Comic Sans and Cybercrime: Inside North Korea’s Global Cyber Playbook

Podcast Episode · DISCARDED: Tales From the Threat Research Trenches · 07/01/2025 · 53m

Apple Podcasts
"Around the World in 90 Days: State-Sponsored Actors Try ClickFix" published by Proofpoint. #ClickFix, #QuasarRAT, #TA427, #DPRK, #CTI https://www.proofpoint.com/us/blog/threat-insight/around-world-90-days-state-sponsored-actors-try-clickfix
Around the World in 90 Days: State-Sponsored Actors Try ClickFix | Proofpoint US

Key Findings While primarily a technique affiliated with cybercriminal actors, Proofpoint researchers discovered state-sponsored actors in multiple campaigns using the ClickFix social

Proofpoint
"The art of information gathering." published by Thecyberwire. #DMARC, #TA427, #Podcast, #CTI, #OSINT, #LAZARUS https://thecyberwire.com/podcasts/research-saturday/326/notes
The art of information gathering.

Greg Lesnewich, senior threat researcher at Proofpoint, sits down to discuss "From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering." Since 2023, TA427 has directly solicited foreign policy experts for their opinions on nuclear disarmament, US-ROK policies, and sanction topics via benign conversation starting emails. The research states "While our researchers have consistently observed TA427 rely on social engineering tactics and regularly rotating its email infrastructure, in December 2023 the threat actor began to abuse lax Domain-based Message Authentication, Reporting and Conformance (DMARC) policies to spoof various personas and, in February 2024, began incorporating web beacons for target profiling."

The CyberWire

Proofpoint has been tracking #TA427, a North Korea-aligned threat actor, for years.

Recently, the team observed changes in the group's tactics and targeting, including exploiting #DMARC and web beacons.

Greg Lesnewich shared his insight with The CyberWire Research Saturday podcast host Dave Bittner.

Stream now at https://thecyberwire.com/podcasts/research-saturday/326/notes.

#EmeraldSleet #APT43 #THALLIUM #Kimsuky

The art of information gathering.

Greg Lesnewich, senior threat researcher at Proofpoint, sits down to discuss "From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering." Since 2023, TA427 has directly solicited foreign policy experts for their opinions on nuclear disarmament, US-ROK policies, and sanction topics via benign conversation starting emails. The research states "While our researchers have consistently observed TA427 rely on social engineering tactics and regularly rotating its email infrastructure, in December 2023 the threat actor began to abuse lax Domain-based Message Authentication, Reporting and Conformance (DMARC) policies to spoof various personas and, in February 2024, began incorporating web beacons for target profiling."

The CyberWire

Proofpoint’s threat research team has been tracking state-aligned actors for years. In a new report, they detail TA427, a group observed using new tactics, including persona spoofing and the incorporation of web beacons.

Blog: https://www.proofpoint.com/us/blog/threat-insight/social-engineering-dmarc-abuse-ta427s-art-information-gathering?utm_source=linkedin&utm_medium=social_organic&utm_campaign=2024&utm_post_id=35029a5f-a6c8-46ee-b34e-1ed3f5bee16e

Get to know advanced persistent threat (APT) #TA427:

👋 Also goes by #EmeraldSleet, #APT43, #THALLIUM, #Kimsuky

🤝 Likely supports #DPRK intelligence on US and ROK foreign policy

🔥 A savvy #socialengineering expert

💬 Likes the long game: builds rapport with targets over weeks/months

🥸 Uses multiple aliases, usually small/under-resourced think tanks and NGOs

😈 Seen abusing #DMARC, spoofing private email accounts, and typosquatting

Explore the blog, and help spread the word about TA427’s prolific activity so potential targets are prepared to protect their people and defend their data.

From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering  | Proofpoint US

Key takeaways   TA427 regularly engages in benign conversation starter campaigns to establish contact with targets for long-term exchanges of information on topics of strategic importance to the No...

Proofpoint
"From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering" published by Proofpoint. #DMARC, #TA427, #CTI, #OSINT, #LAZARUS https://www.proofpoint.com/us/blog/threat-insight/social-engineering-dmarc-abuse-ta427s-art-information-gathering
From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering  | Proofpoint US

Key takeaways   TA427 regularly engages in benign conversation starter campaigns to establish contact with targets for long-term exchanges of information on topics of strategic importance to the No...

Proofpoint
From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering  | Proofpoint US

Key takeaways   TA427 regularly engages in benign conversation starter campaigns to establish contact with targets for long-term exchanges of information on topics of strategic importance to the No...

Proofpoint