Advertisement · 728 × 90
#
Hashtag
#BlueNoroff
Advertisement · 728 × 90

"Axios npm Supply Chain Compromise (2026-03-31) — Full RE + Dynamic Analysis + BlueNoroff Attribution" published by N3mes1s. #Axios, #BlueNoroff, #NPM, #DPRK, #CTI gist.github.com/N3mes1s/0c0fc7a0c23cdb5e...

0 0 0 0

📰 Bitrefill Tuding Grup Hacker Lazarus Korea Utara Dalangi Serangan Siber ke Platformnya

👉 Baca artikel lengkap di sini: ahmandonk.com/2026/03/22/bitrefill-dis...

#apt38 #beritaTeknologi #bitrefill #bluenoroff #hackerLazarus #insidenSiber #kea

0 0 0 0

"March 1st incident report" published by Bitrefill. #Bitrefill, #BlueNoroff, #DPRK, #CTI https://archive.md/QMdnW

0 0 0 0

"2026년 2월 APT 그룹 동향 보고서" published by Ahnlab. #BlueNoroff, #Lazarus, #Medusa, #DPRK, #CTI https://asec.ahnlab.com/ko/92884/

0 0 0 0

"North Korea’s “Prospect Call” Trap: Lazarus Turns Teams Meetings into macOS Credential Theft" published by Daylight. #BlueNoroff, #GhostCall, #DPRK, #CTI daylight.ai/blog/prospect-call-micro...

0 0 0 0
Post image

BlueNoroff: il gruppo di hacker che sta rivoluzionando la criminalità informatica

📌 Link all'articolo : www.redhotcyber.com/post/blu...

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #cryptovalute #gruppodihacker #lazarus #bluenoroff #criminalitàinformatica

0 0 0 0

"BlueNoroff Group: The Financial Cybercrime Arm of Lazarus" published by PicusSecurity. #BlueNoroff, #DPRK, #CTI www.picussecurity.com/resource/blog/bluenoroff...

0 0 0 0
Post image

BlueNoroff hackers escalate attacks on C-level execs in Web3 & blockchain sectors using advanced social engineering & malware tactics. Stay vigilant! #CyberSecurity #Web3 #Blockchain #BlueNoroff Link: thedailytechfeed.com/bluenoroff-h...

0 0 0 0
Preview
Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains Threat actors tied to North Korea have been observed targeting the Web3 and blockchain sectors as part of twin campaigns tracked as GhostCall and GhostHire. According to Kaspersky, the campaigns are part of a broader operation called SnatchCrypto that has been underway since at least 2017. The activity is attributed to a Lazarus Group sub-cluster called BlueNoroff, which is also known as APT38,

iT4iNT SERVER Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains VDS VPS Cloud #CyberSecurity #Malware #GhostCall #GhostHire #BlueNoroff

0 0 0 0
Preview
BlueNoroff APT Campaigns GhostCall and GhostHire Target Web3, Venture Capital Sectors via Advanced Social Engineering A report details the BlueNoroff APT group's GhostCall and GhostHire social engineering and malware campaigns to target the Web3 industry.

Read more:
www.technadu.com/bluenoroff-a...

What do you think about APTs weaponizing video calls and recruitment platforms?
#CyberSecurity #BlueNoroff #GhostCall #GhostHire #APT #Web3Security #Infosec

3 1 0 0
Post image

🚨 BlueNoroff’s GhostCall & GhostHire campaigns target Web3 & VC professionals.
🎭 Fake video calls + GitHub job lures → malware & data theft.
💻 macOS + Windows infostealers active.

#CyberSecurity #BlueNoroff #GhostCall #GhostHire #APT

1 0 1 0

"BlueNoroff's latest campaigns: GhostCall and GhostHire" published by Kaspersky. #BlueNoroff, #macOS, #DPRK, #CTI securelist.com/bluenoroff-apt-campaigns...

0 0 0 0

"North Korean Hacker Group Bluenoroff Attempts Hacking Attack via Zoom" published by CriminalIP. #BlueNoroff, #DPRK, #CTI https://www.criminalip.io/knowledge-hub/blog/28728

0 0 0 0

"Bluenoroff (APT38) Live Infrastructure Hunting" published by Darkatlas. #BlueNoroff, #DPRK, #CTI darkatlas.io/blog/bluenoroff-apt38-li...

