Uncover the malicious activities of the Tenacious Pungsan group. Learn how they target developers through name-squatting attacks on popular npm packages.
I can’t remember where but I remember reading US agencies use tools and methods to disguise their hacks by leaving the ‘fingerprints’ of adversary state groups from places like Russia and NK. Not saying that’s what happening here but I thought it was cool (and kinda scary).
I remain amazed at how the norks amassed so much hacking skill and yet more amazed that they are seemingly not able to disguise their exploits .
I can’t remember where but I remember reading US agencies use tools and methods to disguise their hacks by leaving the ‘fingerprints’ of adversary state groups from places like Russia and NK. Not saying that’s what happening here but I thought it was cool (and kinda scary).