North Korea–linked hackers have shifted from simple crypto theft to complex, AI-driven scams, insider infiltration, and even building fake projects to siphon funds. Their evolving playbook has netted billions and now poses an unprecedented threat to the global crypto ecosystem.
North Korean hackers are exploiting developer hiring processes with fake interviews and IT worker personas, using advanced malware and AI-driven tradecraft to infiltrate companies, steal code, and generate sanctions-busting revenue.
#North Korean hackers | #Cybercrime syndicate | #Job interviews
North Korean hackers are targeting crypto developers through fake job interviews and infected code, deploying a backdoor and counterfeit MetaMask wallets to steal digital assets in a sophisticated new campaign.
North Korean hackers are using fake job offers and coding challenges to infect developers' computers with malware, aiming to steal cryptocurrency. This investigation reveals how the Lazarus Group orchestrates the scheme and what developers can do to stay safe.
A North Korean cybercrime group is deploying AI-powered deepfakes, fake Zoom meetings, and advanced malware to infiltrate cryptocurrency firms and steal valuable data, marking a new era of digital deception.
A new wave of cyberattacks by UNC1069 blends AI-generated deepfakes with multi-stage malware to infiltrate and loot cryptocurrency firms, marking a dangerous evolution in digital crime.
North Korean threat actors have launched a sophisticated campaign using weaponized Windows shortcut (LNK) files to deliver the stealthy MoonPeak malware, leveraging fake trading guides, anti-analysis techniques, and trusted platforms like GitHub to evade detection and maintain persistence.
#North Korean hackers | #MoonPeak malware | #cyberattack tactics
A new wave of AI-generated malware from North Korea’s Konni group is targeting blockchain engineers in Asia-Pacific, using advanced PowerShell scripting to access crypto infrastructure and wallets.
#North Korean hackers | #AI-generated malware | #blockchain developers
North Korean threat actors are exploiting Windows LNK shortcut files and trusted platforms like GitHub in a sophisticated campaign to deploy MoonPeak malware against South Korean financial targets, demonstrating advanced evasion and persistence techniques.
#North Korean hackers | #financial espionage | #MoonPeak malware
North Korean hackers are abusing the trusted Visual Studio Code tunnel feature to covertly infiltrate South Korean systems. By leveraging legitimate developer tools and living-off-the-land tactics, DPRK operatives bypass traditional security measures—ushering in a new era of stealth cyber-espionage.