North Korea could have been preparing for weeks for the attack involving thousands

A few days ago, it was revealed that a hacker believed to be from North Korea had attacked and modified a popular open source software development tool with the aim of spreading a dangerous malware.

Now new details have come to light about the attack and its planning, which a TechCrunch according to reports, it could last for weeks. The attack was able to succeed because it relied on well-resourced hackers who had built relationships and trust with their targets over a long period of time.

Jason Saayman, a specialist of the Axios project, revealed that the hackers started their activities about two weeks before the attack. This eventually led to attackers taking control of your computer and installing malicious code on it.

The hackers, believed to be from North Korea, posed as real companies, created a Slack workspace, and tried to boost their credibility with fake employee profiles. Saayman was then invited to a meeting where he was asked to download a necessary update – but it was actually malware, not an update.

Once your computer was infected, they gained remote access to it and distributed the infected Axios updates through it. The two malicious updates were withdrawn after about three hours, but during that time it was still able to reach thousands of devices.

https://hvg.hu/tudomany/20251007_eszak-korea-hackerek-penz-kriptovaluta-lopas-rekord

Attackers can scrape credentials, passwords and other data from the devices of the affected parties.

As TechCrunch points out, North Korea may have thousands of well-trained hackers; most of them work for the regime against their will.

If you want to know about similar things at other times, like it the Fbhtechinfo Facebook page.

Source link

Related Articles

Back to top button