Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » North Korean, apt kimusuk, uses malicious software for theft of accounts supported by browser
Global Security

North Korean, apt kimusuk, uses malicious software for theft of accounts supported by browser

AdminBy AdminFebruary 6, 2025No Comments2 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


06 February 2025Red LakshmananIntelligence threats / malicious software

According to Kimusuki, connected with North Korea nation -known as Kimusuki New conclusions from the AHNLAB security intelligence center (ASEC).

The attacks start with phishing sheets containing the Windows Fast Access File (LNK), which is disguised as Microsoft or PDF -document.

The opening of this attachment is caused by PowerShell or Mshta.exe, a legitimate Microsoft Binary designed to launch HTML applications (HTA) responsible for downloading and launching useful loads from an external source.

Cybersecurity

South Korean cybersecurity company said the attacks were over Mandash and the custom version of the deleted desktop with open source RDP wrap.

Also within the attacks there is a proxy software that allows the threat subject to establish a constant connection with the external network through the RDP.

In addition, Kimsuky was observed using a PowerShell key-based key classes, and a new Forcecopy used to copy files stored in the web browser.

“All ways where malicious software is installed are ways to install the web browser,” ASEC said. “It is assumed that the threat actor is trying to bypass the restrictions in a specific setting and steal the web -browsers configuration files where the credentials are stored.”

The use of RDP -lob and trusted persons for the commanded infected host indicates a tactical shift for Kimusuka, who has historically used the order for this purpose.

Cybersecurity

The actor of the threat, also called APT43, Black Banshee, Emerald Swer, Thring Fire, Springtail, Ta427 and Velvet Chollima, is evaluated as the General Bureau of Intelligence (RGB), North Korean Foreign Intelligence Service.

Active with at least 2012, in Kimusk Track Record Orchestration, taking into account individual engineering attacks that are able to bypass email protection. In December 2024, the genius of cybersecurity company disclosed What the crew of the crew sends phishing reports from Russian services to hold powers.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.