You are using an unsupported browser. Please update your browser to the latest version on or before July 31, 2020.
close
You are viewing the article in preview mode. It is not live at the moment.

And Pines.7z — Tails

: Immediately disconnect the affected machine from the network.

: Often utilize legitimate-looking but compromised domains or dynamic DNS services. Tails and Pines.7z

This archive typically serves as a delivery mechanism for malware designed to steal sensitive information from targeted individuals, particularly those involved in North Korean affairs, human rights, or diplomatic policy. Kimsuky (APT43). : Immediately disconnect the affected machine from the

: The malware collects system information, browser credentials, and specific document types, sending them to a Command and Control (C2) server. Key Indicators of Compromise (IoCs) Kimsuky (APT43)

The file is associated with the Pines and Tails campaign, a sophisticated cyber-espionage operation likely linked to the North Korean threat actor group Kimsuky (also known as APT43 or Thallium) . Technical Summary

: The victim receives an email with the "Tails and Pines.7z" attachment, often disguised as a legitimate document or research paper.

: Look for unusual entries in HKCU\Software\Microsoft\Windows\CurrentVersion\Run designed to maintain persistence. Recommended Actions

Feedback
0 out of 0 found this helpful

scroll to top icon