Tag: North Korea


  • North Korean Malware Targets macOS Users in Failed Attack

    A new North Korean malware campaign targeting macOS users has been disrupted after a researcher exposed critical weaknesses in the operation. The attackers focused on high-value individuals in crypto and fintech sectors, using advanced social engineering tactics to gain access. However, poor infrastructure security allowed the campaign to collapse. This North Korean malware incident highlights…

  • North Korean IT Worker Scam Exposed After Malware Leak

    A malware incident has exposed a large-scale North Korean IT worker scam, revealing how operatives infiltrate companies and generate significant revenue. The leak occurred after a hacker accidentally triggered malicious software on their own device, exposing internal data tied to the operation. The incident provides a rare look into how these schemes function and scale…

  • North Korea Uses AI to Scale Lucrative Crypto Theft Operations

    North Korea has turned artificial intelligence into a force multiplier for cybercrime. Security researchers say the regime increasingly relies on AI tools to expand cryptocurrency theft, streamline fraud operations, and evade detection. The strategy allows North Korea to generate revenue at scale while bypassing international sanctions. AI strengthens North Korea’s cyber operations North Korean hacking…

  • North Korea Malware Hides Inside Open-Source Projects

    North Korean threat actors are increasingly embedding malware inside open-source projects to target developers directly. This tactic allows malicious code to blend into trusted workflows, making infections harder to detect and easier to spread. Rather than attacking organizations through traditional exploits, these campaigns focus on trust and familiarity. Developers interact with public repositories every day,…

  • North Korea Konni Malware Targets Blockchain Developers With PowerShell Attacks

    The North Korea Konni malware campaign has expanded its scope by targeting software developers working in blockchain and cryptocurrency projects. Security researchers have identified a coordinated phishing operation that delivers malicious PowerShell payloads through seemingly legitimate project documents. The activity highlights how state-linked threat actors are adapting their tactics to compromise highly skilled technical professionals.…

  • North Korea ads malware campaign abuses online advertising systems

    A sophisticated North Korea ads malware campaign has revealed how state-linked hackers now exploit trusted online advertising systems to distribute malicious software. Instead of relying on traditional phishing pages or direct malware delivery, attackers abused legitimate ad infrastructure to disguise harmful activity as normal user behavior. This tactic allowed the campaign to bypass many common…

  • North Korea turns crypto theft into industrial operation

    North Korea has transformed cryptocurrency theft into a highly organized operation. Security researchers say North Korea crypto thefts now resemble an industrial process rather than isolated cyberattacks. State-linked groups continue to steal billions by targeting high-value platforms and exploiting human and technical weaknesses. Record losses attributed to North Korean hackers Analysts estimate that North Korean…

  • North Korea AI military ops raise global security concerns

    A new intelligence assessment suggests that North Korea AI military ops are advancing faster than expected. Analysts say recent research publications from Pyongyang reveal progress with facial recognition, voice cloning, automated tracking and drone technology that could support future surveillance and combat operations. New Findings in North Korean AI Research The Institute for National Security…

  • North Korea fake jobs scheme targets AI and crypto workers

    North Korea fake jobs schemes continue to expand into high-value technology sectors. A new campaign now focuses on AI and cryptocurrency professionals, using sophisticated impersonation and malware-based interview tools to compromise applicants. The operation reveals how threat actors adapt their tactics to exploit global remote-work environments and specialised technical talent. Fake recruitment platforms mimic real…

  • North Korea IT Infiltration Exposes Remote-Work Weaknesses

    A major case of remote-work abuse emerged after investigators uncovered a wide-scale North Korea IT infiltration campaign targeting US companies. The scheme relied on stolen identities, hosted devices and covert remote access. It revealed how modern hiring systems, when poorly verified, create entry points for foreign operatives. How the infiltration worked Five individuals in the…