Did you like this?
friends and colleagues.
Security Week, By Mike Lennon
The campaign, named “Kimsuky” by Kaspersky researchers, is extremely limited and highly targeted, and has only gone after 11 organizations in South Korea and two organizations in China.
Targets identified by Kaspersky include Sejong Institute (China), Korea Institute For Defense Analyses (KIDA), South Korea's Ministry of Unification, Hyundai Merchant Marine and The supporters of Korean Unification.
According to Kaspersky Lab, the first signs of the attacker’s activity date back to April 3 of this year, with the first samples of the Kimsuky Trojan (Trojan.Win32.Kimsuky) surfacing on May 5. Read more.
Related Business News Articles
Kaspersky Lab announced today that its Anti-Targeted Attack Platform flagged an unusual feature in a client’s network, which led the company’s researchers to discover a nation-state threat actor that was targeting state organizations.Learn more >
Kaspersky Lab North America announced today that CRN, a brand of The Channel Company, has named Leslie Bois, Vice President, Channel Sales, to its 2016 list of Top 100 Executives.Learn more >
A new technology to reveal malicious files that can be hidden from the detection of security software products.Learn more >