![]() ![]() ![]() Google released a follow-up report on 5 April which focused on that subset of APT43’s activities Google calls “ARCHIPELAGO.” Google notes that it “observed the group target individuals with expertise in North Korea policy issues such as sanctions, human rights and non-proliferation issues.” Google goes on to expose how ARCHIPELAGO conducts its phishing and various malware operations explaining “ ARCHIPELAGO invests time and effort to build rapport with targets, often corresponding with them by email over several days or weeks before finally sending a malicious link or file.” Google also notes, “For several years, ARCHIPELAGO focused on conducting traditional credential phishing campaigns. Mandiant explains that after five years of tracking the activities of APT43 they can attribute the group to the Democratic People’s Republic of Korea because their “collection priorities align with the mission of the Reconnaissance General Bureau (RGB), North Korea's main foreign intelligence service.” Mandiant also highlights how APT43 acquires and launders stolen cryptocurrency to fund its own espionage operations. This differs from other DPRK cyber threat actors who seem to funnel cryptocurrency to fund the DPRK government as a whole. ![]() It was also shown to have ties to the Democratic People’s Republic of Korea. Make robo-love, not robo-war: nuisance-level hacktivism in the interest of Ukraine.Ī formerly unnamed cybercrime group, APT43, was named and described by Mandiant in a report last week.Russia's turn in the Security Council chair immediately becomes an occasion for disinformation.US provides funds for Costa Rica's cyber defense. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |