Diamond Member ThaHaka 0 Posted February 13, 2025 Diamond Member Share Posted February 13, 2025 This is the hidden content, please Sign In or Sign Up A nation-state threat actor with ties to North Korea has been linked to an ongoing campaign targeting South Korean business, government, and cryptocurrency sectors. The attack campaign, dubbed DEEP#DRIVE by Securonix, has been attributed to a hacking group known as Kimsuky, which is also tracked under the names APT43, ****** Banshee, Emerald Sleet, Sparkling Pisces, Springtail, TA427, and Velvet This is the hidden content, please Sign In or Sign Up 0 Quote Link to comment https://hopzone.eu/forums/topic/216893-h4ckn3wsnorth-korean-apt43-uses-powershell-and-dropbox-in-targeted-south-korea-cyberattacks/ Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.