en.osm.town is one of the many independent Mastodon servers you can use to participate in the fediverse.
An independent, community of OpenStreetMap people on the Fediverse/Mastodon. Funding graciously provided by the OpenStreetMap Foundation.

Server stats:

255
active users

#kimsuky

0 posts0 participants0 posts today

Proofpoint has been tracking #TA427, a North Korea-aligned threat actor, for years.

Recently, the team observed changes in the group's tactics and targeting, including exploiting #DMARC and web beacons.

Greg Lesnewich shared his insight with The CyberWire Research Saturday podcast host Dave Bittner.

Stream now at thecyberwire.com/podcasts/rese.

The CyberWire · The art of information gathering.By The CyberWire Staff

Proofpoint’s threat research team has been tracking state-aligned actors for years. In a new report, they detail TA427, a group observed using new tactics, including persona spoofing and the incorporation of web beacons.

Blog: proofpoint.com/us/blog/threat-

Get to know advanced persistent threat (APT) #TA427:

👋 Also goes by #EmeraldSleet, #APT43, #THALLIUM, #Kimsuky

🤝 Likely supports #DPRK intelligence on US and ROK foreign policy

🔥 A savvy #socialengineering expert

💬 Likes the long game: builds rapport with targets over weeks/months

🥸 Uses multiple aliases, usually small/under-resourced think tanks and NGOs

😈 Seen abusing #DMARC, spoofing private email accounts, and typosquatting

Explore the blog, and help spread the word about TA427’s prolific activity so potential targets are prepared to protect their people and defend their data.

Proofpoint · From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering  | Proofpoint USKey takeaways   TA427 regularly engages in benign conversation starter campaigns to establish contact with targets for long-term exchanges of information on topics of strategic importance to the No...

Securonix describes a cyberespionage campaign by the North Korean state-sponsored APT Kimsuky. The infection chain leverages multiple PowerShell and VBScript stages. A remote access trojan (RAT) allows for full control over the infected hosts, and background scripts provide persistence and monitoring capabilities. C2 communication is handled through legitimate services such as Dropbox or Google Docs, allowing the threat actor to update its features or deploy additional modules. Initial infection vector is likely phishing email attachment (T1566.001). IOC at the bottom. 🔗 securonix.com/blog/securonix-t

SecuronixSecuronix Threat Research Security Advisory: Analysis of New DEEP#GOSU Attack Campaign Likely Associated with North Korean Kimsuky Targeting Victims with Stealthy MalwareThe Securonix Threat Research team has uncovered an elaborate multi-stage attack campaign dubbed DEEP#GOSU likely associated with the North Korean Kimsuky group.

📨 Latest issue of my curated #cybersecurity and #infosec list of resources for week #49/2023 is out! It includes the following and much more:

🔓 🧬 #23andMe updates user agreement to prevent #databreach lawsuits
🔓 🇺🇸 Hackers Exploited #ColdFusion Vulnerability to Breach Federal Agency Servers
🔓 🇺🇸 #Navy contractor Austal USA confirms #cyberattack after #dataleak
🔓 🇯🇵 #Nissan is investigating cyberattack and potential data breach
🔓 🇬🇧 Sellafield nuclear site hacked by groups linked to #Russia and #China
🔓 👾 #Roblox, #Twitch allegedly targeted by #ransomware cartel
🇰🇵 N. Korean #Kimsuky Targeting South Korean Research Institutes with #Backdoor Attacks
🇷🇺 🦠 ITG05 operations leverage #Israel-#Hamas conflict lures to deliver Headlace #malware
🇷🇺 Russian military hackers target #NATO fast reaction corps
🇮🇪 🇮🇱 Cyberattack on Irish Utility Cuts Off Water Supply for Two Days
🇷🇺 🇬🇧 Russia hacking: '#FSB in years-long cyber attacks on UK', says government
🇷🇺 🤖 Russia's AI-Powered Disinformation Operation Targeting #Ukraine, U.S., and #Germany
🇷🇺 📨 #Microsoft Warns of Kremlin-Backed #APT28 Exploiting Critical #Outlook Vulnerability
🚢 💊 Inside Job: How a Hacker Helped Cocaine Traffickers Infiltrate Europe’s Biggest Ports
📱 🕵🏻‍♂️ Governments spying on #Apple, #Google users through push notifications - US senator
🤖 🕵🏻‍♂️ Due to AI, “We are about to enter the era of mass spying,” says Bruce Schneier
🇺🇦 🫡 Ukraine appoints new cyber chief following ouster of top officials
🇳🇴 💰 Norwegian Labor and Welfare Administration fined for data protection failures
🇫🇷 💬 French government recommends against using foreign chat apps
🐛 🛜 "Sierra:21" vulnerabilities impact #criticalinfrastructure routers
🎠 🇹🇭 New Stealthy 'Krasue' #Linux Trojan Targeting #Telecom Firms in Thailand
🦠 🤖 SpyLoan #Android malware on Google Play downloaded 12 million times
🦠 #LogoFAIL: UEFI Vulnerabilities Expose Devices to Stealth Malware Attacks
🔓 💻 Just about every #Windows and #Linux device vulnerable to new LogoFAIL firmware attack
🔐 💬 #Meta Launches Default End-to-End Encryption for Chats and Calls on Messenger
🔐 Addressing post-quantum #cryptography with #CodeQL
🤖 📨 #Gmail’s AI-powered #spam detection is its biggest security upgrade in years
📱 🔓 Your mobile password manager might be exposing your credentials
🐛 #Qualcomm Releases Details on Chip Vulnerabilities Exploited in Targeted Attacks

📚 This week's recommended reading is: "The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws" by Dafydd Stuttard

Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end ⬇️

infosec-mashup.santolaria.net/

X’s Infosec Newsletter · InfoSec MASHUP - Week 49/2023By Xavier «X» Santolaria