North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks

Discussion in 'News Aggregator' started by The Hacker News, 13 Feb 2025.

  1. A nation-state threat actor with ties to North Korea has been linked to an ongoing campaign targeting South Korean business, government, and cryptocurrency sectors. The attack campaign, dubbed DEEP#DRIVE by Securonix, has been attributed to a hacking group known as Kimsuky, which is also tracked under the names APT43, Black Banshee, Emerald Sleet, Sparkling Pisces, Springtail, TA427, and Velvet

    Continue reading...
     

Share This Page

Loading...