Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Google says it will sign the EU AI practice code

Chinese companies linked to Silk Typhoons have filed more than 15 patents for Cyberspy Tool

Look inside Pillar’s AI security platform

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » North Korea’s Apt Kimsuky uses Forcecopy malware to steal credentials saved in browsers
Identity

North Korea’s Apt Kimsuky uses Forcecopy malware to steal credentials saved in browsers

userBy userFebruary 6, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

LingeringFebruary 6, 2025LingeringRavy LakshmananThreat intelligence /malware

A North Korea-related nation-state hacking group known as Kimsuky has been observed to carry out spear phishing attacks to provide information steeler malware named Forcecopy, according to a new finding from the Anlab Security Intelligence Center (ASEC).になったんです。 English: The first thing you can do is to find the best one to do. It’s there.

The attack is launched with a phishing email containing Windows Shortcuts (LNK) files that spoof Microsoft Office or PDF documents.

Opening this attachment triggers the execution of PowerShell or Mshta.exe. This is a legitimate Microsoft binary designed to run HTML Application (HTA) files that are responsible for downloading and running the next stage payload from external sources.

Cybersecurity

The Korean cybersecurity company said the attacks culminated with the deployment of Pebbell Dash, known as the Trojan horse, and a custom version of an open source remote desktop utility called the RDP Wrapper.

Also provided as part of the attack is proxy malware that allows threat actors to establish persistent communication with external networks via RDP.

Additionally, Kimsuky uses PowerShell-based KeyLogger to record keystrokes and observes using Forcecopy, a new Stealer malware codename used to copy files stored in web browser-related directories. It’s been done.

“All paths where the malware is installed are the installation paths of your web browser,” ASEC said. “It is assumed that threat actors are bypassing restrictions in a particular environment and are trying to steal the configuration file in the web browser where their credentials are stored.”

The use of Tools RDP wrappers and proxying to Commandeer-infected hosts refers to Kimsuky’s tactical changes that have historically exploited the bespoke background for this purpose.

Cybersecurity

The threat actor, also known as APT43, Black Banshee, Emerald Sleet, Sparkling Pisces, Springtail, TA427 and Velvet Chollima, is said to be partnering with North Korea’s leading foreign intelligence service, RGB. It’s worth it.

Active since at least 2012, Kimusky has a track record of tailored social engineering attacks that can bypass email security. In December 2024, cybersecurity company Genman revealed that the hacking crew was sending phishing messages derived from Russian services to carry out theft of their qualifications.

Did you find this article interesting? Follow on Twitter and Linkedin and read the exclusive content to post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTop 3 Ransomware Threats in 2025
Next Article CN Agency Awards 2025: Fourth finalist has been announced
user
  • Website

Related Posts

Chinese companies linked to Silk Typhoons have filed more than 15 patents for Cyberspy Tool

July 30, 2025

Look inside Pillar’s AI security platform

July 30, 2025

Apple Patches Safari vulnerability was also exploited as zero day in Google Chrome

July 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Google says it will sign the EU AI practice code

Chinese companies linked to Silk Typhoons have filed more than 15 patents for Cyberspy Tool

Look inside Pillar’s AI security platform

Apple Patches Safari vulnerability was also exploited as zero day in Google Chrome

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.