₪ Welcome to Inviteshop.us trackers shop ₪

InviteShop - #To Buy , Trade , Sell Or Find Free Trackers Invites! Here you can buy private torrent tracker invites such as HDBits.org, Morethan.tv, PassThePopcorn, BroadcasTheNet , Art Of Misdirection ( AOM ) , BeyonHD , FSC , NZBs.in , Omgwtfnzbs , Karagarga , DB9 , GazelleGames , Thevault.click , Theoccult.click , Animebytes , MagicTorrents , SceneHD , TTG , Bibliotik , Redacted , Exigomusic , + more.

If you want to buy a tracker, you can see my contact information here:
Email: inviteshop52@gmail.com
My Discord: inviteshop. or inviteshop
Skype: https://join.skype.com/invite/BsB4uGwVTfPD
Skype Name: InviteShopStore
Telegram trackers shop: https://t.me/InviteShQp
Telegram Username: @InviteShQp

Check out my trackers store by clicking on the BIG SALE image.


The best payment mod we accept!

Or Register
https://join.skype.com/ExtraeOlbK0g Skype Name: InviteShopStore
Email: inviteshop52@gmail.com Telegram Username: @InviteShQp

North Korean Cyber Espionage Campaign Targets Energy and Aerospace Sectors with Sophisticated MISTPEN Malware

Pirrico

Registered User
Posts
70
Posts Power
70.0%
Liked
16
Joined
Sep 17, 2024
North Korean hackers, linked to the notorious Lazarus Group, have launched a sophisticated cyber-espionage campaign targeting energy and aerospace industries. The operation, tracked by Mandiant as UNC2970, employs job-themed phishing lures to infiltrate organizations across multiple countries, including the U.S., U.K., and Australia. The attackers pose as recruiters from prominent companies, tailoring job descriptions to attract senior-level employees with access to sensitive information.

The attack, dubbed "Operation Dream Job," begins with spear-phishing emails and WhatsApp messages to build trust with potential victims. The hackers then send a malicious ZIP archive containing a trojanized version of the Sumatra PDF reader. When victims attempt to open the job description PDF using this compromised software, it triggers the installation of a new backdoor called MISTPEN.

MISTPEN is a sophisticated malware that leverages a legitimate Notepad++ plugin as a disguise. It's deployed through a multi-stage process involving a launcher named BURNBOOK and a loader called TEARPAGE. Once installed, MISTPEN can download and execute additional malicious payloads from a command-and-control server, using Microsoft Graph URLs for communication.

Mandiant's analysis reveals that the UNC2970 group has been continuously improving their malware arsenal. Older versions of BURNBOOK and MISTPEN have been discovered, indicating an ongoing effort to enhance capabilities and evade detection. The researchers noted that the threat actors have added new features and implemented network connectivity checks to hinder analysis attempts. This campaign underscores the persistent and evolving nature of North Korean cyber operations targeting critical industries worldwide.
 
Top Bottom