×

Register to Access Intelligence Summary

First Name
Last Name
Job Title
Company
Country
State
Thank you!
Error - something went wrong!
   

Weekly Intelligence Summary 10 Apr 2020

In the spotlight this week: After a brief period of inactivity, the North Korean threat group “APT37” has been blamed for yet another cyber-espionage campaign involving spearphishing, this time using lures mentioning North Korean refugees.

The March 2020 campaign used cloud-related platforms to distribute malware, evade detection, and minimize the group’s footprint―a popular tactic of APT37. Because the spearphishing emails contained hyperlinks that led to malicious files, the emails were able to bypass many security tools, as there were no attachments to be analyzed and deemed malicious. This campaign marked APT37’s first appearance since Microsoft seized 50 of the group’s web domains in December 2019. Despite that recent setback, the group clearly remains persistent and committed to gathering foreign intelligence.

Previous Report
How One Global Retailer Detected Almost 2,000 Spoof Domains | Case Study
How One Global Retailer Detected Almost 2,000 Spoof Domains | Case Study

See how one global retailer detected almost 2,000 domains impersonating their brand.

Next Post
To Pay or Not to Pay: A Large Retailer Responds to DDoS Extortion
To Pay or Not to Pay: A Large Retailer Responds to DDoS Extortion

Fans of The Sopranos or Goodfellas are well-versed in the world of extortion. Whether it is paying off Tony...

×

Request a
Live Demo

First Name
Last Name
Company
Phone Number
Country
State
Job Title
Thank You
Error - something went wrong!