A rare data dump has provided insight into Kimsuky's operations, revealing novel tactics and expanded targeting, with a primary goal of credential harvesting and system persistence. The group employs advanced techniques, including interactive malware development and AiTM phishing, to establish deep system persistence.
Latest mentioned: 09-08
Earliest mentioned: 09-05