DPRK-Related Campaigns with LNK and GitHub C2

Analysis of DPRK-linked LNK-based attacks using GitHub as covert C2 infrastructure, detailing multi-stage PowerShell execution, persistence mechanisms, and data exfiltration techniques targeting Windows environments.

      

This article has been indexed from FortiGuard Labs Threat Research

Read the original article: