North Korea’s Kimsuky Taps Trusted Platforms to Attack South Korea

The campaign heavily uses Dropbox folders and PowerShell scripts to evade detection and quickly scrapped infrastructure components after researchers began poking around.

Go to Source
Author: Robert Lemos, Contributing Writer

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.