home.social

#southkorea — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #southkorea, aggregated by home.social.

  1. Disclosing new PebbleDash-based tools

    Kaspersky researchers conducted an in-depth analysis of Kimsuky APT activity, revealing tactical shifts and new malware variants based on the PebbleDash platform. The group introduced HelloDoor, a Rust-based backdoor, httpMalice leveraging HTTP and Dropbox communications, and updated MemLoad and httpTroy variants. Kimsuky maintains persistence through legitimate tools including VSCode Tunneling with GitHub authentication and DWAgent remote management software. Initial access occurs via spear-phishing with malicious attachments disguised as documents. The group primarily targets South Korean entities across government and defense sectors, with additional PebbleDash attacks observed in Brazil and Germany. Infrastructure relies on free South Korean hosting services and tunneling services like Cloudflare Quick Tunnels and Ngrok. Both PebbleDash and AppleSeed malware clusters demonstrate ongoing development with shared distribution methods, stolen certificates, and overlapping targets, indicating single-actor c...

    Pulse ID: 6a05af0979e3cc1214a50d4e
    Pulse Link: otx.alienvault.com/pulse/6a05a
    Pulse Author: AlienVault
    Created: 2026-05-14 11:16:25

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AppleSeed #BackDoor #Brazil #Cloud #CyberSecurity #Dropbox #Germany #GitHub #Government #HTTP #InfoSec #Kaspersky #Kimsuky #Korea #Malware #OTX #OpenThreatExchange #Phishing #RAT #Rust #SouthKorea #SpearPhishing #UK #bot #AlienVault

  2. By the End of the Decade Poland Will Have 1,100 Main Battle Tanks — More Than Italy, France, Germany, and the UK Combined

    Poland’s Bumar-Łabędy, a state-owned defense firm, signed an agreement with South Korea’s Hyundai Rotem for the production of…
    #Poland #Polska #PL #Europe #Europa #EU #Defense #K2 #K2BlackPanther #M1Abrams #Military #NATO #SouthKorea
    europesays.com/poland/6535/

  3. ⚡The #US 🇺🇸 Senate is scheduled to hold a confirmation hearing for its ambassador nominee to #SouthKorea 🇰🇷 next week. [Yonhap]

    Follow for the latest developments

  4. ⚡The #US 🇺🇸 Senate is scheduled to hold a confirmation hearing for its ambassador nominee to #SouthKorea 🇰🇷 next week. [Yonhap]

    Follow for the latest developments

  5. ⚡The #US 🇺🇸 Senate is scheduled to hold a confirmation hearing for its ambassador nominee to #SouthKorea 🇰🇷 next week. [Yonhap]

    Follow for the latest developments

  6. alojapan.com/1486294/japanese- Japanese Prime Minister to visit South Korea next week #ACSA #Japan #LeeJaeMyung #SanaeTakaichi #ShuttleDiplomacy #SouthKorea #us #VisitJapan Tokyo, May 14 (IANS) Japanese Prime Minister Sanae Takaichi will undertake a two-day visit to South Korea starting May 19, Japan’s Deputy Chief Cabinet Secretary Masanao Ozaki said on Thursday. Masanao Ozaki notified a board meeting of the House of Representatives’ steering committee of the trip’s itine

  7. alojapan.com/1486294/japanese- Japanese Prime Minister to visit South Korea next week #ACSA #Japan #LeeJaeMyung #SanaeTakaichi #ShuttleDiplomacy #SouthKorea #us #VisitJapan Tokyo, May 14 (IANS) Japanese Prime Minister Sanae Takaichi will undertake a two-day visit to South Korea starting May 19, Japan’s Deputy Chief Cabinet Secretary Masanao Ozaki said on Thursday. Masanao Ozaki notified a board meeting of the House of Representatives’ steering committee of the trip’s itine

