----------------------------------------------------------------------------------
@MSGID: 2:467/888.188 673137a9
The Kimsuky (aka Springtail) advanced persistent threat (APT) group,
which is linked to North Korea`s Reconnaissance General Bureau (RGB),
has been observed deploying a Linux version of its GoBear backdoor as
part of a campaign targeting South Korean organizations. The backdoor,
codenamed Gomir, is "structurally almost identical to GoBear, with
extensive sharing of code
https://thehackernews.com/2024/05/kimsuky-apt-deploying-linux-backdoor.html
2024-05-17 14:16:00+05:30
________________________________
--- UA.HACKER - твiй помiчник у сферi кiбербезпеки | читай ще +SECURITY +UA.IT
* Origin: Читай нас за допомогою
http://winpoint.org (2:467/888.188)
SEEN-BY: 463/68 877 1331 467/4 888 5001/100
5005/49 5015/255 5019/40 5020/848
SEEN-BY: 5020/1042 4441 12000 5030/49 1081 5060/900
5061/133 5075/128
@PATH: 467/888 5020/1042 4441