The North Korean advanced persistent threat (APT) group “ZINC” has been targeting cyber-security professionals with social engineering that leads to malware delivery. Although no loss of data has been publicly confirmed, ZINC was probably trying to steal sensitive information about vulnerabilities, exploits, and offensive hacking tools. The targets would certainly possess invaluable, privileged information and tools that, in the wrong hands, could leave craters in the cyber-threat landscape. This example of threat-hunters becoming the hunted shows that almost any individual or organization―even one with a mature cyber-security posture―is fair game when it comes to cyber attacks.

×
Want these
Threat Intelligence reports sent straight to your inbox?
Subscribe below!
Thank you!
Error - something went wrong!
Most Recent Flipbooks
Weekly Intelligence Summary 21 October
Main story: Ransom Cartel and REvil: Partners in cybercrime?
Weekly Intelligence Summary 14 Oct
Main story: Hacktivists fan flames of Iranian anti-regime protests
Weekly Intelligence Summary 07 Oct
Main story: ProxyNotShell spells déjà vu for MS Exchange Server defenders
Weekly Intelligence Summary 30 Sept
Main story: Rogue ex-developer leaks LockBit 3.0 builder
Weekly Intelligence Summary 23 Sept
Main story: Uber compromised by Lapsus$'s resurgence
Weekly Intelligence Summary 16 Sept
Main story: Cyber attacks shock the Italian energy sector
Weekly Intelligence Summary 09 Sept
Main story: Back to school for students and ransomware groups
Weekly Intelligence Summary 02 Sept
Main story: LastPass suffers source code data breach