North Korean hackers are targeting developers with deceptive job offers, infecting victims through cloned code repositories. The 'Contagious Interview' campaign leverages social engineering and advanced malware to steal credentials and cryptocurrency.
#North Korean hackers | #Contagious Interview | #malware attack
State-backed North Korean hackers are posing as remote IT workers in Western firms, earning $600M annually, stealing secrets, and evading traditional security checks. Learn how this sophisticated scheme threatens corporate security.
In 2025, North Korean hackers stole a record $2 billion in cryptocurrencies through sophisticated, stealthy attacks. Learn how their evolving tactics changed the rules of cybercrime.
Amazon has revealed a surge in North Korean cyber attacks using fake job applicants and U.S.-based laptop farms. The tech giant blocked over 1,800 hacking attempts, exposing sophisticated infiltration tactics and raising urgent questions about the future of corporate cybersecurity.
Kimsuky, a North Korean hacking group, has launched a new campaign using weaponized QR codes and fake delivery apps to infect Android devices with spyware. Victims are tricked into scanning QR codes from phishing messages, leading to malware installation and full device compromise.
A new North Korean-led cyber campaign exploits the React2Shell bug and uses Ethereum smart contracts to deploy EtherRAT, a remote access trojan engineered for stealth, persistence, and developer-focused attacks.
North Korean hackers have rapidly weaponized the React2Shell vulnerability to deploy EtherRAT, a cutting-edge malware implant leveraging blockchain-based command-and-control. This feature investigates the attack chain, technical innovations, and urgent defensive steps.
A new cyber campaign uses fake tax notices and disguised files to infect Windows users with KimJongRAT malware, harvesting sensitive data and bypassing security measures.
#North Korean Hackers | #KimJongRAT | #Cybersecurity Threats