PowerShell and Dropbox Utilized by North Korean APT43 in Focused Cyberattacks on South Korea

An affiliated threat entity connected to North Korea has been identified in an active operation aimed at South Korean enterprises, government offices, and digital currency industries.

An affiliated threat entity connected to North Korea has been identified in an active operation aimed at South Korean enterprises, government offices, and digital currency industries.
Securonix has named this targeted offensive as DEEP#DRIVE, crediting the orchestrated efforts to a cyber unit identified as Kimsuky. This group is also recognized by various aliases including APT43, Black Banshee, Emerald Sleet, Sparkling Pisces, Springtail, TA427, and Velvet.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.