It’s tailored on the victim’s email. A link redirects to a fake company site, where user is asked to digit the password. Goal: to steal and harvest credentials.
The email text changes, but the system is always the same. Xz attachment contains an exe, the malware itself, which should load other payloads. Today, however, it is unknown which.
Kaspersky cybersecurity experts: The North Korea APT’s malware, a backdoor, moves laterally through infected networks and extracts confidential information.
The hactivists target the government sites and help the population to communicate. Furthermore, they are creating a site to document the violent repression.