#APT43

2025-05-27

#Kimsuky C2 retailparkderventa[.]com (91[.]234[.]46[.]31) used in active ZIP+LNK+AutoIt campaign. Payloads are fetched via renamed curl.exe with basic header filtering to evade standard tools. The .lnk file contains an XOR-obfuscated decoy .hwp at offset 0x17C2. Short-lived, minimal C2 infrastructure consistent with DPRK TTPs. Targeting NGOs. #APT43 #ThreatIntel

2025-02-13

"APT PROFILE – APT43" published by Cyfirma. #APT43, #DPRK, #CTI cyfirma.com/research/apt-profi

2024-09-28

📬 Cyber-Angriff auf Diehl Defence: Hacker nehmen deutsche Militärtechnik ins Visier
#Cyberangriffe #ITSicherheit #APT43 #CyberAngriff #DiehlDefence #Kimsuky #Nordkorea #Spionagesoftware sc.tarnkappe.info/5e34ea

happygeek :unverified: + :verified: = $0happygeek@infosec.exchange
2024-05-06

By me @Forbes: An excellent reminder to check those DMARC policy settings or risk helping DPRK cyber-spies.

#infosec #FBI #NSA #DMARC #APT43

forbes.com/sites/daveywinder/2

2024-04-24

Proofpoint has been tracking #TA427, a North Korea-aligned threat actor, for years.

Recently, the team observed changes in the group's tactics and targeting, including exploiting #DMARC and web beacons.

Greg Lesnewich shared his insight with The CyberWire Research Saturday podcast host Dave Bittner.

Stream now at thecyberwire.com/podcasts/rese.

#EmeraldSleet #APT43 #THALLIUM #Kimsuky

2024-04-17

Proofpoint’s threat research team has been tracking state-aligned actors for years. In a new report, they detail TA427, a group observed using new tactics, including persona spoofing and the incorporation of web beacons.

Blog: proofpoint.com/us/blog/threat-

Get to know advanced persistent threat (APT) #TA427:

👋 Also goes by #EmeraldSleet, #APT43, #THALLIUM, #Kimsuky

🤝 Likely supports #DPRK intelligence on US and ROK foreign policy

🔥 A savvy #socialengineering expert

💬 Likes the long game: builds rapport with targets over weeks/months

🥸 Uses multiple aliases, usually small/under-resourced think tanks and NGOs

😈 Seen abusing #DMARC, spoofing private email accounts, and typosquatting

Explore the blog, and help spread the word about TA427’s prolific activity so potential targets are prepared to protect their people and defend their data.

2024-04-17

"APT43 배후의 다단계 드롭박스 명령과 TutorialRAT" published by Genians. #APT43, #TutorialRAT, #LNK, #CTI, #OSINT, #LAZARUS genians.co.kr/blog/threat_inte

2023-10-10

"Assessed Cyber Structure and Alignments of North Korea in 2023" published by Mandiant. #Trend, #APT38, #UNC1720, #APT43, #APT37, #UNC4899, #UNC614, #UNC1069, #TEMP.Hermit, #CTI, #OSINT, #LAZARUS mandiant.com/resources/blog/no

2023-09-26

"North Korean and Chinese Cyber Crime Threats to the HPH" published by USHHS. #APT43, #ThreatNeedle, #Slides, #MATA, #CTI, #OSINT, #LAZARUS hhs.gov/sites/default/files/dp

2023-09-25
Andrea Fortuna :verified:andreafortuna@mastodon.uno
2023-03-30

A new report from cybersecurity firm #Mandiant sheds light on a previously unknown threat actor operating on behalf of the North Korean regime and using cybercrime to fund its espionage operations. #apt43 #cybersecurity andreafortuna.org/2023/03/29/a

Just Another Blue TeamerLeeArchinal@ioc.exchange
2023-03-29

Good day everyone! Today's #readoftheday is a full-blown intel report by Mandiant (now part of Google Cloud) and focuses on a North Korean #APT43 and their espionage campaigns! Enjoy and Happy Hunting! (link to the report is at the bottom of the article. No paywall or info wall.)

APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations
mandiant.com/resources/blog/ap

#CyberSecurity #ITSecurity #InfoSec #BlueTeam #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst