{"id":391,"date":"2024-03-24T06:53:57","date_gmt":"2024-03-24T06:53:57","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/03\/24\/n-korea-linked-kimsuky-shifts-to-compiled-html-help-files-in-ongoing-cyberattacks\/"},"modified":"2024-03-24T06:53:57","modified_gmt":"2024-03-24T06:53:57","slug":"n-korea-linked-kimsuky-shifts-to-compiled-html-help-files-in-ongoing-cyberattacks","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/03\/24\/n-korea-linked-kimsuky-shifts-to-compiled-html-help-files-in-ongoing-cyberattacks\/","title":{"rendered":"N. Korea-linked Kimsuky Shifts to Compiled HTML Help Files in Ongoing Cyberattacks"},"content":{"rendered":"<p>\u200bThe North Korea-linked threat actor known as\u00a0Kimsuky\u00a0(aka Black Banshee, Emerald Sleet, or Springtail) has been observed shifting its tactics, leveraging Compiled HTML Help (CHM) files as vectors to deliver malware for harvesting sensitive data.<br \/>\nKimsuky, active since at least 2012, is known to target entities located in South Korea as well as North America, Asia, and Europe.<br \/>\nAccording\u00a0The North Korea-linked threat actor known as\u00a0Kimsuky\u00a0(aka Black Banshee, Emerald Sleet, or Springtail) has been observed shifting its tactics, leveraging Compiled HTML Help (CHM) files as vectors to deliver malware for harvesting sensitive data.<br \/>\nKimsuky, active since at least 2012, is known to target entities located in South Korea as well as North America, Asia, and Europe.<br \/>\nAccording\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThe North Korea-linked threat actor known as\u00a0Kimsuky\u00a0(aka Black Banshee, Emerald Sleet, or Springtail) has been observed shifting its tactics, leveraging Compiled HTML Help (CHM) files as vectors to deliver malware for harvesting sensitive data. Kimsuky, active since at least 2012, is known to target entities located in South Korea as well as North America, Asia,&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/03\/24\/n-korea-linked-kimsuky-shifts-to-compiled-html-help-files-in-ongoing-cyberattacks\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">N. Korea-linked Kimsuky Shifts to Compiled HTML Help Files in Ongoing Cyberattacks<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":392,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/391"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=391"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/391\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/392"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=391"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=391"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}