• Hello and welcome! Register to enjoy full access and benefits:

    • Advertise in the Marketplace section for free.
    • Get more visibility with a signature link.
    • Company/website listings.
    • Ask & answer queries.
    • Much more...

    Register here or log in if you're already a member.

  • 🎉 WHV has crossed 56000 (56k) monthly views (unique) and 285135 clicks per month, as per Google Analytics! Thank you for your support! 🎉

North Korea-Backed Hackers Launch New Malware Cyberattack, Report Reveals

johny899

New Member
Content Writer
Messages
766
Reaction score
3
Points
23
Balance
$948.5USD
Now, let's discuss a bizarre occurrence in hacking. According to a new report, hackers affiliated with North Korea are utilizing a new form of malware to perform cyberattacks. Seriously, as along as this hacking scheme is happening, it sounds like it was taken from a spy thriller.

What Exactly Occurred?​

A South Korean security organization called Genians Security Center (GSC) identified that North Korean hackers - likely affiliated with Kimsuky or-group, also known as APT37 - began attacking persons' devices utilizing malware that surreptitiously loaded onto phones and computers.

The process generally worked like this:
  • The hackers shared fake apps over KakaoTalk, a commonly used messaging app.
  • Once the user downloaded the app, the malware would take over the user's device.
  • The malware could even pinpoint the user's geographical location with Google Maps and when the user was not home, the malware would reset the phone remotely to stop calls, texts, and alerts.
  • The malware also duplicated files, erased important files, and sometimes even used a user's webcam to see if anyone else was present.
Sounds unsettling, right? Just think about your phone secretly following your every movement — without you ever even knowing.

What Makes This Attack So Unsettling?​

1. It Attacks Phones AND PCs.

It's different than hacking your laptop or taking your password. These hackers hit smartphones and computers simultaneously. This would disclose your whole digital life — photos, messages, work files, etc.

2. It Uses Blended Tricks.

These hackers used some very interesting moves. Here are some of the notable moves:

• Attacking from the location: They attack your phone and computer after they know you are gone.

• Use of webcams: They used a webcam to ensure that you weren't present.

• Hiding the malware in programs: They hid malware in "stress relief" programs so that their targets would expose them.

Clearly this is not a novice hacker.

3. It can happen to anyone.

Ever clicked a link or downloaded an app because it just looked harmless? We all have. That is exactly what these hackers count on. So yes — it might be a regular user like you or me.

My Thoughts​

To be honest, this type of news makes me nervous — not because I am a dream target for hackers, but because attacks like this are getting smarter. I have already begun to do some of the following things to stay safe:
  • Update all devices on a regular basis.
  • Use strong passwords and two-step log in, if it is an option.
  • Never download random apps or click on weird links.
If a team of hackers backed by a nation state are able to accomplish this, the least we can do is be vigilant.

Final Words​

This is not just any old virus. This is an orchestrated cyber attack utilizing sophisticated tools. The attack is not all about stealing data — it's also about surveillance and control.

So, be smart, be up to date, and you may want to reconsider downloading that “fun” new app that promises to relieve stress — you may be stressed out even more!
 
Top