Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-11-16AhnLabAhnLab ASEC Analysis Team
@techreport{team:20211116:kimsuky:77a82f6, author = {AhnLab ASEC Analysis Team}, title = {{Kimsuky 그룹의 APT 공격 분석 보고서 (AppleSeed, PebbleDash)}}, date = {2021-11-16}, institution = {AhnLab}, url = {https://asec.ahnlab.com/wp-content/uploads/2021/11/Kimsuky-%EA%B7%B8%EB%A3%B9%EC%9D%98-APT-%EA%B3%B5%EA%B2%A9-%EB%B6%84%EC%84%9D-%EB%B3%B4%EA%B3%A0%EC%84%9C-AppleSeed-PebbleDash.pdf}, language = {English}, urldate = {2021-11-17} } Kimsuky 그룹의 APT 공격 분석 보고서 (AppleSeed, PebbleDash)
Appleseed PEBBLEDASH
2021-10-20AhnLabAhnLab ASEC Analysis Team
@online{team:20211020:vnc:b2f7937, author = {AhnLab ASEC Analysis Team}, title = {{VNC Malware (TinyNuke, TightVNC) Used by Kimsuky Group}}, date = {2021-10-20}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/27346/}, language = {English}, urldate = {2021-10-26} } VNC Malware (TinyNuke, TightVNC) Used by Kimsuky Group
TinyNuke
2021-09-02ASECAhnLab ASEC Analysis Team
@online{team:20210902:attacks:39695ea, author = {AhnLab ASEC Analysis Team}, title = {{Attacks using metasploit meterpreter}}, date = {2021-09-02}, organization = {ASEC}, url = {https://asec.ahnlab.com/ko/26705/}, language = {Korean}, urldate = {2021-09-09} } Attacks using metasploit meterpreter
Appleseed Meterpreter
2021-07-15AhnLabAhnLab ASEC Analysis Team
@online{team:20210715:attack:f72359b, author = {AhnLab ASEC Analysis Team}, title = {{APT attack (by Kimsuky) attempt on a specific person using a word document}}, date = {2021-07-15}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/25351/}, language = {Korean}, urldate = {2021-07-20} } APT attack (by Kimsuky) attempt on a specific person using a word document
2021-07-02AhnLabAhnLab ASEC Analysis Team
@online{team:20210702:dissemination:19ccb7b, author = {AhnLab ASEC Analysis Team}, title = {{Dissemination of malicious word documents for 'Korean Political Science and Diplomacy' and 'Biography of Policy Advisor' (kimsuky)}}, date = {2021-07-02}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/24834/}, language = {Korean}, urldate = {2021-07-20} } Dissemination of malicious word documents for 'Korean Political Science and Diplomacy' and 'Biography of Policy Advisor' (kimsuky)
2021-05-24AhnLabAhnLab ASEC Analysis Team
@online{team:20210524:vidar:ea3dec5, author = {AhnLab ASEC Analysis Team}, title = {{Vidar Info-Stealer Abusing Game Platform}}, date = {2021-05-24}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/22932/}, language = {English}, urldate = {2021-06-16} } Vidar Info-Stealer Abusing Game Platform
vidar
2021-05-13AhnLabAhnLab ASEC Analysis Team
@online{team:20210513:attack:1e62c17, author = {AhnLab ASEC Analysis Team}, title = {{APT attack for domestic companies using library files}}, date = {2021-05-13}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/22975/}, language = {Korean}, urldate = {2021-05-25} } APT attack for domestic companies using library files
2021-04-15AhnLabAhnLab ASEC Analysis Team
@techreport{team:20210415:operation:98f465e, author = {AhnLab ASEC Analysis Team}, title = {{Operation Dream Job Targeting Job Seekers in South Korea}}, date = {2021-04-15}, institution = {AhnLab}, url = {https://global.ahnlab.com/global/upload/download/asecreport/ASEC%20REPORT_vol.102_ENG%20(4).pdf}, language = {English}, urldate = {2021-05-25} } Operation Dream Job Targeting Job Seekers in South Korea
LCPDot Torisma
2021-04-09AhnLabAhnLab ASEC Analysis Team
@online{team:20210409:dissemination:35e59c8, author = {AhnLab ASEC Analysis Team}, title = {{Dissemination of Korean document (HWP) titled inquiries related to North Korea}}, date = {2021-04-09}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/21873/}, language = {Korean}, urldate = {2021-04-14} } Dissemination of Korean document (HWP) titled inquiries related to North Korea
2021-03-22AhnLabAhnLab ASEC Analysis Team
