Kimsuky, a North Korean state-sponsored APT group, has deployed a new malware component called ReconShark, according to security researchers at SentinelOne. This malware is being distributed via targeted spear-phishing emails containing OneDrive links that download documents and activate malicious macros.
The Microsoft Office macro, triggered when the document closes, performs a more advanced version of the reconnaissance function found in Kimsuky's BabyShark malware, which stores data in string variables that it sends to a C2 (command and control) server via an HTTP POST request. ReconShark can also use the processes of the detection mechanism found on infected machines to install additional payloads, such as scripts or DLL files. Organisations and individuals in at least the USA, Europe and Asia, including think tanks, research universities and government agencies, were targeted in the campaign.
Зарегистрируйтесь по электронной почте сейчас для еженедельной акции акции
100% free, Unsubscribe any time!Add 1: Room 605 6/F FA YUEN Commercial Building, 75-77 FA YUEN Street, Mongkok KL, HongKong Add 2: Room 405, Building E, MeiDu Building, Gong Shu District, Hangzhou City, Zhejiang Province, China
Whatsapp/ тел: +8618057156223 * телефон: *: 0086 571 86729517 Tel in HK: 00852 66181601
Электронная почта: [email protected]