Kimsuky Uses SharpExt To Gather Intelligence From Stolen Email
The threat actor tracked as Kimsuky continue to deliver booby trapped documents to targets that are laced with browser extension malware.
Once received and executed, the malicious Hangul Word Processor (HWP) files communicate with the threat actor controlled C2 to gather the SharpEXT browser extension that is leveraged to steal emails and attachments from the victims in the United States, South Korea, and Europe.
Featured Resources
Subscribe to Our Blog
Subscribe now to get the latest insights, expert tips and updates on threat exposure validation.
Subscribe