⚠️ Trellix researchers uncovered a months-long espionage campaign targeting 19 embassies and ministries in South Korea.
🔴 How it works: Hackers linked to Kimsuky (APT43) sent fake diplomatic emails with malicious attachments that installed XenoRAT spyware—capable of logging keystrokes, hijacking webcams, and stealing sensitive files.
💡 Attackers even used GitHub, Google Drive, Dropbox, and Daum Cloud to hide stolen data.
⏱️ Trellix also found activity paused during Chinese holidays, hinting at possible operations from China.
✅ How to stay safe:
Verify senders
Avoid suspicious attachments
Use strong email filters
🔔 Stay updated with TheCyberScroll—your 60-second cyber alerts.
#CyberSecurity #NorthKorea #EmbassyHack #Trellix #APT43 #TheCyberScroll