#TA427

2025-04-17

"Around the World in 90 Days: State-Sponsored Actors Try ClickFix" published by Proofpoint. #ClickFix, #QuasarRAT, #TA427, #DPRK, #CTI proofpoint.com/us/blog/threat-

2024-04-26

"The art of information gathering." published by Thecyberwire. #DMARC, #TA427, #Podcast, #CTI, #OSINT, #LAZARUS thecyberwire.com/podcasts/rese

2024-04-24

Proofpoint has been tracking #TA427, a North Korea-aligned threat actor, for years.

Recently, the team observed changes in the group's tactics and targeting, including exploiting #DMARC and web beacons.

Greg Lesnewich shared his insight with The CyberWire Research Saturday podcast host Dave Bittner.

Stream now at thecyberwire.com/podcasts/rese.

#EmeraldSleet #APT43 #THALLIUM #Kimsuky

2024-04-17

Proofpoint’s threat research team has been tracking state-aligned actors for years. In a new report, they detail TA427, a group observed using new tactics, including persona spoofing and the incorporation of web beacons.

Blog: proofpoint.com/us/blog/threat-

Get to know advanced persistent threat (APT) #TA427:

👋 Also goes by #EmeraldSleet, #APT43, #THALLIUM, #Kimsuky

🤝 Likely supports #DPRK intelligence on US and ROK foreign policy

🔥 A savvy #socialengineering expert

💬 Likes the long game: builds rapport with targets over weeks/months

🥸 Uses multiple aliases, usually small/under-resourced think tanks and NGOs

😈 Seen abusing #DMARC, spoofing private email accounts, and typosquatting

Explore the blog, and help spread the word about TA427’s prolific activity so potential targets are prepared to protect their people and defend their data.

2024-04-16

"From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering" published by Proofpoint. #DMARC, #TA427, #CTI, #OSINT, #LAZARUS proofpoint.com/us/blog/threat-

2024-04-16

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst