Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Benchmark for Greptile’s Lead Series A lecture, AI Code Reviewer, valued at $100 million, according to sources

Why Y Combinator Startups Working on Windows AI Agents and Get Pivoted

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » North Korea’s Apt Kimsuky uses Forcecopy malware to steal credentials saved in browsers
Identity

North Korea’s Apt Kimsuky uses Forcecopy malware to steal credentials saved in browsers

userBy userFebruary 6, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

LingeringFebruary 6, 2025LingeringRavy LakshmananThreat intelligence /malware

A North Korea-related nation-state hacking group known as Kimsuky has been observed to carry out spear phishing attacks to provide information steeler malware named Forcecopy, according to a new finding from the Anlab Security Intelligence Center (ASEC).になったんです。 English: The first thing you can do is to find the best one to do. It’s there.

The attack is launched with a phishing email containing Windows Shortcuts (LNK) files that spoof Microsoft Office or PDF documents.

Opening this attachment triggers the execution of PowerShell or Mshta.exe. This is a legitimate Microsoft binary designed to run HTML Application (HTA) files that are responsible for downloading and running the next stage payload from external sources.

Cybersecurity

The Korean cybersecurity company said the attacks culminated with the deployment of Pebbell Dash, known as the Trojan horse, and a custom version of an open source remote desktop utility called the RDP Wrapper.

Also provided as part of the attack is proxy malware that allows threat actors to establish persistent communication with external networks via RDP.

Additionally, Kimsuky uses PowerShell-based KeyLogger to record keystrokes and observes using Forcecopy, a new Stealer malware codename used to copy files stored in web browser-related directories. It’s been done.

“All paths where the malware is installed are the installation paths of your web browser,” ASEC said. “It is assumed that threat actors are bypassing restrictions in a particular environment and are trying to steal the configuration file in the web browser where their credentials are stored.”

The use of Tools RDP wrappers and proxying to Commandeer-infected hosts refers to Kimsuky’s tactical changes that have historically exploited the bespoke background for this purpose.

Cybersecurity

The threat actor, also known as APT43, Black Banshee, Emerald Sleet, Sparkling Pisces, Springtail, TA427 and Velvet Chollima, is said to be partnering with North Korea’s leading foreign intelligence service, RGB. It’s worth it.

Active since at least 2012, Kimusky has a track record of tailored social engineering attacks that can bypass email security. In December 2024, cybersecurity company Genman revealed that the hacking crew was sending phishing messages derived from Russian services to carry out theft of their qualifications.

Did you find this article interesting? Follow on Twitter and Linkedin and read the exclusive content to post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTop 3 Ransomware Threats in 2025
Next Article CN Agency Awards 2025: Fourth finalist has been announced
user
  • Website

Related Posts

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

July 18, 2025

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

July 18, 2025

UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign

July 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Benchmark for Greptile’s Lead Series A lecture, AI Code Reviewer, valued at $100 million, according to sources

Why Y Combinator Startups Working on Windows AI Agents and Get Pivoted

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

Cursor snaps up enterprise startup koala with a challenge to github copilot

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.