Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

The US Navy is more proactive in telling startups that “we want you”

Alexa Von Tobel has high expectations for “Fintech 3.0”

Google plans to reduce its relationship with scale AI

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » North Korean hackers exploit power shell tricks to hijack devices in new cyber attacks
Identity

North Korean hackers exploit power shell tricks to hijack devices in new cyber attacks

userBy userFebruary 12, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 12, 2025Ravi LakshmananIT Security/Cybercrime

A North Korea-related threat actor known as Kimsky is observed using new tactics that involve deceiving targets and running a powershell as administrator, and paste and execute the malicious code they provide. I will instruct you to do so.

“To implement this tactic, the threat actor pretends to be a Korean government official and builds relationships with the target before sending a spear phishing email before building relationships with the target over time. Masu [sic] PDF Attachments,” the Microsoft Threat Intelligence team states in a series of posts shared on X.

To read a document called a PDF document, the victim is persuaded to click on a URL containing a list of instructions to register a Windows system. The registration link will prompt you to launch PowerShell as an administrator and copy/paste the displayed code snippet into the terminal to run and then run it.

Cybersecurity

If the victim follows, the malicious code downloads and installs the browser-based remote desktop tool, along with a certificate file with hard-coded pins from the remote server.

“The code then sends a web request to a remote server and registers the victim device using the downloaded certificate and PIN. This allows the threat actor to access the device and perform data removal. You can,” Microsoft said.

The tech giant has observed the use of this approach in limited attacks since January 2025, describing it as a deviation from normal commerciality for threat actors.

It is worth noting that it is not just the North Korean hacking crew adopting a compromise strategy. In December 2024, threat actors linked to the Infectious Interview Campaign pushed the user into copying and running malicious commands from Apple MacOS systems via the terminal app, accessing the camera and microphone It has been revealed that you are running malicious commands on your Apple MacOS system to address the possible issues. Web browser.

Such attacks have taken off in recent months, along with attacks that accepted the so-called Clickfix method. This is partly due to the fact that it relies on targets to infect your machine and bypasses security protections.

Arizona woman pleaded guilty to running a laptop farm for North Korean IT workers

The US Department of Justice (DOJ) found 48-year-old Arizona woman guilty of roles in a fraudulent IT worker scheme that allowed North Korean threat actors to get remote jobs in over 300 Development arises because they say they have recognized the American businesses pretending to be American citizens and residents.

The activity generated more than $17.1 million in illegal revenues from Christina Marie Chapman and North Korea between October 2020 and October 2023, the department said.

“American citizen Chapman conspired with overseas IT workers from October 2020 to October 2023, stealing the identity of US citizens, and using those identities to apply for remote IT jobs and furthering the scheme. To promote it, we sent false documents to false documents. Homeland Security,” the DOJ said.

“Chapman and her co-conspirators have acquired jobs in hundreds of US companies, including Fortune 500 companies, often through temporary staffing companies and other contracting organizations.”

Cybersecurity

The defendant, arrested in May 2024, runs a laptop farm by hosting multiple laptops at her residence to give the impression that North Korean workers are working from within the country. It is being criticized for. In China and Russia, they are remotely connected to corporate internal systems.

“The implementation of Chapman and her co-conspirators has affected more than 300 US companies, eroding the identities of more than 70 US people, and over 100 misinformation has been transmitted to DHS, and over 70 US people have been individuals had it. DOJ added.

Increased law enforcement scrutiny has led to escalation of IT worker schemes, revealing data stripping and reports of fear tor.

“After being discovered in the company’s network, North Korean IT workers forced the victims by retaining hostages of their own stolen data and code until the company responded to ransom demands.” , the US Federal Bureau of Investigation (FBI) said in its recommendation last month. “In some cases, North Korean IT workers have published their own codes for victim companies.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBYDFI partners with Safeheron to launch Moonx, the ultimate platform for secure memo coin trading
Next Article Fintech Unicorn Zeps to fire 200 employees, according to sources
user
  • Website

Related Posts

Discord Invite Link Hijacking offers Asyncrat and Skuld Stealer targeted at crypto wallets

June 14, 2025

Over 269,000 websites infected with JSFiretruck JavaScript malware

June 13, 2025

Ransomware gang exploits flaws in less than simple help to target victims with double fear tor

June 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The US Navy is more proactive in telling startups that “we want you”

Alexa Von Tobel has high expectations for “Fintech 3.0”

Google plans to reduce its relationship with scale AI

How to delete 23andMe data

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Ranking 5 casino games from the easiest to the hardest

Top 10 Startup and Tech Funding News for the Week Ending June 13, 2025

Brazilian Melluses raised $32 million to buy Bitcoin, becoming the country’s first “Bitcoin Treasury” Fintech

Archer Airlines raises $850 million after Trump signs executive orders to support air taxis

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.