"Axios npm Supply Chain Compromise (2026-03-31) — Full RE + Dynamic Analysis + BlueNoroff Attribution" published by N3mes1s. #Axios, #BlueNoroff, #NPM, #DPRK, #CTI gist.github.com/N3mes1s/0c0fc7a0c23cdb5e...
📰 Bitrefill Tuding Grup Hacker Lazarus Korea Utara Dalangi Serangan Siber ke Platformnya
👉 Baca artikel lengkap di sini: ahmandonk.com/2026/03/22/bitrefill-dis...
#apt38 #beritaTeknologi #bitrefill #bluenoroff #hackerLazarus #insidenSiber #kea
"March 1st incident report" published by Bitrefill. #Bitrefill, #BlueNoroff, #DPRK, #CTI https://archive.md/QMdnW
"2026년 2월 APT 그룹 동향 보고서" published by Ahnlab. #BlueNoroff, #Lazarus, #Medusa, #DPRK, #CTI https://asec.ahnlab.com/ko/92884/
"North Korea’s “Prospect Call” Trap: Lazarus Turns Teams Meetings into macOS Credential Theft" published by Daylight. #BlueNoroff, #GhostCall, #DPRK, #CTI daylight.ai/blog/prospect-call-micro...
BlueNoroff: il gruppo di hacker che sta rivoluzionando la criminalità informatica
📌 Link all'articolo : www.redhotcyber.com/post/blu...
#redhotcyber #news #cybersecurity #hacking #malware #ransomware #cryptovalute #gruppodihacker #lazarus #bluenoroff #criminalitàinformatica
"BlueNoroff Group: The Financial Cybercrime Arm of Lazarus" published by PicusSecurity. #BlueNoroff, #DPRK, #CTI www.picussecurity.com/resource/blog/bluenoroff...
BlueNoroff hackers escalate attacks on C-level execs in Web3 & blockchain sectors using advanced social engineering & malware tactics. Stay vigilant! #CyberSecurity #Web3 #Blockchain #BlueNoroff Link: thedailytechfeed.com/bluenoroff-h...
iT4iNT SERVER Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains VDS VPS Cloud #CyberSecurity #Malware #GhostCall #GhostHire #BlueNoroff
Read more:
www.technadu.com/bluenoroff-a...
What do you think about APTs weaponizing video calls and recruitment platforms?
#CyberSecurity #BlueNoroff #GhostCall #GhostHire #APT #Web3Security #Infosec
🚨 BlueNoroff’s GhostCall & GhostHire campaigns target Web3 & VC professionals.
🎭 Fake video calls + GitHub job lures → malware & data theft.
💻 macOS + Windows infostealers active.
#CyberSecurity #BlueNoroff #GhostCall #GhostHire #APT
"BlueNoroff's latest campaigns: GhostCall and GhostHire" published by Kaspersky. #BlueNoroff, #macOS, #DPRK, #CTI securelist.com/bluenoroff-apt-campaigns...
"North Korean Hacker Group Bluenoroff Attempts Hacking Attack via Zoom" published by CriminalIP. #BlueNoroff, #DPRK, #CTI https://www.criminalip.io/knowledge-hub/blog/28728
"Bluenoroff (APT38) Live Infrastructure Hunting" published by Darkatlas. #BlueNoroff, #DPRK, #CTI darkatlas.io/blog/bluenoroff-apt38-li...
North Korean Hackers Take Over Victims’ Systems Using Zoom Meeting North Korean hackers employ social engineering to trick Zoom Meeting participants into executing system-takeover commands. The p...
#Cybercrime #Malware #& #Threats #Nation-State #BlueNoroff […]
[Original post on securityweek.com]
"Zoom & doom: BlueNoroff call opens the door" published by FieldEffect. #BlueNoroff, #DPRK, #CTI fieldeffect.com/blog/zoom-doom-bluenorof...
"Zooming through BlueNoroff Indicators with Validin" published by Validin. #BlueNoroff, #macOS, #DPRK, #CTI www.validin.com/blog/zooming_through_blu...
BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with macOS Backdoor Malware The North Korea-aligned threat actor known as BlueNoroff has been observed targeting an employee in the Web3 sector wi...
#Cyber #Security #backdoor #BlueNoroff #crypto #deepfake […]
[Original post on zephyrnet.com]
Hot on the heels of the researched published by @huntress.com, hunting for Zoom-themed lures from DPRK's #BlueNoroff
💥Learn hunting techniques
💥Leverage new Validin features and data
💥Full, unredacted indicator list (domains, IPs, hashes)
www.validin.com/blog/zooming...
BlueNoroff, deepfake Zoom e malware Mac: APT nordcoreana colpisce finanza e tech con attacchi sofisticati.
#apt #BlueNoroff #CoreadelNord #Deepfake #Mac #malware #SocialEngineering #zoom
www.matricedigitale.it/2025/06/19/b...
BlueNoroff, deepfake Zoom e malware Mac: APT nordcoreana colpisce finanza e tech con attacchi sofisticati.
#apt #BlueNoroff #CoreadelNord #Deepfake #Mac #malware #SocialEngineering #zoom
www.matricedigitale.it/2025/06/19/b...
"Inside the BlueNoroff Web3 macOS Intrusion Analysis" published by Huntress. #BlueNoroff, #macOS, #DPRK, #CTI www.huntress.com/blog/inside-bluenoroff-w...
"An exploratory analysis of the DPRK cyber threat landscape using publicly available reports" published by lazarusholic. #Andariel, #BlueNoroff, #Kimsuky, #Konni, #Lazarus, #ScarCruft, #DPRK, #CTI link.springer.com/article/10.1007/s10207-0...
"'JustJoin' Landing Page Linked to Suspected DPRK Activity Resurfaces" published by Hunt.io. #BlueNoroff, #DPRK, #CTI hunt.io/blog/justjoin-landing-pa...
Good stuff from our friends over at Jamf. We saw some of the same infrastructure and TTPs in our investigation for the #bluenoroff post (s1.ai/BNThief).
The use of Flutter apps, though, that's novel!
www.jamf.com/blog/jamf-th...
According to SentinelOne threat actors such as #bluenoroff are favouring .zshenv persistence to avoid user notification. Not sure it can be referred to as novel but interesting nevertheless. www.sentinelone.com/labs/bluenor...
#NorthKorean threat actor #BlueNoroff has been targeting crypto-related businesses with a new multi-stage malware for macOS systems. #malware #cyberattacks www.bleepingcomputer.com/news/securit...