![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQv258wvtjdHtSmn4-Bu6XOXmeRBHDTMVWTkE-k1JCWSp-gHFD90z5AmA2cpromChHtPuQS15fzQD3_9i35-YbUtdQIIsit559-bO9f7Mlb9X1x2fKlOLGmwnrp4h5tkxoAchP10HbC6HxGp1m8bhsFGi4agJbqx8SKEcQ6qU508KYfUSx3vDMCLm8qhT0/s1600/malware.jpg)
A new elaborate attack campaign has been observed employing PowerShell and VBScript malware to infect Windows systems and harvest sensitive information.
Cybersecurity company Securonix, which dubbed the campaign DEEP#GOSU, said it’s likely associated with the North Korean state-sponsored group tracked as Kimsuky.
“The malware payloads used in the DEEP#GOSU represent a
Source:: The Hackers News