Check Point cyber security experts: Targets include Nepal, Guyana, Kenya, Italy, Liberia, Bermuda and Lebanon. The lure is a fake US DoS top secret document.
The cyber security experts: There are many similarities on TTPs, targets and purposes. The credential harvesting could be complementary to the WebMask project on DNS Hijack.
Cisco Talos cyber security experts: At least 40 organizations across 13 different countries were compromised by a state-sponsored actor who exploits DNS hijacking.
The US cyber security experts: It’s a new Trojan with 9 files infected. Seven of them are "proxy applications that mask traffic between malware and the remote operators.
VpnMentor cyber security experts: Third parties could launch targeted cyber attacks and espionage, endangering people's economical and physical security.
The Asan Institute for Policy Studies: Pyongyang is concentrating its cyber warfare on hacking financial institutions to reduce the impact of international sanctions.