  8. alojapan.com/1486266/japan-pm- Japan PM Sanae Takaichi to Visit South Korea: What Are the Agendas? #Japan #LeeJaeMyung #SanaeTakaichi #SouthKorea #VisitJapan TEMPO.CO, Jakarta – Japanese Prime Minister Sanae Takaichi is scheduled for a two-day visit to South Korea starting May 19 to meet with the country’s President Lee Jae Myung, according to a Japanese government notification to parliament, Kyodo reported as quoted by Antara. Japanese Deputy Chief Cabinet Secretary Masan

  9. alojapan.com/1486266/japan-pm- Japan PM Sanae Takaichi to Visit South Korea: What Are the Agendas? #Japan #LeeJaeMyung #SanaeTakaichi #SouthKorea #VisitJapan TEMPO.CO, Jakarta – Japanese Prime Minister Sanae Takaichi is scheduled for a two-day visit to South Korea starting May 19 to meet with the country’s President Lee Jae Myung, according to a Japanese government notification to parliament, Kyodo reported as quoted by Antara. Japanese Deputy Chief Cabinet Secretary Masan

  10. [Today’s New Product] “Denmark Milk” Made with 100% Grade 1A Raw Milk from Dedicated Farms

    Over 60 Dedicated Farms Managed by Professional Veterinarians Four-Stage, 14-Criteria Quality Inspections from Farm to Production On May…
    #Denmark #Danmark #DK #Europe #Europa #EU #denmark #economic #issue #korea #News #newspaper #Politics #society #southkorea #TheAsiaBusinessDaily
    europesays.com/2988135/

  11. Threatened Samsung strike poses significant risk to South Korea growth, Finance Minister says

    SEOUL, May 14 (Reuters) – A threatened ‌strike by ‌Samsung Electronics’ union ​would be a significant risk to…
    #Conflict #Conflicts #War #Economicgrowth #financeminister #KooYun-cheol #northkorea #SamsungElectronics #southkorea #strike
    europesays.com/2987817/

  12. Korea Times: Local map platforms rush upgrades as Google Maps eyes expansion. “Local map platform operators are racing to overhaul their services as Google prepares to expand its mapping services in Korea, setting the stage for a renewed clash between global big tech and entrenched local players. The shift follows the government’s conditional approval in February allowing Google to access […]

    https://rbfirehose.com/2026/05/13/korea-times-local-map-platforms-rush-upgrades-as-google-maps-eyes-expansion/
  13. South Korea is reviewing a phased contribution to efforts to ensure safe navigation through the Strait of ​Hormuz, Defense Minister Ahn Gyu-back said, signaling support just short of military participation. japantimes.co.jp/news/2026/05/ #asiapacific #politics #southkorea #straitofhormuz #defense #ahngyuback #us #iran

  14. Iran-Linked Hackers Breached Korean Electronics Maker in Global Spying Campaign

    Iranian state-sponsored threat group Seedworm conducted a widespread espionage campaign in early 2026, compromising at least nine organizations across nine countries on four continents. Victims included a major South Korean electronics manufacturer, government agencies, an international airport in the Middle East, Southeast Asian industrial manufacturers, a Latin American financial services provider, and educational institutions. The attackers utilized DLL sideloading techniques with legitimately signed Fortemedia and SentinelOne binaries to execute malicious payloads, deployed Node.js-based implants for orchestration, and employed multiple PowerShell scripts for reconnaissance, credential theft, and privilege escalation. Data exfiltration was conducted through public file-transfer service sendit.sh to blend malicious traffic with legitimate cloud services. The campaign demonstrates Seedworm's evolved tradecraft and expanded targeting beyond traditional Middle Eastern focus areas.