0 0 0 0
Original post on securityweek.com

North Korean Hackers Take Over Victims’ Systems Using Zoom Meeting North Korean hackers employ social engineering to trick Zoom Meeting participants into executing system-takeover commands. The p...

#Cybercrime #Malware #& #Threats #Nation-State #BlueNoroff […]

[Original post on securityweek.com]

0 0 0 0

"Zoom & doom: BlueNoroff call opens the door" published by FieldEffect. #BlueNoroff, #DPRK, #CTI fieldeffect.com/blog/zoom-doom-bluenorof...

1 0 0 0

"Zooming through BlueNoroff Indicators with Validin" published by Validin. #BlueNoroff, #macOS, #DPRK, #CTI www.validin.com/blog/zooming_through_blu...

0 1 0 0
Post image

BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with macOS Backdoor Malware The North Korea-aligned threat actor known as BlueNoroff has been observed targeting an employee in the Web3 sector wi...

#Cyber #Security #backdoor #BlueNoroff #crypto #deepfake […]

[Original post on zephyrnet.com]

0 1 0 0
Preview
Zooming through BlueNoroff Indicators with Validin | Validin Pivoting through recently-reported indicators to find BlueNoroff-associated domains

Hot on the heels of the researched published by @huntress.com, hunting for Zoom-themed lures from DPRK's #BlueNoroff

💥Learn hunting techniques
💥Leverage new Validin features and data
💥Full, unredacted indicator list (domains, IPs, hashes)

www.validin.com/blog/zooming...

2 2 1 0
Post image

BlueNoroff, deepfake Zoom e malware Mac: APT nordcoreana colpisce finanza e tech con attacchi sofisticati.

#apt #BlueNoroff #CoreadelNord #Deepfake #Mac #malware #SocialEngineering #zoom
www.matricedigitale.it/2025/06/19/b...

0 0 0 0
Post image

BlueNoroff, deepfake Zoom e malware Mac: APT nordcoreana colpisce finanza e tech con attacchi sofisticati.

#apt #BlueNoroff #CoreadelNord #Deepfake #Mac #malware #SocialEngineering #zoom
www.matricedigitale.it/2025/06/19/b...

0 0 0 0

"Inside the BlueNoroff Web3 macOS Intrusion Analysis" published by Huntress. #BlueNoroff, #macOS, #DPRK, #CTI www.huntress.com/blog/inside-bluenoroff-w...

2 2 0 0

"An exploratory analysis of the DPRK cyber threat landscape using publicly available reports" published by lazarusholic. #Andariel, #BlueNoroff, #Kimsuky, #Konni, #Lazarus, #ScarCruft, #DPRK, #CTI link.springer.com/article/10.1007/s10207-0...

1 0 0 0

"'JustJoin' Landing Page Linked to Suspected DPRK Activity Resurfaces" published by Hunt.io. #BlueNoroff, #DPRK, #CTI hunt.io/blog/justjoin-landing-pa...

0 0 0 0
Jamf Threat Labs discovers a new threat targeting macOS With malicious code hidden within, the new malware with ties to DPRK, has evaded detection by notable malware checking systems that may signal a new way of attacking macOS devices.

Good stuff from our friends over at Jamf. We saw some of the same infrastructure and TTPs in our investigation for the #bluenoroff post (s1.ai/BNThief).
The use of Flutter apps, though, that's novel!
www.jamf.com/blog/jamf-th...

6 1 0 0
Preview
BlueNoroff Hidden Risk | Threat Actor Targets Macs with Fake Crypto News and Novel Persistence SentinelLabs has observed a suspected DPRK threat actor targeting Crypto-related businesses with novel multi-stage malware.

According to SentinelOne threat actors such as #bluenoroff are favouring .zshenv persistence to avoid user notification. Not sure it can be referred to as novel but interesting nevertheless. www.sentinelone.com/labs/bluenor...

0 0 1 0
Preview
North Korean hackers use new macOS malware against crypto firms North Korean threat actor BlueNoroff has been targeting crypto-related businesses with a new multi-stage malware for macOS systems.

#NorthKorean threat actor #BlueNoroff has been targeting crypto-related businesses with a new multi-stage malware for macOS systems. #malware #cyberattacks www.bleepingcomputer.com/news/securit...

4 2 0 0