"Contagious Interview Campaign: Independent Analysis of the StegaBin Wave" published by SerapHim. #ContagiousInterview, #FamousChollima, #StegaBin, #DPRK, #CTI github.com/seraphimdeck/SerapHim-CT...
"Contagious Trader campaign - Coordinated weaponisation of cryptocurrency trading bots by suspected DPRK malware operators" published by Kmsec. #ContagiousTrader, #FamousChollima, #NPM, #DPRK, #CTI https://kmsec.uk/blog/contagious-trader/
"First instance of PylangGhost RAT observed on npm" published by Kmsec. #FamousChollima, #PylangGhost, #DPRK, #CTI https://kmsec.uk/blog/pylangghost-npm/
"North Korea's Safari: Poaching for Gophers" published by Bitso. #FamousChollima, #ClickFix, #DPRK, #CTI quetzal.bitso.com/p/north-koreas-safari-po...
North Korean Hackers Hide RAT In npm
Read More: buff.ly/hueDNJ7
#StegaBin #npmSecurity #SupplyChainAttack #FamousChollima #Steganography #RemoteAccessTrojan #DeveloperSecurity #InfosecAlert
"StegaBin: 26 Malicious npm Packages Use Pastebin Steganograp..." published by Socket. #ContagiousInterview, #FamousChollima, #NPM, #Steganography, #DPRK, #CTI socket.dev/blog/stegabin-26-malicio...
"Novel DPRK stager using Pastebin and text steganography" published by Kmsec. #FamousChollima, #NPM, #Steganography, #DPRK, #CTI https://kmsec.uk/blog/dprk-text-steganography/
"Tracking DPRK operator IPs over time" published by Kmsec. #FamousChollima, #NPM, #DPRK, #CTI https://kmsec.uk/blog/dprk-opsec-3/
"DPRK tests Google Drive as a malware stager" published by Kmsec. #FamousChollima, #NPM, #DPRK, #CTI https://kmsec.uk/blog/dprk-gdrive-stager/
"CrowdStrike 2026 Global Threat Report: Evasive Adversary Wields AI" published by CrowdStrike. #FamousChollima, #PressureChollima, #StardustChollima, #Trend, #DPRK, #CTI www.crowdstrike.com/en-us/blog/crowdstrike-2...
"North Korea's Safari: Poaching for Armadillos" published by Bitso. #Armadillos, #FamousChollima, #DPRK, #CTI quetzal.bitso.com/p/north-koreas-safari-po...
"Famous Chollima and Dragon Sickness" published by BoringSecurity. #ContagiousInterview, #FamousChollima, #VSCode, #DPRK, #CTI boringsecurity.dev/posts/famous-chollima-an...
"December 2025 APT Group Trends" published by Ahnlab. #FamousChollima, #Lazarus, #Trend, #DPRK, #CTI https://asec.ahnlab.com/en/92184/
"2025년 12월 APT 그룹 동향 보고서" published by Ahnlab. #FamousChollima, #Lazarus, #Trend, #DPRK, #CTI https://asec.ahnlab.com/ko/92158/
"2025년 11월 APT 그룹 동향 보고서" published by Ahnlab. #FamousChollima, #Kimsuky, #Konni, #Trend, #DPRK, #CTI https://asec.ahnlab.com/ko/91524/
Famous Chollima operatives posed as remote IT staff to target US finance and crypto; techniques included GitHub spam, Telegram outreach, AnyDesk/Google Remote Desktop and OTP-extension social engineering. #Lazarus #FamousChollima #infosec https://bit.ly/3KzInY4
"How We Caught Lazarus's IT Workers Scheme Live on Camera" published by AnyRun. #ITWorker, #FamousChollima, #DPRK, #CTI any.run/cybersecurity-blog/lazar...
Ricercatori catturano lo schema remoto di Lazarus APT, che usa identità noleggiate e accesso umano per infiltrare aziende occidentali.
#apt #CoreadelNord #FamousChollima #honeypot #Lazarus
www.matricedigitale.it/2025/12/02/l...
"The Deepfake Threat: Chollima APT Group Uses AI Filters to Infiltrate Crypto and Web3 Companies" published by SOCRadar. #Deepfake, #FamousChollima, #DPRK, #CTI socradar.io/deepfake-threat-chollima...
"Cross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 3)" published by RansomISAC. #EtherHiding, #FamousChollima, #DPRK, #CTI ransom-isac.org/blog/cross-chain-txdatah...
"2025년 10월 APT 그룹 동향 보고서" published by Ahnlab. #FamousChollima, #Larva-25004, #Trend, #DPRK, #CTI https://asec.ahnlab.com/ko/90993/
"Interview with the Chollima IV" published by Bitso. #FamousChollima, #DPRK, #CTI quetzal.bitso.com/p/interview-with-the-cho...
"Interview with the Chollima III" published by Bitso. #FamousChollima, #DPRK, #CTI quetzal.bitso.com/p/interview-with-the-cho...
Watch as North Korean hackers from the #FamousChollima group are caught using AI deepfakes and stolen identities in fake job interviews to infiltrate crypto and #Web3 firms.
Details: hackread.com/north-korean...
#CyberSecurity #CyberCrime #NorthKorea #Lazarus #Scam #AI
"Famous Chollima Evolves Its Arsenal, Merging BeaverTail and OtterCookie" published by PolySwarm. #BeaverTail, #FamousChollima, #OtterCookie, #DPRK, #CTI blog.polyswarm.io/famous-chollima-evolves-...
Watch out as the North Korean hackers from the #FamousChollima group are using fake job offers to spread BeaverTail and OtterCookie malware, stealing crypto and credentials in a new attack.
Read: hackread.com/nk-famous-ch...
#Cybersecurity #Malware #BeaverTail #OtterCookie #NorthKorea
"ENISA Threat Landscape 2025" published by ENISA. #Trend, #FamousChollima, #Lazarus, #DPRK, #CTI www.enisa.europa.eu/publications/enisa-threa...
#ThreatIntel - DPRK-nexus #FamousChollima (aka DPRK IT workers) observed seeking jobs across multiple sectors, incl. 50% in the IT sector worldwide, with activity reported in the U.S. and in other countries (27% of targeted countries reportedly outside the U.S.)
www.okta.com/newsroom/art...
Nuova campagna nordcoreana: varianti BeaverTail e InvisibleFerret colpiscono criptovalute e retail con tecniche avanzate di social engineering.
#apt #BeaverTail #ClickFix #ContagiousInterview #CoreadelNord #FamousChollima #InvisibleFerret
www.matricedigitale.it/2025/09/21/f...