TLDR
Google published details of a campaign targeting security researchers attributed by them to “a government-backed entity based in North Korea” Google described the attack as using a “novel social engineering method” The successful use of these techniques against eminent security researchers shows how competent and manipulative the attackers responsible are. North Korea has long obfuscated its malicious online activity through both technical measures and outposts. North Korean computer scientists are able to use Western webmail services like Outlook and Gmail whilst their hackers are. able to manipulate and exploit eminent security. researchers on social networks like Twitter.via the TL;DR App
no story
Written by icyapril | Software engineering manager, author and computer scientist.