    Pulse ID: 6a033220a0063c7c2a4f1d8f
    Pulse Link: otx.alienvault.com/pulse/6a033
    Pulse Author: AlienVault
    Created: 2026-05-12 13:58:56

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Asia #Cloud #CyberSecurity #Education #Espionage #Government #ICS #InfoSec #Iran #Korea #LatinAmerica #MiddleEast #Nodejs #OTX #OpenThreatExchange #PowerShell #RAT #SeedWorm #SentinelOne #SideLoading #SouthKorea #Worm #bot #AlienVault

  15. Iran-Linked Hackers Breached Korean Electronics Maker in Global Spying Campaign

    Iranian state-sponsored threat group Seedworm conducted a widespread espionage campaign in early 2026, compromising at least nine organizations across nine countries on four continents. Victims included a major South Korean electronics manufacturer, government agencies, an international airport in the Middle East, Southeast Asian industrial manufacturers, a Latin American financial services provider, and educational institutions. The attackers utilized DLL sideloading techniques with legitimately signed Fortemedia and SentinelOne binaries to execute malicious payloads, deployed Node.js-based implants for orchestration, and employed multiple PowerShell scripts for reconnaissance, credential theft, and privilege escalation. Data exfiltration was conducted through public file-transfer service sendit.sh to blend malicious traffic with legitimate cloud services. The campaign demonstrates Seedworm's evolved tradecraft and expanded targeting beyond traditional Middle Eastern focus areas.

    Pulse ID: 6a033220a0063c7c2a4f1d8f
    Pulse Link: otx.alienvault.com/pulse/6a033
    Pulse Author: AlienVault
    Created: 2026-05-12 13:58:56

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Asia #Cloud #CyberSecurity #Education #Espionage #Government #ICS #InfoSec #Iran #Korea #LatinAmerica #MiddleEast #Nodejs #OTX #OpenThreatExchange #PowerShell #RAT #SeedWorm #SentinelOne #SideLoading #SouthKorea #Worm #bot #AlienVault

  16. Iran-Linked Hackers Breached Korean Electronics Maker in Global Spying Campaign

    Iranian state-sponsored threat group Seedworm conducted a widespread espionage campaign in early 2026, compromising at least nine organizations across nine countries on four continents. Victims included a major South Korean electronics manufacturer, government agencies, an international airport in the Middle East, Southeast Asian industrial manufacturers, a Latin American financial services provider, and educational institutions. The attackers utilized DLL sideloading techniques with legitimately signed Fortemedia and SentinelOne binaries to execute malicious payloads, deployed Node.js-based implants for orchestration, and employed multiple PowerShell scripts for reconnaissance, credential theft, and privilege escalation. Data exfiltration was conducted through public file-transfer service sendit.sh to blend malicious traffic with legitimate cloud services. The campaign demonstrates Seedworm's evolved tradecraft and expanded targeting beyond traditional Middle Eastern focus areas.

    Pulse ID: 6a033220a0063c7c2a4f1d8f
    Pulse Link: otx.alienvault.com/pulse/6a033
    Pulse Author: AlienVault
    Created: 2026-05-12 13:58:56

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Asia #Cloud #CyberSecurity #Education #Espionage #Government #ICS #InfoSec #Iran #Korea #LatinAmerica #MiddleEast #Nodejs #OTX #OpenThreatExchange #PowerShell #RAT #SeedWorm #SentinelOne #SideLoading #SouthKorea #Worm #bot #AlienVault

  17. Iran-Linked Hackers Breached Korean Electronics Maker in Global Spying Campaign

    Iranian state-sponsored threat group Seedworm conducted a widespread espionage campaign in early 2026, compromising at least nine organizations across nine countries on four continents. Victims included a major South Korean electronics manufacturer, government agencies, an international airport in the Middle East, Southeast Asian industrial manufacturers, a Latin American financial services provider, and educational institutions. The attackers utilized DLL sideloading techniques with legitimately signed Fortemedia and SentinelOne binaries to execute malicious payloads, deployed Node.js-based implants for orchestration, and employed multiple PowerShell scripts for reconnaissance, credential theft, and privilege escalation. Data exfiltration was conducted through public file-transfer service sendit.sh to blend malicious traffic with legitimate cloud services. The campaign demonstrates Seedworm's evolved tradecraft and expanded targeting beyond traditional Middle Eastern focus areas.

