{"id":53577,"date":"2023-09-07T13:27:57","date_gmt":"2023-09-07T13:27:57","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34984\/North-Korea-Hackers-Going-After-Russian-Targets-Microsoft-Says.html"},"modified":"2023-09-07T13:27:57","modified_gmt":"2023-09-07T13:27:57","slug":"north-korea-hackers-going-after-russian-targets-microsoft-says","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/north-korea-hackers-going-after-russian-targets-microsoft-says\/","title":{"rendered":"North Korea Hackers Going After Russian Targets, Microsoft Says"},"content":{"rendered":"<div data-testid=\"primary-image\" role=\"figure\" aria-describedby=\"primary-image-caption\" readability=\"31.344504021448\">\n<figure class=\"primary-image__container__3_KhI\" readability=\"6.5495978552279\">\n<div data-testid=\"Image\" class=\"primary-image__image__1zwAE\">\n<div class=\"styles__image-container__skIG1 styles__fill__3xCr1 styles__center_center__1AaPV styles__apply-ratio__1_FYQ\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/HDQCSD5FTNKYNH6ARATDMPYLNQ.jpg\" srcset=\"https:\/\/www.reuters.com\/resizer\/p2fvtPH5xxcmAfQ88rNieDcQgI0=\/480x0\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/HDQCSD5FTNKYNH6ARATDMPYLNQ.jpg 480w, https:\/\/www.reuters.com\/resizer\/YJN5HtMnhGpo1D9IrRQJO8JpTLI=\/960x0\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/HDQCSD5FTNKYNH6ARATDMPYLNQ.jpg 960w, https:\/\/www.reuters.com\/resizer\/C8RfK-56CwJgYkR8_s3z-MI3Jo4=\/1080x0\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/HDQCSD5FTNKYNH6ARATDMPYLNQ.jpg 1080w, https:\/\/www.reuters.com\/resizer\/6KaS1MfdOfmrHrNnECZgUpBuyLs=\/1200x0\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/HDQCSD5FTNKYNH6ARATDMPYLNQ.jpg 1200w\" sizes=\"auto, (min-width: 1024px) 560px, (min-width: 1440px) 700px, 100vw\" width=\"5225\" height=\"3393\" alt=\"Man holds laptop computer as cyber code is projected on him in this illustration picture\"><\/div>\n<\/div>\n<p data-testid=\"Body\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__ultra_small__37j9j body__full_width__ekUdw body__ultra_small_body__1lUQl primary-image__caption__3Ayt0\"><span>A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 <a data-testid=\"Link\" href=\"https:\/\/www.reutersagency.com\/en\/licensereuterscontent\/?utm_medium=rcom-article-media&amp;utm_campaign=rcom-rcp-lead\" target=\"_blank\" class=\"text__text__1FZLe text__inherit-color__3208F text__inherit-font__1Y8w3 text__inherit-size__1DZJi link__underline_default__2prE_ collapsible-caption__license__Nbbf3 collapsible-caption__collapsed__3XSNZ\" rel=\"noopener\"> Acquire Licensing Rights<svg class=\"collapsible-caption__symbol__eZoN7\" fill=\"#666\" width=\"0\" height=\"0\" viewBox=\"0 0 32 32\" aria-hidden=\"true\"><path d=\"M15 6c.6 0 1 .4 1 1s-.4 1-1 1H9c-.6 0-1 .4-1 1v14a1.1 1.1 0 0 0 .2.6c.1.2.4.4.8.4h14c.6 0 1-.4 1-1v-6c0-.6.4-1 1-1s1 .4 1 1v6a3 3 0 0 1-3 3H9a3 3 0 0 1-2.2-.9A3 3 0 0 1 6 23V9a3 3 0 0 1 3-3Zm10 0 .4.1.5.5.1.4v6c0 .6-.4 1-1 1s-1-.4-1-1V9.4l-5.3 5.3a1 1 0 0 1-.7.3 1 1 0 0 1-.7-.3 1 1 0 0 1 0-1.4L22.6 8H19c-.6 0-1-.4-1-1s.4-1 1-1Z\" \/><\/svg><\/a><\/span> <span data-testid=\"Body\" role=\"button\" tabindex=\"0\" aria-pressed=\"false\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__medium__1kbOh text__inherit-size__1DZJi body__base__22dCE body__ultra_small_body__1lUQl collapsible-caption__button__1eGCV\">Read more<\/span><\/p>\n<\/figure>\n<\/div>\n<div readability=\"68.247791333614\">\n<p data-testid=\"paragraph-0\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">WASHINGTON, Sept 7 (Reuters) &#8211; North Korean hackers targeted Russian diplomats and successfully breached a Russian aerospace research institute earlier