

It is important to note that apart from Chrome browser, this extension can also infect other Chromium-based browsers like:.

The Kimsuky attack strategy commences with a targeted spear-phishing email that urges the victim to install a malicious Chrome extension. So, it’s completely important to stay alert of the TTPs used by the threat actors and mitigate such scenarios by detecting them. However, the same TTPs could be used by threat actors to target victims globally. Moreover, to perform and execute the attack on targets, the threat actors have used two methods:-Īs we hinted earlier, the current Kimsuky campaign mainly targets individuals located in South Korea only.
