The North Korean cyber-threat group “Kimsuky” has caught the attention of the US Cybersecurity and Infrastructure Security Agency (CISA), having proved itself a significant advanced persistent threat (APT). The agency published an advisory describing the group’s tactics, techniques, and procedures (TTPs), which are inflicted on individuals, as well as organizations, and range from spearphishing and social engineering to evasion and data exfiltration. The tactics are not novel, but some of the tools are, cementing Kimsuky’s place under North Korea’s “HIDDEN COBRA” umbrella, as a threat at least equal to the infamous “Lazarus Group”. Unlike the latter, Kimsuky is focused solely on intelligence gathering, and will likely maintain that focus into the long-term future.
Other content in this Stream

Initial access brokers are benefitting from a rise in adoption of remote access software. This Initial Access Brokers Report analyzes this phenomenon and what it means for security practitioners.

Let’s start with a scenario. You’ve finally convinced the business to begin the journey of building up a threat intelligence ...

The People’s Republic of China-linked advanced persistent threat group “APT31” reportedly cloned and deployed a zero-day exploit developed by NSA's Equation Group in 2013.

ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence.

ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence.

An unidentified attacker accessed the computer systems of a water treatment facility in the US, altering sodium hydroxide levels in the potable water supply.

ShadowTalk hosts Alec, Ivan, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence.

Following the disclosure of the SolarWinds supply-chain compromise in December 2020, details continue to emerge about the scale of the attack.

ShadowTalk hosts Stefano, Adam, and Kim bring you the latest in threat intelligence.

The North Korean advanced persistent threat (APT) group “ZINC” has been targeting cyber-security professionals with social engineering that leads to malware delivery.

ShadowTalk hosts Alec, Charles, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence.

A new web portal is aiding cyber-threat incident responders by detailing vulnerabilities in popular malware.

ShadowTalk hosts Stefano, Adam, Kim, and Dylan bring you the latest in threat intelligence.

Technical analysis of a cyber-threat campaign using the dangerous and widespread “Lokibot” malware has revealed an updated method being used to conduct sophisticated attacks.

ShadowTalk hosts Alec, Charles, Austin, and Ivan bring you the latest in threat intelligence.

A cyber-security firm released a free decryptor for the popular and sophisticated “DarkSide” ransomware.

ShadowTalk hosts Stefano, Kim, Adam, and Dylan bring you the latest in threat intelligence.

The cyber-security industry learned some valuable lessons during the unique and unprecedented year of 2020.

The notorious Automated Vending Cart (AVC) website Joker’s Stash allegedly displayed a notification that the site was seized by law-enforcement agencies.

ShadowTalk hosts Kacey, Charles, Alec, and Digital Shadows CISO Rick bring you the latest in threat intelligence.