Tag: north-korea
-
Nordkoreas Elite Wie Kims Cyberarmee zum globalen Sicherheitsproblem wird
by
in SecurityNewsNordkorea ist international isoliert und seine Ressourcen sind begrenzt doch im Cyberbereich gehört das Land zur Weltspitze. Dass selbst westliche Gro… First seen on welt.de Jump to article: www.welt.de/politik/ausland/article251277348/Nordkorea-Wie-Kims-Cyberarmee-den-Westen-bedroht.html
-
Organized North Korean Remote IT Worker Fraud Compels Organizations to Enhance Hiring Verification Controls With Next-Gen CTI
by
in SecurityNewsFirst seen on resecurity.com Jump to article: www.resecurity.com/blog/article/organized-north-korean-remote-it-worker-fraud-compels-organizations-to-enhance-hiring-verification-controls-with-next-gen-cti-2
-
The Lasting Repercussions of the Sony Hack
by
in SecurityNewsThe Sony Pictures hack in 2014 by the North Korean Lazarus Group was a seminal event both in Hollywood and in the security community, bringing to ligh… First seen on duo.com Jump to article: duo.com/decipher/the-lasting-repercussions-of-the-sony-hack
-
US Appeals Court Reverses Tornado Cash Sanctions
by
in SecurityNewsDepartment of Treasury Overstepped its Authority, Fifth Circuit Rules. A U.S. federal appeals court ruled U.S. Department of Treasury exceeded its authority by sanctioning Tornado Cash, a cryptocurrency mixing service used by North Korean hackers to launder more than $455 million. Smart contracts are not capable of being owned, the court ruled. First seen on…
-
Appeals court tosses sanctions on Tornado cash crypto mixer
by
in SecurityNewsThe mixer was sanctioned after a North Korea hacking group used the software to launder more than $455 million. First seen on cyberscoop.com Jump to article: cyberscoop.com/tornado-cash-sanctions-overturned-lazarus-group/
-
North Korean and Chinese Threat Actors Target Crypto, Aerospace, and Government Agencies
by
in SecurityNews
Tags: china, crypto, cyber, government, intelligence, korea, microsoft, north-korea, tactics, threatAt CYBERWARCON 2024, Microsoft Threat Intelligence unveiled groundbreaking research on two major nation-state cyber actors: North Korea and China. These revelations provide a closer look at their tactics, techniques, and... First seen on securityonline.info Jump to article: securityonline.info/north-korean-and-chinese-threat-actors-target-crypto-aerospace-and-government-agencies/
-
Smashing Security podcast #390: When security firms get hacked, and your new North Korean remote worker
by
in SecurityNewsThe SolarWinds have returned to haunt four cybersecurity companies who tried to hide their breaches and ended up with their trousers around their ankl… First seen on grahamcluley.com Jump to article: grahamcluley.com/smashing-security-podcast-390/
-
As North Korean troops march toward Ukraine, does a Russian quid pro quo reach space?
by
in SecurityNewsThe budding partnership between Russia and North Korea may now be blossoming into space. First seen on arstechnica.com Jump to article: arstechnica.com/space/2024/11/in-exchange-for-troops-in-ukraine-russian-aid-to-north-korea-may-extend-to-space/
-
North Korea Deploying Fake IT Workers in China, Russia, Other Countries
by
in SecurityNewsThe North Korean fake IT workers have infiltrated businesses in China, Russia, and other countries aside from the US. The post North Korea Deploying Fake IT Workers in China, Russia, Other Countries appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/north-korea-deploying-fake-it-workers-in-china-russia-other-countries/
-
North Korea’s Cyber Evolution and China’s Storm-2077 Unveiled by Microsoft Analysts
by
in SecurityNews
Tags: attack, china, cyber, cybersecurity, intelligence, korea, microsoft, north-korea, strategy, tactics, threatMicrosoft Threat Intelligence analysts has shared new insights into North Korean and Chinese threat actors. At the recent CYBERWARCON, cybersecurity analyst shared details into the rise of attacks, the evolution of threat actor tactics, and the strategies employed by various state-backed groups. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/microsoft-insights-on-chinese-threat-actor/
-
Fake Identities, Real Profits: Exposing North Korea’s IT Front Companies
by
in SecurityNewsSentinelLabs has exposed a sophisticated network of front companies linked to North Korean IT workers. These entities, operating under the guise of legitimate businesses, were recently disrupted by U.S. law... First seen on securityonline.info Jump to article: securityonline.info/fake-identities-real-profits-exposing-north-koreas-it-front-companies/
-
North Korean IT Workers Using Fake Sites to Evade Detection
by
in SecurityNewsResearches Find Deep Ties to North Korea Among Fake IT Services Firms Websites. North Korean state actors are using fake websites of foreign technology services firms sidestep sanctions and raise funding for Kim Jong-un regime’s weapons development programs. SentinelLabs found many of these sites shared similar infrastructure, owners and locations. First seen on govinfosecurity.com Jump…
