Cases of disguised attacks through analysis documents on North Korean market prices.

◈ Executive Summary

● Detection of attacks using various types of malicious files such as LNK, HWP, HWPX, XLSX, DOCX
● Extension of attacks based on ‘LNK’ by [APT37] group combined with security vulnerabilities
● Extension of attacks using the ‘CVE-2022-41128’ vulnerability disguised as last year’s Itaewon incident response document
● Demand for detection of unknown vulnerability attacks and rapid threat identification based on Genian EDR

Full Report: https://www.genians.co.kr/blog/threat_intelligence/market