Summary:

The report analyzes the covert cyber reconnaissance activities of the state-backed APT37 group, which targets South Korean individuals and organizations related to North Korean human rights and security. It highlights the group’s use of malicious shortcut files and the necessity for enhanced endpoint detection and response (EDR) solutions to counteract these threats.…
Read More

“`html

◈ Short Summary Utilizes tax evasion report notifications to impersonate and gain access. Creates confusion by suggesting tax audits and amplifying anxiety regarding funding sources. Attempts internal reconnaissance through LNK-type malicious files. Calls malicious script commands using legitimate AutoIt programs. Employs strategies to evade antivirus detection, making EDR responses possible.…
Read More
◈ Executive Summary Impersonation of North Korean-related questionnaires, manuscripts, security columns, articles, and monthly magazines Malicious files of LNK type hidden inside ZIP compressed files Exploitation of cloud storage such as DropBox and pCloud as attack bases Continued RoKRAT fileless attacks by APT37 group Early detection of LNK and PowerShell stages through Genian EDR 1.…
Read More
◈ Executive Summary Using the delivery method of HWP documents containing malicious OLE through deception and access through foreign news channel interviews Execution of encrypted PowerShell commands using the FlowerPower APT attack tool series Setting up the code hosting platform GitHub for version control and collaboration as a command center for threat commands Effect of minimizing damage through threat visibility and early detection with Genian EDR solution 1.…
Read More