#NorthKorea #DPRK #KimJongUn #HumanRights
https://www.dailynk.com/english/north-korea-orders-campaign-to-erase-south-korea-from-youth-consciousness/
Drift loses $280 million North Korean hackers seize Security Council powers
「 These include Tornado Cash usage, CarbonVote deployment timing (09:30 Pyongyang time), cross-chain bridging patterns, and rapid large-scale laundering, consistent with the Bybit hack. The attacker leveraged durable nonce accounts and pre-signed transactions to delay execution and strike with accuracy at a chosen time, the platform explained 」
DPRK-Related Campaigns with LNK and GitHub C2
FortiGuard Labs recently detected a series of LNK files targeting users in South Korea. These attacks use a multi-stage scripting process and leverage GitHub as Command and Control (C2) infrastructure to evade detection. Although these LNK files can be traced back to 2024, earlier versions had less obfuscation and contained significant metadata, allowing us to track similar attacks spreading the XenoRAT malware.
Pulse ID: 69cfceee4f7a6c4305b3d1a4
Pulse Link: https://otx.alienvault.com/pulse/69cfceee4f7a6c4305b3d1a4
Pulse Author: AlienVault
Created: 2026-04-03 14:30:06
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #DPRK #FortiGuard #FortiGuardLabs #GitHub #InfoSec #Korea #LNK #Malware #OTX #OpenThreatExchange #RAT #SouthKorea #bot #AlienVault
📢 TasksJacker : campagne DPRK compromet 400+ dépôts GitHub via VS Code tasks.json et C2 blockchain
📝 ## 🔍 Contexte
Rapport publié le 2 avril 2026 par OpenSourceMalware.com, issu d'une investigation débutée le 31 janvier 2026.
📖 cyberveille : https://cyberveille.ch/posts/2026-04-02-tasksjacker-campagne-dprk-compromet-400-depots-github-via-vs-code-tasks-json-et-c2-blockchain/
🌐 source : https://opensourcemalware.com/blog/tasksjacker-blog-post
#DPRK #GitHub #Cyberveille
🔍 Contexte Rapport publié le 2 avril 2026 par OpenSourceMalware.com, issu d’une investigation débutée le 31 janvier 2026. L’analyse documente une campagne active baptisée TasksJacker, attribuée avec un niveau de confiance MEDIUM-HIGH à des acteurs liés à la Corée du Nord (DPRK). 🎯 Vecteur d’attaque principal Les attaquants injectent des fichiers .vscode/tasks.json malveillants dans des dépôts GitHub compromis. La fonctionnalité "runOn": "folderOpen" de VS Code déclenche automatiquement l’exécution d’une commande shell dès qu’un développeur ouvre le dossier cloné — sans interaction utilisateur supplémentaire.
current estimate $285 million possibly headed straight into the #DPRK or #IRGC nuclear weapons program, including $71.5 million from the "regulated" #stablecoin #USDC that could have stopped at least that much of this heist at any moment in the last 4 hours and just... chose not to do so.
remember that the goal of the #GeniusAct etc. is to make companies like Circle USDC *your* bank.
#Circle #USDC #GeniusAct #crypto #bitcoin #driftProtocol #solana #SOL #infosec #crime #lazarusGroup #FutureOfFinance #stablecoins #infosec #Hack #cybersecurity #Tether #USDT