all InfoSec news
Konni Group Using Russian-Language Malicious Word Docs in Latest Attacks
Nov. 23, 2023, 2:46 p.m. | info@thehackernews.com (The Hacker News)
The Hacker News thehackernews.com
The activity has been attributed to a threat actor called Konni, which is assessed to share overlaps with a North Korean cluster tracked as Kimsuky (aka APT43).
"This campaign relies on a remote access trojan
actor attack attacks called cluster compromised deliver malware docs document information kimsuky konni language latest malicious malware microsoft microsoft word north north korean phishing phishing attack russian russian-language sensitive sensitive information share threat threat actor windows word word document
More from thehackernews.com / The Hacker News
Cyber Landscape is Evolving - So Should Your SCA
2 days, 16 hours ago |
thehackernews.com
FBI Distributes 7,000 LockBit Ransomware Decryption Keys to Help Victims
2 days, 19 hours ago |
thehackernews.com
SPECTR Malware Targets Ukraine Defense Forces in SickSync Campaign
2 days, 20 hours ago |
thehackernews.com
Commando Cat Cryptojacking Attacks Target Misconfigured Docker Instances
2 days, 22 hours ago |
thehackernews.com
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Senior Security Researcher - Linux MacOS EDR (Cortex)
@ Palo Alto Networks | Tel Aviv-Yafo, Israel
Sr. Manager, NetSec GTM Programs
@ Palo Alto Networks | Santa Clara, CA, United States
SOC Analyst I
@ Fortress Security Risk Management | Cleveland, OH, United States