The North Korean state-sponsored group Kimsuky, also known as APT43, Thallium, and Velvet Chollima, has been accused of launching a recent cyber-espionage campaign in which the attackers used malicious Windows shortcut (LNK) files as the first point of entry to breach South Korean government agencies, defense contractors, and research institutions. The operation begins with phishing […]
The post Kimsuky APT Uses LNK Files to Deploy Reflective Malware and Evade Windows Defender appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
This article has been indexed from GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Read the original article: