1. North Korean hacker group impersonates legitimate cryptocurrency exchange (DEX) company representatives on LinkedIn to gain access to the accounts of crypto and finance professionals. 2. Hackers engage in ongoing communication with the professionals and request them to execute specific code for coding tasks and testing purposes. 3. The malware installation allows cyber attackers to access company networks or systems for information theft or system attacks.
Related Articles
- US DoJ Probes Ex-Ransomware Negotiator Over Alleged Extortion Kickbacks2 months ago
- Alarming ASUS Armoury Crate Vulnerability Can Give Hackers Admin Access3 months ago
- Should You Click 'Unsubscribe' On Unwanted Emails? Security Experts Weigh In3 months ago
- Blink's New Budget Doorbell With Long Battery Life Is Here To Rival Ring3 months ago
- Setting Up A PIN? Security Experts Warn To Avoid These 4-Digit Codes At All Costs3 months ago
- 3AM Ransomware Gang Hacks Networks With Spoofed IT Calls And Email Bombing4 months ago
- Did A Steam Data Breach Compromise 89 Million Accounts? Valve Responds4 months ago
- Valve confirms Steam has not suffered a data breach4 months ago
- FBI Warns Hackers Are Weaponizing Old Routers, Consider One Of These Upgrades4 months ago
- Microsoft Amps Up War On Passwords With A Key Change To New Accounts4 months ago