Topic: decoy documents

  • North Korean Hackers Exploit Seoul Intelligence Files

    North Korean Hackers Exploit Seoul Intelligence Files

    A sophisticated spear-phishing campaign, attributed to North Korean-linked APT37, targeted South Korean intelligence and government personnel using deceptively authentic documents as bait. The operation unfolded in two phases: one distributing a malicious file disguised as a trusted newsletter to...

    Read More »
  • APT37 Breaches Air-Gapped Networks with New Malware

    APT37 Breaches Air-Gapped Networks with New Malware

    North Korean state-sponsored hackers (APT37) are using a novel toolkit called Ruby Jumper to breach sensitive air-gapped networks by exploiting removable USB drives as a covert bridge. The multi-stage infection begins with a malicious shortcut file and deploys a chain of tools, including the REST...

    Read More »
  • Urgent Windows Flaw CVE-2025-9491 Actively Exploited by Hackers

    Urgent Windows Flaw CVE-2025-9491 Actively Exploited by Hackers

    A critical Windows security flaw (CVE-2025-9491) is being actively exploited by hacking group UNC6384, enabling unauthorized code execution through malicious LNK files in spearphishing campaigns targeting European diplomatic and aviation entities. The exploitation involves a multi-stage malware c...

    Read More »