@online{team:20210322:external:334c7ce, author = {AhnLab ASEC Analysis Team}, title = {{대북관련 본문 내용의 External 링크를 이용한 악성 워드 문서}}, date = {2021-03-22}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/21359/}, language = {Korean}, urldate = {2021-03-25} } 대북관련 본문 내용의 External 링크를 이용한 악성 워드 문서
2021-02-03AhnLabAhnLab ASEC Analysis Team
@online{team:20210203:dissemination:de95157, author = {AhnLab ASEC Analysis Team}, title = {{Dissemination of malicious code disguised as a document of'Amendment of Ministry of Defense's Business Report in 2021}}, date = {2021-02-03}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/20057/}, language = {Korean}, urldate = {2021-02-04} } Dissemination of malicious code disguised as a document of'Amendment of Ministry of Defense's Business Report in 2021
2021-01-05AhnLabAhnLab ASEC Analysis Team
@online{team:20210105:threat:6541fd7, author = {AhnLab ASEC Analysis Team}, title = {{[Threat Analysis] CLOP Ransomware that Attacked Korean Distribution Giant}}, date = {2021-01-05}, organization = {AhnLab}, url = {https://asec.ahnlab.com/en/19542/}, language = {English}, urldate = {2021-06-16} } [Threat Analysis] CLOP Ransomware that Attacked Korean Distribution Giant
Clop
2020-12-08AhnLabAhnLab ASEC Analysis Team
@online{team:20201208:2021:e29d0dc, author = {AhnLab ASEC Analysis Team}, title = {{“「2021 평화∙통일 이야기 공모전」 참가 신청서” 제목의 한글문서 유포 (APT 추정)}}, date = {2020-12-08}, organization = {AhnLab}, url = {https://asec.ahnlab.com/ko/18796/}, language = {Korean}, urldate = {2020-12-14} } “「2021 평화∙통일 이야기 공모전」 참가 신청서” 제목의 한글문서 유포 (APT 추정)
PoorWeb
2020-12-02AhnLabAhnLab ASEC Analysis Team
@techreport{team:20201202:clop:2df3556, author = {AhnLab ASEC Analysis Team}, title = {{CLOP Ransomware Report}}, date = {2020-12-02}, institution = {AhnLab}, url = {https://asec.ahnlab.com/wp-content/uploads/2021/01/Analysis_ReportCLOP_Ransomware.pdf}, language = {Korean}, urldate = {2021-07-02} } CLOP Ransomware Report
Clop
2020-07-02AhnLabAhnLab ASEC Analysis Team
@techreport{team:20200702:malicious:700e400, author = {AhnLab ASEC Analysis Team}, title = {{Malicious Hangul Word Processor Files Exploiting Ghostscript Vulnerability}}, date = {2020-07-02}, institution = {AhnLab}, url = {https://global.ahnlab.com/global/upload/download/asecreport/ASEC%20REPORT_vol.99_ENG.pdf}, language = {English}, urldate = {2020-07-02} } Malicious Hangul Word Processor Files Exploiting Ghostscript Vulnerability
2020-05-25AhnLabAhnLab ASEC Analysis Team
@online{team:20200525:hangul:d83d3b1, author = {AhnLab ASEC Analysis Team}, title = {{Hangul malware distributed in real estate investment related emails (using EPS)}}, date = {2020-05-25}, organization = {AhnLab}, url = {https://asec.ahnlab.com/1323}, language = {Korean}, urldate = {2020-05-26} } Hangul malware distributed in real estate investment related emails (using EPS)
2020-03-05AhnLabAhnLab ASEC Analysis Team
@online{team:20200305:bisonal:96d4292, author = {AhnLab ASEC Analysis Team}, title = {{신천지 비상연락처 위장한 Bisonal 악성코드 유포 중}}, date = {2020-03-05}, organization = {AhnLab}, url = {https://asec.ahnlab.com/1298}, language = {Korean}, urldate = {2020-03-09} } 신천지 비상연락처 위장한 Bisonal 악성코드 유포 중
Korlia
2019-03-22AhnLabAhnLab ASEC Analysis Team
@techreport{team:20190322:asec:3a00378, author = {AhnLab ASEC Analysis Team}, title = {{ASEC REPORT VOL.93 Q4 2018}}, date = {2019-03-22}, institution = {AhnLab}, url = {https://global.ahnlab.com/global/upload/download/asecreport/ASEC%20REPORT_vol.93_ENG.pdf}, language = {English}, urldate = {2020-07-24} } ASEC REPORT VOL.93 Q4 2018
Korlia
2018-07-18ASECAhnLab ASEC Analysis Team
@online{team:20180718:gandcrab:dc09385, author = {AhnLab ASEC Analysis Team}, title = {{GandCrab v4.1.2 Encryption Blocking Method (Kill Switch)}}, date = {2018-07-18}, organization = {ASEC}, url = {http://asec.ahnlab.com/1145}, language = {Korean}, urldate = {2020-01-08} } GandCrab v4.1.2 Encryption Blocking Method (Kill Switch)
Gandcrab