Linked to North Korean fake job-recruitment campaigns, the poisoned repositories are aimed at establishing persistent C2 ...
The security researchers from Zscaler ThreatLabz have also discovered five new tools deployed by the North Korean hacking ...