Jump to content
Advertise With Us! Or Sign Up To Remove Ads!
Hello, readers! Please consider adding conspiracyoutpost.com to your adblock whitelist. Our ads support the development and upkeep of the site.

Archived

This topic is now archived and is closed to further replies.

Ukshep

BREAKING: North Korea Hit By Konni and Inexsmar Malware After Missile Tests

Recommended Posts

 Ukshep    17,196

An unknown hacking group has been targeting organizations in North Korea with Konni Malware. It is a RAT/remote access Trojan having all those features that any effective backdoor might have such as host profiling and remote access control. In 2017, already three different campaigns were identified by security experts against North Korean companies using this malware.

Talos Intelligence, a cybersecurity firm owned by Cisco, firstly identified the campaign in which Konni malware was used. This campaign was launched against North Korea on July 6th, just a few days after the testing of the missile. Talos stated that the campaign most likely was related to the “launch and the ensuing discussion of North Korean missile technology.” In total, Talos identified two campaigns using Konni.

On the other hand, a similar campaign was noted by Cylance security firm’s researchers on Tuesday. This strengthened the findings of Talos and further established the notion that North Korea was being targeted with Konni.

The latest Konni campaign uses a Word document containing the content of a news article published by a Korean news agency Yonhap. This document is infected with a malicious executable file the purpose of which is to invade the computer where it is opened. As soon as this file is executed, the malware starts communication with its C&C server for further instructions and to fulfill the attacker’s malicious objectives.

https://www.hackread.com/north-korean-hit-by-konni-inexsmar-malware-after-missile-tests/

:blink: is this good?

Share this post


Link to post
Share on other sites
 apache54    4,184
3 hours ago, Ukshep said:

An unknown hacking group has been targeting organizations in North Korea with Konni Malware. It is a RAT/remote access Trojan having all those features that any effective backdoor might have such as host profiling and remote access control. In 2017, already three different campaigns were identified by security experts against North Korean companies using this malware.

Talos Intelligence, a cybersecurity firm owned by Cisco, firstly identified the campaign in which Konni malware was used. This campaign was launched against North Korea on July 6th, just a few days after the testing of the missile. Talos stated that the campaign most likely was related to the “launch and the ensuing discussion of North Korean missile technology.” In total, Talos identified two campaigns using Konni.

On the other hand, a similar campaign was noted by Cylance security firm’s researchers on Tuesday. This strengthened the findings of Talos and further established the notion that North Korea was being targeted with Konni.

The latest Konni campaign uses a Word document containing the content of a news article published by a Korean news agency Yonhap. This document is infected with a malicious executable file the purpose of which is to invade the computer where it is opened. As soon as this file is executed, the malware starts communication with its C&C server for further instructions and to fulfill the attacker’s malicious objectives.

https://www.hackread.com/north-korean-hit-by-konni-inexsmar-malware-after-missile-tests/

:blink: is this good?

not good as they are testing to see IF they can control or stop some of his weapons. this is being for several possible outcomes and none are good, appears we are moving closer to a first strike or false flag! or BOTH!!

Share this post


Link to post
Share on other sites

Jump To Top
×