north-korean-apt43-uses-powershell-and-dropbox-in-targeted-south-korea-cyberattacks

A state-sponsored malicious entity associated with North Korea has been connected to a persistent initiative aimed at South Korean enterprises, government institutions, and the cryptocurrency industry.
The offensive operation, named DEEP#DRIVE by Securonix, has been ascribed to a cybercrime faction referred to as Kimsuky, which is additionally monitored under the aliases APT43, Black Banshee, Emerald Sleet, Sparkling Pisces, Springtail, TA427, and Velvet.


Leave a Reply

Your email address will not be published. Required fields are marked *

Share This