Too Long; Didn't Read
Google published details of a campaign targeting security researchers attributed by them to “a government-backed entity based in North Korea” Google described the attack as using a “novel social engineering method” The successful use of these techniques against eminent security researchers shows how competent and manipulative the attackers responsible are. North Korea has long obfuscated its malicious online activity through both technical measures and outposts. North Korean computer scientists are able to use Western webmail services like Outlook and Gmail whilst their hackers are. able to manipulate and exploit eminent security. researchers on social networks like Twitter.