![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlgSiefvHwJJ31UCfzbuFuNKiMyNKr6elLjzAKibpCdj7kjrkvCG49BTUXRRBPREyOS0KlYCcAO5-7Pc7L0QbIJrZ5gJ7_Y4lHqtFEZce2kr2ZN0kd80GrJYf8AoBQSb_7MO-wFqd7__sCDm6oMM_046cA9gfPzLdjSsJa4Ux3Xx6HRsMJuotDChs6WHfV/s1600/trojan.jpg)
A new phishing attack has been observed leveraging a Russian-language Microsoft Word document to deliver malware capable of harvesting sensitive information from compromised Windows hosts.
The activity has been attributed to a threat actor called Konni, which is assessed to share overlaps with a North Korean cluster tracked as Kimsuky (aka APT43).
“This campaign relies on a remote access trojan
Source:: The Hackers News