Common Information
Type Value
Value
APT43
Category Actor
Type Threat-Actor
Misp Type Cluster
Description • APT43 is a prolific cyber operator that supports the interests of the North Korean regime. The group combines moderately-sophisticated technical capabilities with aggressive social engineering tactics, especially against South Korean and U.S.-based government organizations, academics, and think tanks focused on Korean peninsula geopolitical issues. • In addition to its espionage campaigns, we believe APT43 funds itself through cybercrime operations to support its primary mission of collecting strategic intelligence. • The group creates numerous spoofed and fraudulent personas for use in social engineering, as well as cover identities for purchasing operational tooling and infrastructure. • APT43 has collaborated with other North Korean espionage operators on multiple operations, underscoring the major role APT43 plays in the regime’s cyber apparatus.
Details Published Attributes CTI Title
Details Website 2023-06-02 1 US, South Korea Detail North Korea's Social Engineering Techniques
Details Website 2023-05-15 15 Permhash — No Curls Necessary | Mandiant
Details Website 2023-05-13 3 Newly exposed APT43 hacking group targeting US orgs since 2018
Details Website 2023-05-12 4 กลุ่ม APT เจาะระบบโรงพยาบาลมหาวิทยาลัยแห่งชาติโซล
Details Website 2023-05-09 1 North Korean-backed APT group Kimsuky evolves reconnaissance capabilities in recent global campaign
Details Website 2023-05-05 1 N. Korean Kimsuky Hackers Using New Recon Tool ReconShark in Latest Cyberattacks
Details Website 2023-05-05 1 N. Korean Kimsuky Hackers Using New Recon Tool ReconShark in Latest Cyberattacks - RedPacket Security
Details Website 2023-05-05 2 Kimsuky hackers use new recon tool to find security gaps - RedPacket Security
Details Website 2023-05-02 2 South Korean Lures Used to Deploy ROKRAT Malware
Details Website 2023-05-01 84 Chain Reaction: ROKRAT’s Missing Link - Check Point Research
Details Website 2023-04-25 2 Lazarus Subgroup Targeting Apple Devices with New RustBucket macOS Malware
Details Website 2023-04-25 54 Anomali Cyber Watch: Two Supply-Chain Attacks Chained Together, Decoy Dog Stealthy DNS Communication, EvilExtractor Exfiltrates to FTP Server
Details Website 2023-04-22 4 Critical infrastructure also hit by supply chain attack behind 3CX breach - RedPacket Security
Details Website 2023-04-22 89 Bluepurple Pulse: week ending April 23rd
Details Website 2023-04-21 2 North Korea's Kimsuky APT Keeps Growing, Despite Public Outing
Details Website 2023-04-21 3 This Week In Security: Spandex Tempest, Supply Chain Chain, And NTP
Details Website 2023-04-21 4 3CX hack caused by trading software supply chain attack - RedPacket Security
Details Website 2023-04-21 4 Critical infrastructure also hit by supply chain attack behind 3CX breach
Details Website 2023-04-20 7 APT43: An investigation into the North Korean group’s cybercrime operations
Details Website 2023-04-20 72 3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible | Mandiant
Details Website 2023-04-20 59 每周高级威胁情报解读(2023.04.20~04.27)
Details Website 2023-04-20 7 APT43: An investigation into the North Korean group's cybercrime operations | Antivirus and Security news
Details Website 2023-04-18 5 Mandiant 2023 M-Trends Report Provides Factual Analysis of Emerging Threat Trends
Details Website 2023-04-09 2 APT43: Cyberespionage Group Targets Strategic Intelligence | IT Security News
Details Website 2023-04-08 9 Symfony Station Communiqué — 07 April 2023.