    Pulse ID: 6a033220a0063c7c2a4f1d8f
    Pulse Link: otx.alienvault.com/pulse/6a033
    Pulse Author: AlienVault
    Created: 2026-05-12 13:58:56

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Asia #Cloud #CyberSecurity #Education #Espionage #Government #ICS #InfoSec #Iran #Korea #LatinAmerica #MiddleEast #Nodejs #OTX #OpenThreatExchange #PowerShell #RAT #SeedWorm #SentinelOne #SideLoading #SouthKorea #Worm #bot #AlienVault

  18. Iran-Linked Hackers Breached Korean Electronics Maker in Global Spying Campaign

    Iranian state-sponsored threat group Seedworm conducted a widespread espionage campaign in early 2026, compromising at least nine organizations across nine countries on four continents. Victims included a major South Korean electronics manufacturer, government agencies, an international airport in the Middle East, Southeast Asian industrial manufacturers, a Latin American financial services provider, and educational institutions. The attackers utilized DLL sideloading techniques with legitimately signed Fortemedia and SentinelOne binaries to execute malicious payloads, deployed Node.js-based implants for orchestration, and employed multiple PowerShell scripts for reconnaissance, credential theft, and privilege escalation. Data exfiltration was conducted through public file-transfer service sendit.sh to blend malicious traffic with legitimate cloud services. The campaign demonstrates Seedworm's evolved tradecraft and expanded targeting beyond traditional Middle Eastern focus areas.

    Pulse ID: 6a033220a0063c7c2a4f1d8f
    Pulse Link: otx.alienvault.com/pulse/6a033
    Pulse Author: AlienVault
    Created: 2026-05-12 13:58:56

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Asia #Cloud #CyberSecurity #Education #Espionage #Government #ICS #InfoSec #Iran #Korea #LatinAmerica #MiddleEast #Nodejs #OTX #OpenThreatExchange #PowerShell #RAT #SeedWorm #SentinelOne #SideLoading #SouthKorea #Worm #bot #AlienVault

  19. Tracking down #druglord Thapanan
    "Aft evading arrest for 14yrs despite facing >60 o/s warrants, T was arrested in Seoul April 6 foll'g a jt investigation involv'g auths fr #Thailand, #Laos, #Japan & #SouthKorea.. Police reckon 25-30% of #narcotics entering 🇹🇭 may hv passed thru T's network. Auths believe the network was capable of ss'g p.a. >100 million meth pills, as well as >5 tonnes each of crystal meth, heroin & ketamine.. Aft fleeing🇹🇭, T settled in Tachileik, Myanmar"
    bangkokpost.com/thailand/speci

  20. has signed an agreement to buy three more multiple rocket launchers from Hanwha Aerospace of . Earlier, Estonia procured six systems from the company for EUR 290mn.

    viabaltica.fi/estonia-more-roc

  21. #Estonia has signed an agreement to buy three more #Chunmoo multiple rocket launchers from Hanwha Aerospace of #SouthKorea. Earlier, Estonia procured six #MLRS systems from the company for EUR 290mn.

    viabaltica.fi/estonia-more-roc

  22. #Estonia has signed an agreement to buy three more #Chunmoo multiple rocket launchers from Hanwha Aerospace of #SouthKorea. Earlier, Estonia procured six #MLRS systems from the company for EUR 290mn.

    viabaltica.fi/estonia-more-roc

  23. #Estonia has signed an agreement to buy three more #Chunmoo multiple rocket launchers from Hanwha Aerospace of #SouthKorea. Earlier, Estonia procured six #MLRS systems from the company for EUR 290mn.

    viabaltica.fi/estonia-more-roc