Tag Archive for: threat analysis

Activity of Hacking Group Targeted Financial Industry in 2023 (ENG)

This document describes the results of analyzing the hacking activities of groups targeting the financial sector, conducted by the ThreatRecon Team during 2023.

Activity of Hacking Group Targeted Financial Industry in 2023 (KOR)

이 문서는 2023년 금융 산업군 대상의 해킹 그룹들의 해킹 활동 정보를 ThreatRecon Team에서 분석한 결과를 포함하고 있다.

2023 The First Half Activities Summary of Ransomware Threat Actors (JPN)

NSHCの脅威解析研究所(Threat Research Lab)は、2023年の上半期にランサムウェア(Ransomware)を使ったハッキンググループのハッキング活動情報を分析した。

2023 The First Half Activities Summary of Ransomware Threat Actors (ENG)

This document describes the results of analyzing hacking activity information of hacking groups using ransomware by ThreatRecon Team during the first half of 2023.

2023 The First Half Activities Summary of Ransomware Threat Actors (KOR)

본 보고서에서는 2023년 상반기 동안ThreatRecon Team에서 분석한 랜섬웨어를 이용한 해킹 그룹들의 해킹 활동 정보를 분석한 결과를 포함하고 있다.

Phishing Attack Activities: Threat Actors in Sheep’s Clothing (ENG)

This report includes the analysis of the status of phishing attacks by the SectorA group analyzed by the ThreatRecon team in 2022.

Phishing Attack Activities: Threat Actors in Sheep’s Clothing (KOR)

본 보고서에서는 2022년 한 해 동안ThreatRecon Team에서 분석한 SectorA 그룹들의 피싱 공격 현황을 분석한 결과를 포함하고 있다.

Threat Actor targeting Vulnerable Links in Cyber Security (ENG)

This report presents the explanation to the vulnerabilities exploited by threat actors in 2022 for various purposes, as well as an analysis to the type of software exploited and how such vulnerabilities were utilized in each stage of cyberattack.

Threat Actor targeting Vulnerable Links in Cyber Security (KOR)

본 보고서에서는 2022년 한 해 동안 다양한 목적의 해킹 그룹들이 악용한 취약점에 대한 설명과 악용한 소프트웨어의 유형, 공격 단계에서 해당 취약점들을 어떻게 활용하였는지 분석한 결과를 포함하고 있다.

Threat Actor targeted attack against Finance and Investment industry (ENG)

In this report, we identify the activities the document type malware used against finance and investment industries for over at least a year and the characteristics of the hacking activities