The Trellix Advanced Research Center exposed a DPRK-linked espionage operation attributed to the Kimsuky group (APT43), targeting diplomatic missions in South Korea. Between March and July, at least 19 spear-phishing emails impersonated trusted diplomatic contacts, delivering malware via password-protected ZIP archives hosted on Dropbox and Daum. These emails lured embassy staff with credible invitations to […]
The post North Korean Kimsuky Hackers Use GitHub to Target Foreign Embassies with XenoRAT Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.