North Korean hackers, masquerading as a legitimate trading firm, spent months building trust with Drift Protocol before executing a $285 million heist—proving that in crypto, even face-to-face partnerships can be a front for cybercrime.
#North Korean hackers | #Drift Protocol | #social engineering
North Korean cybercriminals are exploiting fake Microsoft Teams domains and elaborate social engineering to target business professionals with malware. Learn how these attacks work and how to stay protected.
#North Korean hackers | #Microsoft Teams | #social engineering
North Korean threat actors are impersonating Microsoft Teams to trick business professionals into downloading malware. Discover how the elaborate scam operates and what steps you can take to stay safe.
A North Korean cybercrime group is targeting Node.js maintainers with elaborate fake recruiter scams, aiming to compromise open source projects and endanger millions of users through supply chain attacks.
#North Korean Hackers | #Supply Chain Attack | #Social Engineering
North Korean state-backed hackers have adopted new tactics, using GitHub and Windows tools to spy on South Korean companies, evading traditional defenses with sophisticated social engineering and cloud-based data theft.
#North Korean hackers | #Cyber espionage | #GitHub exploitation
North Korean hackers have breached the widely used Axios npm package, injecting advanced malware in a sweeping supply chain attack. This incident exposes the fragility of open-source ecosystems and underscores the rising threat posed by state-sponsored cyber actors.
North Korean hackers orchestrated a $280 million heist on Drift Protocol by seizing its Security Council powers, exposing critical weaknesses in DeFi governance and shaking the crypto industry.
North Korean hackers infiltrated the npm supply chain by compromising Axios, a widely used JavaScript library, with stealthy malware targeting developers and production systems. Microsoft details urgent mitigation steps in response.
A suspected North Korean IT worker was caught using a stolen identity to apply for a U.S. tech job, revealing a hidden laptop farm operation and advanced anonymization tactics. This exposé details how the scam worked and the risks for remote employers.
North Korean hackers breached the trusted Axios npm package, unleashing a sophisticated supply chain attack that silently infected Windows, macOS, and Linux systems worldwide. The incident exposes a deep trust crisis in the open-source ecosystem.