Netcrook Logo

Tag: Cyber-Espionage

88 article(s)

Excel Deception: North Korean Hackers Infiltrate Drug Firms with Spreadsheet Snares

27 Apr 2026 news 🌍 Asia

North Korean hackers are targeting pharmaceutical firms with malware hidden in fake Excel files, using advanced spear-phishing and PowerShell scripts to steal sensitive data and evade detection.

#North Korea | #Cyber-espionage | #Pharmaceutical industry

GopherWhisper: China-Linked Hackers Exploit Slack and Discord in Government Spy Campaign

25 Apr 2026 news 🌍 Asia

GopherWhisper, a China-linked APT, is using legitimate platforms such as Slack and Discord to carry out stealthy attacks on government networks. Investigators uncovered a sophisticated toolkit designed to blend in with everyday traffic, making detection extremely challenging.

#GopherWhisper | #Cyber-espionage | #APT group

Operation GopherWhisper: Discord and Slack Abused in Espionage Scheme

24 Apr 2026 news 🌍 Asia

A newly discovered Chinese APT group, GopherWhisper, weaponized trusted platforms like Discord, Slack, and Outlook for sophisticated cyber-espionage. ESET's rare inside look reveals how attackers exploited everyday services to steal data and evade detection.

#GopherWhisper | #cyber-espionage | #malware tools

GopherWhisper APT: Hackers Exploit Outlook, Slack, Discord for Stealth Cyber Attacks

23 Apr 2026 news 🌍 Asia

GopherWhisper, a newly discovered Chinese-linked APT, is hijacking Outlook, Slack, and Discord to run stealthy cyber-espionage campaigns against government targets. Learn how their Go-based toolkit hides in plain sight and what defenders need to know.

#GopherWhisper | #Cyber-espionage | #Chinese hackers

GopherWhisper: China-Linked Hackers Breach Mongolian Government with Stealthy Go Malware

23 Apr 2026 news 🌍 Asia

An advanced China-linked hacking group, GopherWhisper, has infected Mongolian government systems with Go-based malware, using popular cloud platforms for stealthy command-and-control and data theft.

#Cyber-espionage | #GopherWhisper | #Go malware

Stealth by Design: How Tropic Trooper Turned Trusted Tools into Espionage Weapons

23 Apr 2026 news 🌍 Asia

Tropic Trooper’s 2026 campaign weaponized trusted tools like SumatraPDF, GitHub, and VS Code tunnels for stealthy espionage in East Asia, making detection a formidable challenge for defenders.

#Cyber-espionage | #Tropic Trooper | #Malware

Trojan in the Code: Tropic Trooper’s Ingenious Hijacking of GitHub and VS Code

23 Apr 2026 news 🌍 Asia

Tropic Trooper’s new espionage campaign uses hijacked PDF readers and developer tools—including GitHub and VS Code tunnels—to infiltrate targets in East Asia while erasing digital traces in real time.

#Cyber-espionage | #Tropic Trooper | #Malware

Cloud Cloak and Dagger: Harvester’s Linux Backdoor Exploits Microsoft Graph in South Asia

22 Apr 2026 news 🌍 Asia

A new Linux backdoor deployed by the Harvester group is targeting South Asian entities, using Microsoft Graph API and Outlook mailboxes as covert command channels to evade detection and steal sensitive data.

#Cyber-espionage | #Linux backdoor | #Microsoft Graph API

Mustang Panda Unleashes LOTUSLITE Malware on Indian Banks and Korean Diplomacy

22 Apr 2026 news 🌍 Asia

A new variant of LOTUSLITE malware, deployed by the China-linked Mustang Panda group, is targeting Indian banks and South Korean policy circles. This investigative feature breaks down the tactics, technical details, and wider implications of the ongoing cyber-espionage campaign.

#Mustang Panda | #LOTUSLITE malware | #cyber-espionage

APT37’s Social Media Espionage: North Korean Hackers Target Defense with Facebook and Trojanized Software

13 Apr 2026 news 🌍 Asia

APT37 is using Facebook and Telegram to lure defense sector targets into downloading trojanized software, enabling covert data theft via cloud services. Their evolving tactics blend social engineering with technical stealth, making detection harder than ever.

#APT37 | #Cyber-espionage | #Social engineering