Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

“Bitcoin Family” changed its security after the recent cryptocurrency

AB will be released at Binance -Tech Startups

After data is wiped out, Kiranapro co-founders cannot rule out external hacks

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » North Korea’s Apt Kimsuky uses Forcecopy malware to steal credentials saved in browsers
Identity

North Korea’s Apt Kimsuky uses Forcecopy malware to steal credentials saved in browsers

userBy userFebruary 6, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

LingeringFebruary 6, 2025LingeringRavy LakshmananThreat intelligence /malware

A North Korea-related nation-state hacking group known as Kimsuky has been observed to carry out spear phishing attacks to provide information steeler malware named Forcecopy, according to a new finding from the Anlab Security Intelligence Center (ASEC).になったんです。 English: The first thing you can do is to find the best one to do. It’s there.

The attack is launched with a phishing email containing Windows Shortcuts (LNK) files that spoof Microsoft Office or PDF documents.

Opening this attachment triggers the execution of PowerShell or Mshta.exe. This is a legitimate Microsoft binary designed to run HTML Application (HTA) files that are responsible for downloading and running the next stage payload from external sources.

Cybersecurity

The Korean cybersecurity company said the attacks culminated with the deployment of Pebbell Dash, known as the Trojan horse, and a custom version of an open source remote desktop utility called the RDP Wrapper.

Also provided as part of the attack is proxy malware that allows threat actors to establish persistent communication with external networks via RDP.

Additionally, Kimsuky uses PowerShell-based KeyLogger to record keystrokes and observes using Forcecopy, a new Stealer malware codename used to copy files stored in web browser-related directories. It’s been done.

“All paths where the malware is installed are the installation paths of your web browser,” ASEC said. “It is assumed that threat actors are bypassing restrictions in a particular environment and are trying to steal the configuration file in the web browser where their credentials are stored.”

The use of Tools RDP wrappers and proxying to Commandeer-infected hosts refers to Kimsuky’s tactical changes that have historically exploited the bespoke background for this purpose.

Cybersecurity

The threat actor, also known as APT43, Black Banshee, Emerald Sleet, Sparkling Pisces, Springtail, TA427 and Velvet Chollima, is said to be partnering with North Korea’s leading foreign intelligence service, RGB. It’s worth it.

Active since at least 2012, Kimusky has a track record of tailored social engineering attacks that can bypass email security. In December 2024, cybersecurity company Genman revealed that the hacking crew was sending phishing messages derived from Russian services to carry out theft of their qualifications.

Did you find this article interesting? Follow on Twitter and Linkedin and read the exclusive content to post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTop 3 Ransomware Threats in 2025
Next Article CN Agency Awards 2025: Fourth finalist has been announced
user
  • Website

Related Posts

The new Atomic Macos Stealer campaign targets Apple users by exploiting Clickfix

June 6, 2025

Empower users and protect against Genai data loss

June 6, 2025

Microsoft will help CBI to dismantle the Indian call centre behind Japan’s technical assistance scam

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

“Bitcoin Family” changed its security after the recent cryptocurrency

AB will be released at Binance -Tech Startups

After data is wiped out, Kiranapro co-founders cannot rule out external hacks

Top 10 Startups and Tech Funding News for the Weekly Ends June 6, 2025

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

AB will be released at Binance -Tech Startups

Top 10 Startups and Tech Funding News for the Weekly Ends June 6, 2025

Order openai to keep all chatgpt logs including deleted temporary chats, API requests

Omada Health is now available: Virtual Care Startup joins IPO Wave, paying $150 million, $1.1 billion valuation of NASDAQ debut

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.