#north-korea-threat-actor

[ follow ]
Information security
fromWIRED
2 days ago

AI Tools Are Helping Mediocre North Korean Hackers Steal Millions

AI tools have enabled unskilled hackers to execute sophisticated cybercrime operations, resulting in significant financial theft.
#north-korea
Women in technology
fromwww.theguardian.com
2 weeks ago

The Guardian view on North Korea and the Kims: whoever's at the helm, the regime serves only itself | Editorial

North Korea's dynastic system may see Kim Jong-un's daughter, Kim Ju-ae, positioned as a successor despite her young age and uncertainties surrounding her leadership.
US news
fromTheregister
1 week ago

Americans behind Nork IT fraud sentenced to 200 months

Two Americans were sentenced to 200 months for aiding North Korea in generating $5 million through fraudulent IT job schemes.
Russo-Ukrainian War
fromwww.businessinsider.com
1 week ago

North Korean ballistic missiles were made with outdated methods from up to 50 years ago: Ukraine MOD

North Korean ballistic missiles KN-23 and KN-24 utilize outdated production methods and commercial electronics, impacting their efficiency and design.
Information security
fromSecurityWeek
2 days ago

North Korean Hackers Use AppleScript, ClickFix in Fresh macOS Attacks

North Korean hackers are targeting macOS users in financial organizations using social engineering techniques to install information-stealing malware.
Cryptocurrency
fromTechCrunch
4 days ago

North Korea hackers blamed for $290M crypto theft | TechCrunch

Hackers stole over $290 million from Kelp DAO, with North Korea suspected as the perpetrator using its LayerZero bridge exploit.
#human-rights
World politics
fromwww.aljazeera.com
4 days ago

Predators': Amnesty slams Netanyahu, Putin, Trump as human rights decline

Israel, Russia, and the United States are undermining global human rights, inspiring other nations to commit abuses.
World politics
fromwww.dw.com
4 days ago

Amnesty International paints a grim picture

Human rights violations are increasing globally, with perpetrators often unpunished, according to Amnesty International's report for 2025.
Left-wing politics
fromwww.theguardian.com
1 month ago

Trump's sanctions against a UN human rights expert show free speech is dying |

Israel has committed genocide against the Palestinian people, as concluded by multiple international human rights organizations and experts.
World news
fromwww.theguardian.com
4 days ago

US restricts intelligence sharing with South Korea' after minister identified suspected nuclear site

The US has restricted intelligence sharing with South Korea after a minister identified a suspected North Korean nuclear site publicly.
#axios
Node JS
fromAxios
3 weeks ago

North Korean hackers implicated in major supply chain attack

A compromised maintainer account for the Axios npm package led to the publication of malicious software versions targeting various operating systems.
Information security
fromTechzine Global
3 weeks ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
#cybersecurity
Information security
fromSilicon Canals
2 weeks ago

A three-hour window: North Korean hackers compromised the Axios library and exposed thousands of systems - Silicon Canals

A North Korean hacking group compromised Axios, affecting millions before the malicious packages were removed after three hours.
fromTechCrunch
2 weeks ago
Information security

North Korea's hijack of one of the web's most used open source projects was likely weeks in the making | TechCrunch

A North Korean cyberattack compromised the Axios project, highlighting security vulnerabilities in open source software development.
Information security
fromSilicon Canals
2 weeks ago

A three-hour window: North Korean hackers compromised the Axios library and exposed thousands of systems - Silicon Canals

A North Korean hacking group compromised Axios, affecting millions before the malicious packages were removed after three hours.
Information security
fromTechCrunch
2 weeks ago

North Korea's hijack of one of the web's most used open source projects was likely weeks in the making | TechCrunch

A North Korean cyberattack compromised the Axios project, highlighting security vulnerabilities in open source software development.
Remote teams
fromTheregister
1 month ago

North Korean's 100k fake IT workers net $500M a year for Kim

North Korea operates a sophisticated fake IT worker scheme generating $500 million annually, with over 100,000 operatives in 40 countries infiltrating companies to steal money and sensitive information.
#north-korea-nuclear-weapons
World politics
fromwww.dw.com
1 month ago

North Korea watches and learns as US attacks Iran

North Korea views Iran's vulnerability to military attacks as proof that nuclear weapons are essential for regime survival and will abandon any nuclear negotiations.
World politics
fromwww.dw.com
1 month ago

North Korea watches and learns as US attacks Iran

North Korea views Iran's vulnerability to military attacks as proof that nuclear weapons are essential for regime survival and will abandon any nuclear negotiations.
#north-korea-succession
World politics
fromwww.aljazeera.com
1 month ago

North Korea denounces muscle-flexing' US-South Korean military exercises

North Korea's Kim Yo Jong warns that US-South Korea joint military exercises could cause severe consequences and threaten regional stability.
World politics
fromThe Washington Post
1 month ago

An emboldened Kim flaunts nuclear ambitions while leaving room for U.S. talks

North Korea declares its nuclear program permanent and irreversible, expanding its arsenal while conditioning talks with the U.S. on accepting its nuclear status.
Information security
fromThe Hacker News
1 month ago

OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs

OFAC sanctioned six individuals and two entities for operating a North Korean IT worker scheme that defrauds U.S. businesses and generates illicit revenue for weapons of mass destruction programs.
World news
fromwww.dw.com
1 month ago

North Korea fired 10 ballistic missiles, says Seoul

North Korea launched approximately 10 ballistic missiles toward the Sea of Japan on Saturday in response to ongoing US-South Korea joint military drills.
fromwww.aljazeera.com
1 month ago

North Korea fires ballistic missiles as US-South Korea hold military drills

Japan estimates that the missiles reached a maximum altitude of 80 kilometres (50 miles) and flew approximately 340 kilometres before landing near the east coast of the Korean Peninsula, outside Tokyo's exclusive economic zone. Early reports indicate that no damage has been reported by nearby aircraft or ships.
World news
World news
fromwww.theguardian.com
1 month ago

North Korea fires projectile towards sea amid US-South Korea military drills

North Korea fired a projectile toward the sea while the US and South Korea conducted military drills, with diplomatic efforts underway to resume talks with Pyongyang.
World politics
fromThe Cipher Brief
1 month ago

Nuclear Expansion and Conditional Diplomacy: North Korea's New Strategy

North Korea's 9th Workers' Party Congress codified nuclear-armed status with pre-emptive strike capability while signaling conditional openness to U.S. engagement and formal hostility toward South Korea.
fromwww.aljazeera.com
1 month ago

After North Korea party congress, Kim gifts rifles to officials, daughter

Kim presented the rifles to senior party and military officials on Friday, calling them a sign of his absolute trust and gratitude for their commitment over the past five years since the last Workers' Party of Korea congress in 2021, according to North Korea's official Korean Central News Agency on Saturday.
World politics
Information security
fromThe Hacker News
1 month ago

North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT

North Korean threat actors deployed 26 malicious npm packages using steganography to hide command-and-control infrastructure in Pastebin essays, targeting developers with credential stealers and remote access trojans.
fromwww.theguardian.com
2 months ago

Living hell of North Korea's paradise on Earth' scheme back in spotlight in Japan

They were denied basic human rights and forced to endure extreme hardship. Official promises of free education and healthcare plus guaranteed jobs and housing had been a cruel mirage. And to their horror, they were prevented from travelling to Japan to visit the families they had left behind. But this week, after years of campaigning, four settlers who had escaped to Japan secured justice when a court in Tokyo ordered the North Korean government to pay each of them at least 20m yen in compensation.
World news
Information security
fromTheregister
1 month ago

Suspected Nork intruders infecting US healthcare, education

North Korean-linked hackers deployed a new backdoor called Dohdoor to infect US education and healthcare institutions since December for financial gain.
fromThe Hacker News
2 months ago

North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating financial theft. "The intrusion relied on a social engineering scheme involving a compromised Telegram account, a fake Zoom meeting, a ClickFix infection vector, and reported usage of AI-generated video to deceive the victim," Google Mandiant researchers Ross Inman and Adrian Hernandez said.
Information security
World news
fromwww.dw.com
1 month ago

North Korea: Kim visits warship, oversees missile launch

North Korea plans to build two advanced surface warships annually under its new five-year plan, with Kim Jong Un overseeing missile tests on the Choe Hyon-class destroyer to demonstrate enhanced naval offensive capabilities.
Information security
fromSecurityWeek
1 month ago

North Korean APT Targets Air-Gapped Systems in Recent Campaign

APT37 deployed five new malicious tools in the Ruby Jumper campaign targeting air-gapped systems using USB-based data exfiltration and persistence mechanisms.
fromwww.aljazeera.com
1 month ago

North Korea's Kim oversees cruise missile tests from new naval destroyer

Our Navy's forces for attacking from under and above water will grow rapidly. The arming of the Navy with nuclear weapons is making satisfactory progress. All these successes constitute a radical change in defending our maritime sovereignty, something that we have not achieved for half a century.
World news
World news
fromenglish.elpais.com
2 months ago

Portrait of Ju-ae, the teenage daughter Kim Jong-un has chosen as his likely heir

Kim Ju-ae has rapidly risen from obscurity to a prominent public role and is increasingly viewed by intelligence as a likely successor and de facto second-in-command.
World news
fromTheregister
2 months ago

North Korean IT worker facilitator gets five years in prison

Oleksandr Didenko received five years in US prison for helping North Korean IT workers use stolen identities and laptop farms to secure fraudulent US employment.
fromwww.theguardian.com
3 months ago

Pentagon to reduce its role in deterrence of North Korea

South Korea hosts about 28,500 US troops in combined defence against North Korea's military threat and Seoul has raised its defence budget by 7.5% for this year. South Korea is capable of taking primary responsibility for deterring North Korea with critical but more limited US support, said the National Defense Strategy, a document that guides the Pentagon's policies. This shift in the balance of responsibility is consistent with America's interest in updating US force posture on the Korean Peninsula, the document added.
World news
[ Load more ]