-
US Cyber Force Surges Global Operations Amid Rising Threats
by
in SecurityNewsUS Cyber Command Says National Mission Force was Deployed Over 85 Times in 2024. A secretive U.S. military unit has surged its support to partner nations across the globe in 2024 while combatting escalating threats from foreign adversaries like China and North Korea, a top official from Cyber Command told the Cyberwarcon summit on Friday.…
-
North Korean IT worker scam linked to Chinese front companies
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/north-korean-it-worker-scam-linked-to-chinese-front-companies
-
U.S. Agencies Seize Four North Korean IT Worker Scam Websites
by
in SecurityNewsU.S. law enforcement agencies seized the websites of four North Korean fake IT worker scams that were uncovered by SentinelOne threat researchers and linked to a larger network of Chinese front companies. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/11/u-s-agencies-seize-four-north-korean-it-worker-scam-websites/
-
North Korean Hackers Behind 2019 42 Million Ethereum Heist
by
in SecurityNewsFirst seen on packetstormsecurity.com Jump to article: packetstormsecurity.com/news/view/36621/North-Korean-Hackers-Behind-2019-42-Million-Ethereum-Heist.html
-
Active network of North Korean IT front companies exposed
by
in SecurityNewsAn analysis of the websites belonging to companies that served as a front for getting North Korean IT workers remote jobs with businesses worldwide has revealed an active … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/11/21/north-korean-it-front-companies/
-
North Korean Front Companies Impersonate U.S. IT Firms to Fund Missile Programs
by
in SecurityNewsThreat actors with ties to the Democratic People’s Republic of Korea (DPRK) are impersonating U.S.-based software and technology consulting businesses in order to further their financial objectives as part of a broader information technology (IT) worker scheme.”Front companies, often based in China, Russia, Southeast Asia, and Africa, play a key role in masking the workers’…
-
North Korean IT Worker Using Weaponized Video Conference Apps To Attack Job Seakers
by
in SecurityNewsNorth Korean IT workers, operating under the cluster CL-STA-0237, have been implicated in recent phishing attacks leveraging malware-infected video conference apps. The group, likely based in Laos, has demonstrated a sophisticated approach, infiltrating a U.S.-based SMB IT services company to gain access to sensitive information and secure a position at a major tech company. It…
-
North Korean Hackers Target Job Seekers with Malware-Laced Video Apps
by
in SecurityNewsA recent report by Unit 42 researchers uncovers a complex phishing campaign linked to a cluster of North Korean IT workers tracked as CL-STA-0237. This group used malware-infected video conference... First seen on securityonline.info Jump to article: securityonline.info/north-korean-hackers-target-job-seekers-with-malware-laced-video-apps/
-
North Korean IT Worker Network Tied to BeaverTail Phishing Campaign
by
in SecurityNewsBeaverTail malware has been used to target tech job seekers through fake recruiters, Palo Alto Networks’ Unit 42 has found First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/north-korean-it-worker-beavertail/
-
North Korea’s Lazarus observed testing new macOS trojan in the wild
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/north-koreans-lazarus-observed-testing-new-macos-trojan-in-the-wild
-
Iranian Threat Actors Mimic North Korean Job Scam Techniques
by
in SecurityNewsTehran Baits Aerospace Sector into Downloading Malware With Fake Job Offers. Iranian state hackers are taking a page out of North Korean tactics to entice job seekers into downloading malware, with security researchers spotting a Tehran campaign directed against the aerospace industry. It’s possible that Pyongyang shared its attack methods and tools. First seen on…
-
North Korean’s Lazarus observed testing new macOS trojan in the wild
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/lazarus-observed-testing-new-macos-trojan-in-the-wild
-
Biz hired, and fired, a fake North Korean IT worker then the ransom demands began
by
in SecurityNewsFirst seen on theregister.com Jump to article: www.theregister.com/2024/10/18/ransom_fake_it_worker_scam/
-
New RustyAttr Malware Targets macOS Through Extended Attribute Abuse
by
in SecurityNewsThreat actors have been found leveraging a new technique that abuses extended attributes for macOS files to smuggle a new malware called RustyAttr.The Singaporean cybersecurity company has attributed the novel activity with moderate confidence to the infamous North Korea-linked Lazarus Group, citing infrastructure and tactical overlaps observed in connection with prior campaigns, including First seen…