JumpCloud Intrusion | Attacker Infrastructure Links Compromise to North Korean APT Activity
North Korean state sponsored APT is behind a new supply chain attack on zero-trust directory platform JumpCloud.
Read More
North Korean state sponsored APT is behind a new supply chain attack on zero-trust directory platform JumpCloud.
Threat actor targets experts in North Korean affairs with spoofed URLs and weaponized Office documents to steal Google and other credentials.
DPRK-linked threat actor deploys previously unseen reconnaissance tool 'ReconShark' in wave of ongoing attacks.
SentinelLabs has been tracking a cluster of malicious documents that stage the Crimson RAT malware distributed by APT36 (Transparent Tribe).
Cyber espionage actor deploys custom credential theft malware in new campaign targeting the telecoms sector.
SentinelLabs uncover a previously unknown set of espionage campaigns conducted by Winter Vivern advanced persistent threat (APT) group.
Discover the anti-analysis techniques of the Mafalda implant, a unique, feature-rich backdoor used by the Metador threat actor.
Precision targeting of critical infrastructure industries indicates espionage-related activity by an unattributed Chinese-speaking threat group.
An elusive adversary is attacking high-value targets with impunity using novel malware frameworks and custom-built backdoors.
Targeting organizations in SE Asia and Australia, Aoqin Dragon uses pornographic-themed lures and custom backdoors to conduct espionage operations.