ThreatCluster
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

Chollima APT Group Targets Job Seekers and Organizations with JavaScript-Based Malware

Threat Score:
56
GB Hackers
4 days ago
Part of cluster #1633

Overview

Chollima APT Group Targets Job Seekers and Organizations with JavaScript-Based Malware The North Korean-linked Chollima advanced persistent threat (APT) group, also known as Famous Chollima, has been orchestrating a persistent cyber espionage campaign since at least December 2022, primarily targeting job seekers in the software development and IT sectors to infiltrate a wide array of United States-based organizations. This operation leverages intricate social engineering techniques, where attack...

Continue Reading on Original Site

Related Articles

5 articles
1
Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Brighttalk • 23 hours ago

Presented by Jitin Shabadu, Forrester Analyst | Jayce Nichols, Director, Intelligence Solutions, Google Threat Intelligence Group

Score
83
Read more
2
Multiple Zero-Day Exploits Discover That Bypass BitLocker, Exposing All Encrypted Data

Multiple Zero-Day Exploits Discover That Bypass BitLocker, Exposing All Encrypted Data

GB Hackers • 3 hours ago

Multiple Zero-Day Exploits Discover That Bypass BitLocker, Exposing All Encrypted Data Microsoft security researchers have uncovered four critical vulnerabilities inWindows BitLockerthat could allow attackers with physical access to bypass the encryption system and extract sensitive data. The findings, revealed in research dubbed “BitUnlocker,” demonstrate sophisticated attack methods targeting the Windows Recovery Environment (WinRE) to circumvent Microsoft’s flagship data protection technology

Score
82
Read more
3

CastleBot MaaS Released Diverse Payloads in Coordinated Mass Ransomware Attacks

GB Hackers • 7 hours ago

CastleBot MaaS Released Diverse Payloads in Coordinated Mass Ransomware Attacks IBM X-Force has uncovered CastleBot, a nascent malware framework operating as a Malware-as-a-Service (MaaS) platform, enabling cybercriminals to deploy a spectrum of payloads ranging from infostealers to sophisticated backdoors implicated in ransomware operations. First detected in early 2025 with heightened activity since May, CastleBot facilitates the delivery of threats likeNetSupportand WarmCookie, which have his

Score
79
Read more
4

Over 28,000 Microsoft Exchange Servers Exposed Online to CVE-2025-53786 Vulnerability

GB Hackers • 4 hours ago

Over 28,000 Microsoft Exchange Servers Exposed Online to CVE-2025-53786 Vulnerability The cybersecurity community faces a significant threat as scanning data reveals over 28,000 unpatched Microsoft Exchange servers remain exposed on the public internet, vulnerable to a critical security flaw designatedCVE-2025-53786. This high-severity vulnerability, which carries a CVSS score of 8.0 out of 10, enables attackers with administrative access to on-premises Exchange servers to escalate privileges wi

Score
78
Read more
5

Critical Linux Kernel Vulnerability Allows Attackers Gain Full Kernel-Level Control From Chrome Sandbox

GB Hackers • 4 hours ago

Critical Linux Kernel Vulnerability Allows Attackers Gain Full Kernel-Level Control From Chrome Sandbox August 9, 2025: A severe security vulnerability in the Linux kernel, dubbed CVE-2025-38236, has been uncovered by Google Project Zero researcher Jann Horn, exposing a pathway for attackers ranging from native code execution within the Chrome renderer sandbox to full kernel-level control on Linux systems. The flaw, tied to the obscure MSG_OOB feature in UNIX domain sockets, affects Linux kernel

Score
78
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

DOMAINS
Cisco.com
ATTACK TYPES
Advanced Persistent Threat
Credential Theft
Cryptocurrency Theft
Data Exfiltration
Phishing
INDUSTRIES
Education
Information Technology
Software Development
COUNTRIES
North Korea
United States
VULNERABILITIES
DDoS
DoS
COMPANIES
AMD
Adobe
Amazon
Apple
Cisco
SECURITY VENDORS
Cloudflare
PLATFORMS
AWS
Android
Apache
Azure
IIS
APT GROUPS
Chollima
Operation C-Major
WageMole
RANSOMWARE
AnDROid
Korean
Python
Zlader
MITRE ATT&CK
Phishing
T1053
T1059
T1105
T1190
MALWARE
Dark
InvisibleFerret
DOMAINS
Cisco.com
ARTICLE INFORMATION
Article #8780
Published 4 days ago
GB Hackers

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration