North Korean-linked threat actors, identified as Kimsuky (APT43), have been observed using two new malware strains, KLogEXE and FPSpy, as part of their spear-phishing campaigns. Also known by various aliases, including Sparkling Pisces and Velvet Chollima, Kimsuky has been active since at least 2012, earning a reputation for its effective spear-phishing techniques. The malware strains were discovered by Palo Alto Networks' Unit 42 researchers, who revealed that KLogEXE is a C++ variant of a keylogger previously known as InfoKey. KLogEXE is capable of tracking keystrokes, monitoring running applications, and logging mouse clicks. Meanwhile, FPSpy, linked to earlier malware variants, functions as a backdoor designed to gather system information, execute arbitrary commands, and enumerate files and folders on compromised machines. Both malware variants are delivered through spear-phishing emails, often accompanied by a ZIP file containing malicious payloads. The targets of this campaign are primarily organizations in Japan and South Korea. Despite the group's broad reach, this particular operation is highly targeted, with a focus on select industries and regions. Unit 42's analysis found similarities in the source code of KLogEXE and FPSpy, indicating that both malware strains likely originate from the same developer.
Excessive CPU and memory usage in Google Chrome has become a common issue, often caused by malicious or poorly designed browser extensions. Some extensions are built with hidden mo...
Cybersecurity researchers have identified a new variant of the GlassWorm campaign that targets developers through a malicious Open VSX extension named “specstudio.code-wakatime-a...
A recently disclosed flaw in the widely used Android library EngageSDK has created significant concern within the cryptocurrency space, as it may have exposed millions of users to ...