1. North Korean hacker group impersonates legitimate cryptocurrency exchange (DEX) company representatives on LinkedIn to gain access to the accounts of crypto and finance professionals. 2. Hackers engage in ongoing communication with the professionals and request them to execute specific code for coding tasks and testing purposes. 3. The malware installation allows cyber attackers to access company networks or systems for information theft or system attacks.
Related Articles
- Apple Will Make You A Multi-Millionaire If You Find Just One Of These Security Flaws5 days ago
- Microsoft Warns Of XCSSET MacOS Malware That Is Now More Dangerous Than Ever17 days ago
- Cloudflare Blocks Massive 22.2 Tbps DDoS Attack Twice As Big As Anything Seen Before21 days ago
- Warning: ChatGPT Can Be Tricked To Leak Personal Data With Just Your Email Addressabout 1 month ago
- Role Of Secure Boot In Securing IoT Devicesabout 1 month ago
- Google is getting ready to 'hack back' as US considers shifting from cyber defense to offense — new 'Scam Farms' bill opens up new retaliatory hacking actionsabout 2 months ago
- Callous Ransomware Gang Targets Transit Service For The Disabled In Cruel Cyberattackabout 2 months ago
- Silicon Labs claims world first with PSA Level 4 iSE/SE-certified SoC2 months ago
- Ransomware Gang Destroys A 158-Year-Old Company And A Weak Password Is To Blame3 months ago
- US DoJ Probes Ex-Ransomware Negotiator Over Alleged Extortion Kickbacks3 months ago