lazarusholic

a big fan of lazarus. You can find me on t.me/lazarusholic , lazarus.day.

2025-06-19

"Github를 공격 인프라로 악용하는 Kimsuky의 최신 국내 공격 사례 분석" published by ENKI. #Kimsuky, #XenoRAT, #DPRK, #CTI enki.co.kr/media-center/blog/d

2025-06-19

"Dissecting Kimsuky's Attacks on South Korea: In-Depth Analysis of GitHub-Based Malicious Infrastructure" published by ENKI. #Kimsuky, #XenoRAT, #DPRK, #CTI enki.co.kr/en/media-center/tec

2025-06-19

"LETS BURN SOME North Korean info" published by evstykas. #DPRK, #CTI archive.is/Zi4lf

2025-06-19

"BitoPro Statement & Progress Update" published by BitoPro. #BitoPro, #Lazarus, #DPRK, #CTI bitopro.com/ns/en-US/announcem

2025-06-19

"김수키(Kimsuky)으로 추정이 되는 국민비서 경찰청 고지 안내 피싱 메일(2025.4.9)" published by Sakai. #Kimsuky, #Phishing, #DPRK, #CTI wezard4u.tistory.com/429515

2025-06-18

"DPRK IT Worker-Related Account Takeover" published by Ketman. #ITWorker, #NPM, #DPRK, #CTI ketman.org/dprk-it-worker-rela

2025-06-18

"Inside the BlueNoroff Web3 macOS Intrusion Analysis" published by Huntress. #BlueNoroff, #macOS, #DPRK, #CTI huntress.com/blog/inside-bluen

2025-06-18

"Famous Chollima deploying Python version of GolangGhost RAT" published by CiscoTalos. #ClickFix, #FamousChollima, #PylangGhost, #DPRK, #CTI blog.talosintelligence.com/pyt

2025-06-18

"Kimsuky(APT-Q-2)组织近期 Endoor 恶意软件分析" published by Qianxin. #APT-Q-2, #Endoor, #DPRK, #CTI mp.weixin.qq.com/s?__biz=MzI2M

2025-06-17

"Exploring a New KimJongRAT Stealer Variant and Its PowerShell Implementation" published by PaloaltoNetworks. #KimjongRAT, #LNK, #DPRK, #CTI unit42.paloaltonetworks.com/ki

2025-06-17

"Kimsuky’s CHM and BabyShark Malware Using Cryptocurrency Theme" published by S2W. #BabyShark, #CHM, #Kimsuky, #DPRK, #CTI s2w.inc/en/resource/detail/852

2025-06-17

"Warning Against Distribution of Malware Disguised as Research Papers (Kimsuky Group)" published by Ahnlab. #Kimsuky, #DPRK, #CTI asec.ahnlab.com/en/88465/

2025-06-17

"May 2025 APT Group Trends (South Korea)" published by Ahnlab. #LNK, #DPRK, #CTI asec.ahnlab.com/en/88472/

2025-06-17

"May 2025 APT Group Trends" published by Ahnlab. #Konni, #TA-RedAnt, #DPRK, #CTI asec.ahnlab.com/en/88473/

2025-06-16

"김수키(Kimsuky)만든 허위 권리보호 작성하신 게시물이 게시중단 되어 안내 말씀 드립니다.피싱 메일 분석(2025.4.1)" published by Sakai. #Kimsuky, #Phishing, #DPRK, #CTI wezard4u.tistory.com/429512

2025-06-16

"Malicious crypto-theft package targets Web3 developers in North Korean operation" published by Aikido. #NPM, #DPRK, #CTI aikido.dev/blog/malicious-pack

2025-06-12

"2025년 5월 APT 공격 동향 보고서(국내)" published by Ahnlab. #LNK, #DPRK, #CTI asec.ahnlab.com/ko/88436/

2025-06-12

"논문파일을 위장한 악성코드 유포 주의 (Kimsuky 그룹)" published by Ahnlab. #Kimsuky, #DPRK, #CTI asec.ahnlab.com/ko/88419/

2025-06-09

"Analysis of the Triple Combo Threat of the Kimsuky Group" published by Genians. #AppleSeed, #Kimsuky, #DPRK, #CTI genians.co.kr/en/blog/threat_i

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst