ForensicsS | Private Detective & Digital Forensics Investigation Experts
  • info@forensicss.com

    Send Email

  • 11400 West Olympic Blvd, Los Angeles, CA 90064

  • Home
  • About Us
  • Services
    • Domestic Investigation
      • Los Angeles Private Eye
      • Catch Cheater
      • Infidelity Investigations
      • Asset Investigations
      • Private Detective Orange County
      • Child Custody Investigations
      • Missing Person Locates
      • Wire Fraud
      • Corporate Security Investigations
      • Surveillance Operations
      • Financial Fraud Investigations
      • Bug Sweep TSCM Investigation
      • Workers Compensation Fraud Investigation
      • Asset and Hidden Finances Investigations
    • Cyber Security
      • DIGITAL EVIDENCE AUTHENTICATION
      • Cyber Bullying Online Investigation
      • Penetration Testing Service
      • Social Media Monitoring
      • Romance Scam Investigator
      • Cyber Stalking Investigation
      • Crypto Scam Investigation
      • Cyber Security Assessment
      • Cyber Harassment Online Investigator
      • Ransomware Attack Investigation
      • Social Media Investigator
      • Extortion Investigation services
      • Background Screening
      • Insurance Fraud Detective
      • Forensic Accounting
      • Online Identity Theft
      • Online Blackmail
      • Cell Phone Forensics
      • Automotive Forensics
      • Audio Video Forensics
      • E-Discovery
      • Assets Search 
      • Computer and Cell Phone Forensics
  • Closed Cases
    • Closed Cases
    • Case Details
  • News
  • Contact
310-270-0598

Confidentiality Guaranteed

310-270-0598

Confidentiality Guaranteed

Logo

Contact Info

  • 11400 West Olympic Blvd, Los Angeles, CA 90064
  • 310-270-0598
  • info@forensicss.com

    Blog Details

      ForensicsS | Private Detective & Digital Forensics Investigation Experts > News > cybersecurity > Iranian hackers focused major South Korean electronics maker
    Iranian hackers focused major South Korean electronics maker
    13
    May
    • ForensicsS
    • 0 Comments

    Iranian hackers focused major South Korean electronics maker

    OSINT

    OSINT Iranian hackers targeted major South Korean electronics maker

    The Iran-linked hacking neighborhood MuddyWater (a.okay.a. Seedworm, Static Kitten) launched a huge cyber-espionage campaign focusing on not lower than 9 high-profile organizations all the contrivance in which thru just a few sectors and countries.

    Amongst the victims are a serious South Korean electronics producer, govt agencies, an international airport within the Center East, industrial manufacturers in Asia, and academic institutions.

    Researchers at Symantec pronounce that the risk actor “spent per week contained within the community of a serious South Korean electronics producer in February 2026.”

    Symantec’s Risk Hunter Crew believes the attacker used to be intelligence-pushed, specializing in industrial and mental property theft, govt espionage, and entry to downstream customers or company networks.

    Fortemedia and SentinelOne abuse

    Seedworm’s campaign relied heavily on DLL sideloading, a frequent intention in which respectable, signed system hundreds malicious DLLs.

    Two of the binaries leveraged within the attack are ‘fmapp.exe,’ a proper Foremedia audio utility, and ‘sentinelmemoryscanner.exe,’ a proper SentinelOne ingredient.

    The malicious DLLs (fmapp.dll and sentinelagentcore.dll) contained ChromElevator, a commodity post-exploitation system that steals files kept in Chrome-primarily based entirely browsers.

    Symantec also discovered that PowerShell, worn in outdated Seedworm assaults, used to be mild heavily worn within the brand new incidents, even though the payloads had been controlled thru Node.js loaders in want to at present.

    PowerShell used to be worn to take dangle of screenshots, habits reconnaissance, earn extra payloads, build persistence, rob credentials, and design SOCKS5 tunnels.

    Attack on a Korean firm

    In step with Symantec’s observations, the attack on the South Korean electronics producer lasted between February 20 and 27. The researchers did not disclose the title of the focused organization.

    In the first stage, Seedworm achieved host and enviornment reconnaissance, followed by antivirus enumeration by task of WMI, screenshot take dangle of, and the download of extra malware.

    Credential theft occurred by task of groundless Windows prompts, registry hive theft (SAM/SECURITY/SYSTEM), and Kerberos ticket abuse tools.

    Persistence used to be established thru registry modifications, beaconing occurred at 90-2nd intervals, and sideloaded binaries had been commonly relaunched to wait on entry.

    “The cadence is over again per implant-pushed verbalize in want to steady operator presence,” the researchers said.

    The attackers leveraged sendit.sh, a public file-sharing provider for files exfiltration, liable to vague the malicious verbalize and dangle it appear as ordinary traffic.

    Overall, Symantec has discovered the most contemporary Seedworm campaign necessary for the risk actors’ geographic expansion, operational maturity, and the abuse of respectable tools and products and services, which ticket a shift in direction of quieter assaults.


    OSINT article image

    OSINT

    ninety 9% of What Mythos Stumbled on Is Aloof Unpatched.

    AI chained four zero-days into one exploit that bypassed each renderer and OS sandboxes. A wave of new exploits is coming.

    At the Independent Validation Summit (Could perhaps additionally 12 & 14), stare how self ample, context-rich validation finds what’s exploitable, proves controls wait on, and closes the remediation loop.

    Say Your Jam

    Be taught Extra

    • Tags

    • cybercrime cybercrimehacker cybersecurity email-fraud forensics|digital-forensics hackers Investigation Iranian malware online-scam private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker

    Recent Posts

    • Ethereum Pushes Sure Signing to Fight Expensive Crypto Scams
    • West Pharmaceutical says hackers stole records, encrypted programs
    • Iranian hackers focused major South Korean electronics maker
    • CHARLIE MARCUS: The Canvas hack reveals that colleges must ditch Chromebooks and come again to particular finding out
    • FBI, Secret Provider probe Wisconsin brewery proprietor over free beer offer after alleged Trump killing are attempting

    Recent Comments

    No comments to show.

    Categories

    • cybersecurity
    • Investigations
    • Uncategorized

    Recent Posts

    Ethereum Pushes Sure Signing to Fight Expensive Crypto Scams
    May 13, 2026
    Ethereum Pushes Sure Signing to Fight Expensive Crypto Scams
    West Pharmaceutical says hackers stole records, encrypted programs
    May 13, 2026
    West Pharmaceutical says hackers stole records, encrypted programs
    Iranian hackers focused major South Korean electronics maker
    May 13, 2026
    Iranian hackers focused major South Korean electronics maker

    Popular Tags

    administration Confirms Crypto cybercrime cybercrimefraud cybercrimehacker cybercrimephishing-attack cybersecurity digital-forensics director email-fraud Epstein forensics|digital-forensics Former fraud hacker hackers House Investigation investigationcybersecurity Judge Justice Korean Launches malware malwarefraud malwarephishing-attack Microsoft Minnesota Nancy North online-scam online-scamphishing-attack opens Patel phishing-attack Police private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker probe Trump warns

    Forensics – Trusted Experts in Surveillance, Cyber Security, Background Checks, and Digital Forensics across California.

    • 310-270-0598
    • info@forensicss.com
    • 11400 West Olympic Blvd, Los Angeles, CA 90064

    Explore

    • News
    • About
    • Our Services
    • Find A Person
    • Child Custody
    • Contact Us
    • Los Angeles
    • Orange County
    • San Diego

    Services

    • Cyber Security
    • Online Blackmail
    • Cell Phone Forensics
    • Domestic Investigation
    • Social Media Investigator
    • Crypto Scam Investigation

    Newsletter

    Sign up email to get our daily latest news & updates from us

    © Copyright 2021 by KRIGO