Infiltration of the company's information systems, including its email platform, enabled the misdirection of vendor payments, said NioCorp in a filing with the Securities and Exchange Commission.
Kimsuky — also known as APT43, Black Banshee, TA427, and Velvet Chollima — commences intrusions with the distribution of phishing emails with a ZIP archive attachment containing an LNK file seemingly spoofing legitimate documents.
Threat actors exploiting Salesforce's automated mailing service sent malicious emails with fake Facebook logos warning of copyright violations and account restrictions should recipients fail to contest the claim using a link that redirects to a phony Facebook support page seeking their credentials.