@aptwhatnow.bsky.social
52 followers 30 following 16 posts
Posts Media Videos Starter Packs
Reposted
metacurity.com
Look at this nifty DPRK org chart that cybersecurity company DTEX produced.
aptwhatnow.bsky.social
Many many folks in this effort over the years. Thankful for everyone and hope its of use.
aptwhatnow.bsky.social
Additionally QR codes as a phishing vector are in use by the group. A tactic that I feel may be a lil too techy for the clientele they seem to love picking on. Whether embedded in a doc or inline in the email, they seem to be testing this idea.
aptwhatnow.bsky.social
In typical fashion their immediate concern for the APT is to get them off of the main channels, opting for side chats or excuses like "I have issues with email and service in the building, can reach me on Whatsapp" etc.
aptwhatnow.bsky.social
APT43 activity with multiple European embassies being spoofed and likely targeted. Rapport building themes and lures center around DPRK Human Rights and reactions to DPRKs official stance on NK troops in Russia cc @jennytown.bsky.social @elias.foxhold.net @garyfreasbysm.bsky.social
Reposted
nicastronaut.bsky.social
Psssst if your CTI vendor assessed "Lazarus group" as a priority threat actor for you, it's time to get a new CTI vendor.
aptwhatnow.bsky.social
Much like their APT45 homies at times, DPRK ITW searching out regime priorities. Our goon's collect, Keygen, after analysis shows in 2024. Drone-UAV-Defense-Countermeasure Intelligence with ties to a certain DPRK College. 👀
Reposted
markkarayan.bsky.social
North Korean threat groups right now