North Korean-Linked Hackers Target South Korean Defense Entities
The Kimsuky group, a hacking unit believed by Seoul to be backed by the North Korean government, attempted a spear-phishing operation on a military-affiliated organization in July, a news agency reported, referencing findings from the Genians Security Center (GSC).
Spear phishing is a deceptive tactic that involves sending emails from trusted sources to extract sensitive information.
The GSC report explained that the attackers dispatched an email containing malicious code, disguised as communication about ID issuance for military-related personnel.
The ID card image employed in the attack is thought to have been created using a generative AI model.
Ordinarily, AI platforms, including ChatGPT, refuse requests to produce copies of military identification, citing legal protections on government-issued documents.
Despite this, the hackers seemingly circumvented safeguards by asking for mock-ups or sample designs framed as "legitimate" requests, instead of directly duplicating real IDs.
The report also noted that incidents like this underscore Pyongyang's "growing attempts to exploit AI services for increasingly sophisticated malicious activities."
Legal Disclaimer:
MENAFN provides the
information “as is” without warranty of any kind. We do not accept
any responsibility or liability for the accuracy, content, images,
videos, licenses, completeness, legality, or reliability of the information
contained in this article. If you have any complaints or copyright
issues related to this article, kindly contact the provider above.
Legal Disclaimer:
EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.
