
EtherRAT & SYS_INFO Module: C2 on Ethereum (EtherHiding), Target Selection, CDN-Like Beacons
Learn more about the EtherRAT backdoor, which is being used to conduct targeted attacks, and get security recommendations from our TRU team on how to protect your organization from this cyber threat.
eSentire"M-Trends 2026: Data, Insights, and Strategies From the Frontlines" published by Google.
#ITWorker,
#Trend,
#DPRK,
#CTI https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2026
M-Trends 2026: Data, Insights, and Strategies From the Frontlines | Google Cloud Blog
Explore M-Trends 2026 report for frontline data on the latest cyber threats, including ransomware recovery denial and extreme persistence.
Google Cloud BlogNICKEL ALLEY strategy: Fake it ‘til you make it
Victimizing software developers via fake companies, jobs, and code repositories to steal cryptocurrency
SOPHOS
How LevelBlue OTX and Cybereason XDR Detected a North Korea-Linked Remote IT Worker
From August 15 to 25, 2025, the SpiderLabs threat intel team detected a North Korea attempt to infiltrate an organization by replying to a help wanted ad.
"North Korea’s Crypto Theft Operations: The Role of Lazarus Group in State-Sponsored Financial Warfare" published by Cyble.
#Bitrefill,
#DPRK,
#CTI https://cyble.com/blog/lazarus-group-bitrefill-cyberattack/
Lazarus Group Bitrefill Cyberattack Crypto Threat
Lazarus Group cyberattack on Bitrefill shows how North Korean hackers exploit crypto platforms, credentials, and human error for large-scale theft.
Cyble
Exposing a Fraudulent DPRK Candidate
Nisos exposed a fraudulent DPRK candidate in a major employment fraud scheme. Our OSINT investigation uncovered stolen PII, AI-generated resumes, and a hidden laptop farm used to bypass hiring checks.
Nisos"2026년 2월 APT 공격 동향 보고서(국내)" published by Ahnlab.
#LNK,
#Phishing,
#DPRK,
#CTI https://asec.ahnlab.com/ko/92969/
2026년 2월 APT 공격 동향 보고서(국내) - ASEC
2026년 2월 APT 공격 동향 보고서(국내) ASEC
ASEC