Weekly Intelligence Summary 05 February

February 5, 2021

The North Korean advanced persistent threat (APT) group “ZINC” has been targeting cyber-security professionals with social engineering that leads to malware delivery. Although no loss of data has been publicly confirmed, ZINC was probably trying to steal sensitive information about vulnerabilities, exploits, and offensive hacking tools. The targets would certainly possess invaluable, privileged information and tools that, in the wrong hands, could leave craters in the cyber-threat landscape. This example of threat-hunters becoming the hunted shows that almost any individual or organization―even one with a mature cyber-security posture―is fair game when it comes to cyber attacks.

Previous Report
Weekly Intelligence Summary 12 February
Weekly Intelligence Summary 12 February

Following the disclosure of the SolarWinds supply-chain compromise in December 2020, details continue to em...

Next Report
Weekly Intelligence Summary 29 January
Weekly Intelligence Summary 29 January

A new web portal is aiding cyber-threat incident responders by detailing vulnerabilities in popular malware.

Want To Try Our Digital Risk Protection Tool?

Get Started Free