Researchers have been tracking a targeted social engineering campaign against experts in North Korean affairs from the non-government sector. The campaign focuses on theft of email credentials, delivery of reconnaissance malware, and theft of NK News subscription credentials. Based on the used malware, infrastructure, and tactics, they assess with high confidence that the campaign has been orchestrated by the Kimsuky threat actor.


Click here to read the full article.