Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Encrypthub targets Web3 developers using fake AI platforms to deploy Fickle Stealer malware

Tesla loses its appeal to Indian loyalists – even if the masks finally deliver

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » North Korean hackers exploit power shell tricks to hijack devices in new cyber attacks
Identity

North Korean hackers exploit power shell tricks to hijack devices in new cyber attacks

userBy userFebruary 12, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 12, 2025Ravi LakshmananIT Security/Cybercrime

A North Korea-related threat actor known as Kimsky is observed using new tactics that involve deceiving targets and running a powershell as administrator, and paste and execute the malicious code they provide. I will instruct you to do so.

“To implement this tactic, the threat actor pretends to be a Korean government official and builds relationships with the target before sending a spear phishing email before building relationships with the target over time. Masu [sic] PDF Attachments,” the Microsoft Threat Intelligence team states in a series of posts shared on X.

To read a document called a PDF document, the victim is persuaded to click on a URL containing a list of instructions to register a Windows system. The registration link will prompt you to launch PowerShell as an administrator and copy/paste the displayed code snippet into the terminal to run and then run it.

Cybersecurity

If the victim follows, the malicious code downloads and installs the browser-based remote desktop tool, along with a certificate file with hard-coded pins from the remote server.

“The code then sends a web request to a remote server and registers the victim device using the downloaded certificate and PIN. This allows the threat actor to access the device and perform data removal. You can,” Microsoft said.

The tech giant has observed the use of this approach in limited attacks since January 2025, describing it as a deviation from normal commerciality for threat actors.

It is worth noting that it is not just the North Korean hacking crew adopting a compromise strategy. In December 2024, threat actors linked to the Infectious Interview Campaign pushed the user into copying and running malicious commands from Apple MacOS systems via the terminal app, accessing the camera and microphone It has been revealed that you are running malicious commands on your Apple MacOS system to address the possible issues. Web browser.

Such attacks have taken off in recent months, along with attacks that accepted the so-called Clickfix method. This is partly due to the fact that it relies on targets to infect your machine and bypasses security protections.

Arizona woman pleaded guilty to running a laptop farm for North Korean IT workers

The US Department of Justice (DOJ) found 48-year-old Arizona woman guilty of roles in a fraudulent IT worker scheme that allowed North Korean threat actors to get remote jobs in over 300 Development arises because they say they have recognized the American businesses pretending to be American citizens and residents.

The activity generated more than $17.1 million in illegal revenues from Christina Marie Chapman and North Korea between October 2020 and October 2023, the department said.

“American citizen Chapman conspired with overseas IT workers from October 2020 to October 2023, stealing the identity of US citizens, and using those identities to apply for remote IT jobs and furthering the scheme. To promote it, we sent false documents to false documents. Homeland Security,” the DOJ said.

“Chapman and her co-conspirators have acquired jobs in hundreds of US companies, including Fortune 500 companies, often through temporary staffing companies and other contracting organizations.”

Cybersecurity

The defendant, arrested in May 2024, runs a laptop farm by hosting multiple laptops at her residence to give the impression that North Korean workers are working from within the country. It is being criticized for. In China and Russia, they are remotely connected to corporate internal systems.

“The implementation of Chapman and her co-conspirators has affected more than 300 US companies, eroding the identities of more than 70 US people, and over 100 misinformation has been transmitted to DHS, and over 70 US people have been individuals had it. DOJ added.

Increased law enforcement scrutiny has led to escalation of IT worker schemes, revealing data stripping and reports of fear tor.

“After being discovered in the company’s network, North Korean IT workers forced the victims by retaining hostages of their own stolen data and code until the company responded to ransom demands.” , the US Federal Bureau of Investigation (FBI) said in its recommendation last month. “In some cases, North Korean IT workers have published their own codes for victim companies.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBYDFI partners with Safeheron to launch Moonx, the ultimate platform for secure memo coin trading
Next Article Fintech Unicorn Zeps to fire 200 employees, according to sources
user
  • Website

Related Posts

Encrypthub targets Web3 developers using fake AI platforms to deploy Fickle Stealer malware

July 20, 2025

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

July 20, 2025

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

July 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Encrypthub targets Web3 developers using fake AI platforms to deploy Fickle Stealer malware

Tesla loses its appeal to Indian loyalists – even if the masks finally deliver

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.