Summary:
The report analyzes the covert cyber reconnaissance activities of the state-backed APT37 group, which targets South Korean individuals and organizations related to North Korean human rights and security. It highlights the group’s use of malicious shortcut files and the necessity for enhanced endpoint detection and response (EDR) solutions to counteract these threats.…Author: Genians-Korea
The BlueShark APT group has been actively targeting individuals in South Korea during the first half of 2024, utilizing various malware types and spear-phishing tactics disguised as legitimate requests for lectures and interviews.
2. Keypoints Utilization of various types of malware such as LNK, ISO, MSC, and HWP.…“`html
1. Short SummaryThe article discusses the increasing threat activity associated with the Kimsuky group, particularly focusing on the Konni campaign. It highlights the use of legitimate cloud and FTP services in a step-by-step infection chain, with various attack attempts targeting not only South Korea but also Russian government agencies.…
“`html
◈ Short Summary Utilizes tax evasion report notifications to impersonate and gain access. Creates confusion by suggesting tax audits and amplifying anxiety regarding funding sources. Attempts internal reconnaissance through LNK-type malicious files. Calls malicious script commands using legitimate AutoIt programs. Employs strategies to evade antivirus detection, making EDR responses possible.…Full Report: https://www.genians.co.kr/blog/threat_intelligence/facebook…
Full Report: https://www.genians.co.kr/blog/threat_intelligence/dropbox…
● Rising concerns of cyber threats due to increase in Bitcoin price● Beware of targeted attacks on users of virtual asset exchanges● Hacking attempts disguised as actual work content● Malware used by Konni APT group is the same● Immediate detection of abnormal behavior from infiltration through Genian EDR
Full Report: https://www.genians.co.kr/blog/threat_intelligence/bitcoin…
Full Report: https://www.genians.co.kr/blog/threat_intelligence/nation-state…
● Attack impersonating actual field and webinar event scheduled for January 10, 2024 in the field of unification strategy● Malicious file disguised as an event invitation is manipulated with a Google Form link and downloaded from Dropbox● Malicious file of shortcut (LNK) type exists inside the downloaded ZIP compressed file● Attempt to leak information to pCloud using the typical APT37 group’s spear phishing attack style● Early identification and preemptive response to internal threat signs possible through Genian EDR service
Full Report: https://www.genians.co.kr/blog/threat_intelligence/webinar-apt…
● Detection of attacks using various types of malicious files such as LNK, HWP, HWPX, XLSX, DOCX● Extension of attacks based on ‘LNK’ by [APT37] group combined with security vulnerabilities● Extension of attacks using the ‘CVE-2022-41128’ vulnerability disguised as last year’s Itaewon incident response document● Demand for detection of unknown vulnerability attacks and rapid threat identification based on Genian EDR
Full Report: https://www.genians.co.kr/blog/threat_intelligence/market…
Genians Security Center has published a threat analysis report. This report investigates the latest cyber threats and vulnerabilities and provides information for quick response and prevention. (Click the link below to view the full report)
Full Report: https://www.genians.co.kr/blog/threat_intelligence/kimsuky…
Genians Security Center has released a threat analysis report. This report investigates the latest cyber threats and vulnerabilities and provides information for quick response and prevention. (Click the link below for the full report)
Full Report: https://www.genians.co.kr/blog/threat_intelligence/darkhorse…
Genians Security Center has published a threat analysis report. This report investigates the latest cyber threats and vulnerabilities, and provides information for prompt response and prevention. (See link below for full report)
Full Report: https://www.genians.co.kr/blog/threat_intelligence/konniapt…