north korean hackers

Cybersecurity

North Korean Hackers Target React2Shell Flaw in EtherRAT Malware

A sophisticated malware implant called EtherRAT exploits the critical React2Shell vulnerability, using Ethereum smart contracts for command-and-control and establishing five…

Read More »
Cybersecurity

North Korean Hackers Stole $2 Billion in Crypto This Year

North Korean hackers have stolen over $2 billion in cryptocurrency in 2025, primarily through a major breach at Bybit and…

Read More »
Cybersecurity

North Korean Hackers’ New EtherHiding Crypto Heist

A North Korean hacking group is using EtherHiding, a blockchain-based method that embeds malware in smart contracts, making the blockchain…

Read More »
Cybersecurity

North Korean Hackers Hide Malware on Blockchain

EtherHiding is a technique used by North Korean hackers to hide malware on public blockchains, making it hard for authorities…

Read More »
Business

North Korean Hackers Now Target Architecture Firms

North Korean IT workers have long infiltrated Western tech firms, generating billions for their government, and have recently expanded into…

Read More »
BigTech Companies

Google Exposes Internal Security Threats

The profile of cybercriminals is shifting from state-sponsored actors to individuals, including teenagers in Western nations, who pose a growing…

Read More »
Artificial Intelligence

North Korean Hackers Use AI-Forged Military IDs in Phishing Attack

A North Korean hacking group used AI-generated military IDs in phishing emails to impersonate South Korean defense personnel, enhancing the…

Read More »
Cybersecurity

North Korean Hackers Weaponize Threat Intel for Phishing

North Korea-aligned hackers weaponized cyber threat intelligence platforms to enhance phishing operations, turning defensive tools into offensive weapons. The group…

Read More »
Cybersecurity

NimDoor macOS Malware Persists After Termination

North Korean hackers are using sophisticated macOS malware called NimDoor to target cryptocurrency and web3 organizations, employing social engineering and…

Read More »