NSA, FBI and ROK illustrate the DPRK hackers TTP, used to lure the victims and steal sensitive info. Especially with social engineering and spear phishing.
Sentinel One cybersecurity experts: It exploits around 700 high-traffic compromised websites as a delivery network, and tailored filenames to lure targets.
Malwarebytes cybersecurity experts: It exploits a fake Java update, social engineering, and a decoy page filled with adult images purporting to be movies.
ESET cyber security experts: The threat actor, maybe North Korea’s Lazarus, exploited custom malware, fake jobs and social engineering via LinkedIn, to compromise the targets.
Kaspersky cyber security experts: The APT is about to begin the final stage of it’s operation and cash out the funds. Many elements confirm that is the work of the russian-speaking hackers.
Proofpoint cyber security experts: The group use malware variants that exploit third-party payloads such as Qbot, The Trick, IcedID, and Gootkit. Emotet use will grow.
Barracuda Networks cyber security experts: In March 2019, 29% of businesses accounts were compromised. For ATOs are used brand impersonation, social engineering, and phishing.
Sucuri cyber security experts: To lure the victims are used 2 well known social engineering techniques: impersonification and panic/bait with phishing emails.