Korea

9 posts
Research
members

UCID902: Uncovering nation state watering hole credential harvesting campaigns targeting human rights activists by APT threat group UCID902 (2023)

Ovi
Ovi
This is a repost of some critical research I performed back in 2023 that was originally hosted on Interlab's website. Since Interlab has been abandoned by it'…
Research
members

Security and privacy analysis: MDM applications (국방모바일보안) for South Korean Military personnel (2023)

Ovi
Ovi
This is a repost of some critical research I performed back in 2023 that was originally hosted on Interlab's website. Since Interlab has been abandoned by it'…
Research
members

RambleOn Android Spyware (December 2022)

Ovi
Ovi
This is a repost of some critical research I performed back in 2022 that was originally hosted on Interlab's website. Since Interlab has been abandoned by it'…
RE:archive | APT37's ROKRAT HWP Object Linking and Embedding
REarchive
members

RE:archive | APT37's ROKRAT HWP Object Linking and Embedding

Ovi
Ovi
Newsletter
members

Friday musings | Commentary on Amnesty Tech's technical report of Predator Files & I talk about RambleOn & ROKRAT + other links

Ovi
Ovi
Research
members

The evolution of North Korean Android spyware: ROKRAT & RambleOn

Ovi
Ovi
Please note in this article when I mention ROKRAT, I am specifically referring to the Android variant of the malware, and not the malware relating to other operating systems. Introduction…
RE:archive | Reverse engineering APT37’s GOLDBACKDOOR dropper
Research
members

RE:archive | Reverse engineering APT37’s GOLDBACKDOOR dropper

Ovi
Ovi
Reverse engineering SuperBear RAT.
Research
members

Reverse engineering SuperBear RAT.

Ovi
Ovi
Commentry
members

Korean Military of Defence’s Mobile Defence Security application

Ovi
Ovi
The Korean Military has a mandatory phone application for all soldiers. This application is used to support military personnel, staff and contractors to securely enter buildings and reduce the risk…