Uncover the malicious activities of the Tenacious Pungsan group. Learn how they target developers through name-squatting attacks on popular npm packages.
I can’t remember where but I remember reading US agencies use tools and methods to disguise their hacks by leaving the ‘fingerprints’ of adversary state groups from places like Russia and NK. Not saying that’s what happening here but I thought it was cool (and kinda scary).
I can’t remember where but I remember reading US agencies use tools and methods to disguise their hacks by leaving the ‘fingerprints’ of adversary state groups from places like Russia and NK. Not saying that’s what happening here but I thought it was cool (and kinda scary).