Microsoft Uncovers New Malicious Campaign Targeting Developers
This campaign is an offshoot of the more familiar and pervasive fake job interview and phony tech worker scams that have been coming from North Korea for several years.
All topics
This campaign is an offshoot of the more familiar and pervasive fake job interview and phony tech worker scams that have been coming from North Korea for several years.
Google said it has found 53 victims that have been impacted by the group, which it has tracked since 2017.
In a parallel Tuesday announcement, the Treasury Department also sanctioned the exploit broker network that had acquired the tools.
Exploitation of CVE-2026-1281 and CVE-2026-1340 is “widespread and mostly automated," according to Unit 42 researchers.
The hardcoded credential vulnerability (CVE-2026-22769) exists in Dell RecoverPoint for Virtual Machines and has been exploited since mid-2024.
That vulnerability also was patched in macOS, but the active exploitation that Apple disclosed was against iOS only.