Today > | 7 High | 28 Medium | 8 Low vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
The report analyzes the covert cyber reconnaissance activities of the state-sponsored APT37 group targeting South Korea. The group uses spear-phishing emails with malicious LNK files to deploy the RoKRAT malware, collecting sensitive information from victims' devices. The attackers employ various t…