Netcrook

State-Sponsored Operations

251 article(s)

Operation FrostArmada: Russian APT28’s Global DNS Hijack via Home Routers

🗓 07 Apr 2026 · 👤 AGONY · 🌍 Europe

APT28’s FrostArmada campaign turned everyday home and office routers into global espionage tools, hijacking DNS traffic and stealing sensitive credentials from thousands of organizations worldwide.

🏴‍☠️ Iran’s Hybrid Cyber War: Russian Hackers, Pseudo-Ransomware, and the New Digital Battlefield

🗓 07 Apr 2026 · 👤 AGONY · 🌍 Middle-East

Iran’s integration of Russian cybercriminals into its offensive operations marks a new era in cyber warfare. By leveraging pseudo-ransomware tactics and blurring the lines between crime and state action, Tehran is making cyber threats harder to trace and counter, signaling a major escalation in the global digital conflict.

Russian Hackers Exploit UK Home Routers for Espionage, Warns NCSC

🗓 07 Apr 2026 · 👤 AGONY · 🌍 Europe

British intelligence has exposed a Russian cyber unit’s campaign to hijack home and small business routers, rerouting internet traffic for espionage. The NCSC urges urgent action to secure vulnerable devices.

North Korean Hackers Exploit GitHub in Stealthy Phishing Campaign Against South Korea

🗓 07 Apr 2026 · 👤 AGONY · 🌍 Asia

North Korean threat actors have turned GitHub—a trusted developer platform—into a covert control center for a multi-stage phishing campaign targeting South Korean companies. By disguising malicious LNK files as PDFs and blending their activity with legitimate encrypted traffic, the attackers evaded detection and demonstrated a new era of stealthy cyber espionage.

North Korea’s Modular Malware: How Disposable Hacking Tools Outsmart Defenders

🗓 06 Apr 2026 · 👤 AGONY · 🌍 Asia

North Korea’s cyber program now relies on modular, disposable malware built for parallel missions—espionage, financial theft, and disruption. This resilient strategy thwarts traditional defenses and demands a new approach from global security teams.

Kimsuky’s Stealth Attack: Malicious LNK Files and Python Backdoors Explained

🗓 06 Apr 2026 · 👤 AGONY · 🌍 Asia

Kimsuky has revamped its attack strategy, deploying cleverly disguised shortcut files and advanced Python malware to bypass security systems and conduct stealthy cyber-espionage. Learn how this North Korean group’s new tactics work and why they’re so hard to detect.

North Korean Hackers Exploit GitHub for Corporate Espionage in South Korea

🗓 03 Apr 2026 · 👤 AGONY · 🌍 Asia

North Korean state-backed hackers have adopted new tactics, using GitHub and Windows tools to spy on South Korean companies, evading traditional defenses with sophisticated social engineering and cloud-based data theft.

TA416 Returns: Pro-Chinese Hackers Escalate Cyber-Espionage in Europe and Beyond

🗓 03 Apr 2026 · 👤 AGONY · 🌍 Middle-East

TA416, a pro-Chinese cyber-espionage group, has renewed attacks on European and Middle Eastern diplomatic targets, exploiting geopolitical tensions with sophisticated digital tactics. Learn how these stealthy hackers operate and what their resurgence means for global cybersecurity.

Inside the $280 Million Drift Protocol Hack: North Korean Cybercriminals Exploit DeFi Governance

🗓 03 Apr 2026 · 👤 AGONY · 🌍 Asia

North Korean hackers orchestrated a $280 million heist on Drift Protocol by seizing its Security Council powers, exposing critical weaknesses in DeFi governance and shaking the crypto industry.

Eyes on Tehran: How Israel Hijacked Iran’s Street Cameras for Espionage

🗓 02 Apr 2026 · 👤 AGONY · 🌍 Middle-East

Israeli intelligence reportedly transformed Tehran’s state surveillance cameras into a digital spy grid, tracking high-value targets and exposing the vulnerabilities of civilian tech in modern cyberwarfare.

1   2   3   4   5   Next »