it up as a proxy server.
|
Threat
|
APT 38
APT 28
|
|
 |
2019-09-09 14:09:05 |
U.S. Cyber Command Adds North Korean Malware Samples to VirusTotal (lien direct) |
The U.S. Cyber Command (USCYBERCOM) this week released 11 malware samples to VirusTotal, all of which appear related to the notorious North Korean-linked threat group Lazarus.
|
Malware
Threat
|
APT 38
|
|
 |
2018-10-03 19:42:00 |
North Korean Attacks on Banks Attributed to \'APT38\' Group (lien direct) |
A report published on Wednesday by FireEye details the activities of a financially motivated threat actor believed to be operating on behalf of the North Korean government.
|
Threat
|
APT 38
|
|
 |
2018-09-07 09:00:01 |
Opsec Mistakes Allowed U.S. to Link North Korean Man to Hacks (lien direct) |
A 34-year-old North Korean national has been charged by U.S. authorities over his alleged involvement in the cyberattacks carried out by the Lazarus Group. An affidavit filed by an FBI special agent reveals how investigators linked the man to the notorious threat actor.
|
Threat
Medical
|
APT 38
|
|
 |
2018-08-09 19:34:03 |
Researchers Say Code Reuse Links North Korea\'s Malware (lien direct) |
Following trails of reused code, security researchers at Intezer and McAfee have uncovered new links between malware families attributed to North Korean threat groups and tracked most of the samples to the infamous |
Malware
Threat
|
APT 38
|
|