Skip to Content

Kimsuky APT employing BabyShark malware

Updated on 2022-11-29

Qihoo 360 has published a report on the Kimsuky APT and its recent campaigns employing the BabyShark malware. Read more: APT-C-55(Kimsuky)组织以IBM公司安全产品为诱饵的攻击活动分析

Updated on 2022-10-28

AhnLab documented a phishing campaign carried out by the Kimsuky North Korean APT targeting various companies working in the nuclear power plant sector. The final payload in these attacks was the AppleSeed malware. Read more: 원자력 발전소 관련 기업 대상으로 AppleSeed 유포

Updated on 2022-10-27

North Korea-based Kimsuky APT group was found leveraging three different Android malware variants—FastSpy, FastFire, and FastViewer—to target South Korea. Read more: Kimsuky Hackers Spotted Using 3 New Android Malware to Target South Koreans

Updated on 2022-10-26: Kimsuky’s Android arsenal

South Korean cybersecurity firm S2W Talon published a report on FastFire, FastViewer, and FastSpy, three Android malware strains they linked to Kimsuky, one of North Korean state-sponsored hacking groups. Read more: Unveil the evolution of Kimsuky targeting Android devices with newly discovered mobile malware


South Korean security firm AhnLab has found copies of AppleSeed, a malware strain linked to the Kimsuky APT, being spread as router firmware updates.

    Ads Blocker Image Powered by Code Help Pro

    Ads Blocker Detected!!!

    This site depends on revenue from ad impressions to survive. If you find this site valuable, please consider disabling your ad blocker.