this year, Microsoft Corp <a data-testid=\"Link\" href=\"https:\/\/www.reuters.com\/markets\/companies\/MSFT.O\" target=\"_blank\" class=\"text__text__1FZLe text__inherit-color__3208F text__inherit-font__1Y8w3 text__inherit-size__1DZJi link__underline_default__2prE_\" rel=\"noopener\">(MSFT.O)<\/a> said in <a data-testid=\"Link\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/?p=65777\" target=\"_blank\" class=\"text__text__1FZLe text__inherit-color__3208F text__inherit-font__1Y8w3 text__inherit-size__1DZJi link__underline_default__2prE_\" rel=\"noopener\">a blog post published Thursday<\/a>.<\/p>\n<p data-testid=\"paragraph-1\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">Microsoft did not identify any of the victims by name and provided little by way of details or evidence, but said the hacking took place in March.<\/p>\n<p data-testid=\"paragraph-2\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">&#8220;North Korean threat actors may be capitalizing on the opportunity to conduct intelligence collection on Russian entities due to the country&#8217;s focus on its war in Ukraine,&#8221; the report said.<\/p>\n<p data-testid=\"paragraph-3\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">North Korea&#8217;s mission to the United Nations did not immediately reply to a message seeking comment. The Russian embassy in Washington did not immediately respond to an email.<\/p>\n<p data-testid=\"paragraph-4\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">Spying on rivals&#8217; military and diplomatic organizations is standard operating procedure for the hacking squads employed by the world&#8217;s intelligence agencies. North Korea has repeatedly been accused of deploying hackers against defense and diplomacy-related targets in South Korea, the United States and elsewhere.<\/p>\n<p data-testid=\"paragraph-5\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">But allegations that Pyongyang is spying on its Russian allies are potentially more awkward as the countries draw closer amid the war in Ukraine.<\/p>\n<p data-testid=\"paragraph-6\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">Last month, Reuters and researchers at cybersecurity firm SentinelOne Inc <a data-testid=\"Link\" href=\"https:\/\/www.reuters.com\/markets\/companies\/S.N\" target=\"_blank\" class=\"text__text__1FZLe text__inherit-color__3208F text__inherit-font__1Y8w3 text__inherit-size__1DZJi link__underline_default__2prE_\" rel=\"noopener\">(S.N)<\/a> <a data-testid=\"Link\" href=\"https:\/\/www.reuters.com\/technology\/north-korean-hackers-breached-top-russian-missile-maker-2023-08-07\/\" class=\"text__text__1FZLe text__inherit-color__3208F text__inherit-font__1Y8w3 text__inherit-size__1DZJi link__underline_default__2prE_\">revealed how North Korean spies had broken into a major Russian missile developer<\/a> for at least five months last year &#8211; putting them into position to gather intelligence about Russia&#8217;s hypersonic missiles and rocket propellant technology.<\/p>\n<p data-testid=\"paragraph-7\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">Microsoft&#8217;s allegations were made in a report about cyberespionage in East Asia, which also covered previous reporting by the American tech giant about Chinese hackers targeting U.S. critical infrastructure as well as new allegations about China&#8217;s propaganda operations, which it said Beijing had &#8220;continued to scale up&#8221; using artificial intelligence and influencers.<\/p>\n<p data-testid=\"paragraph-8\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">The Chinese embassy did not immediately return a message seeking comment. Beijing routinely denies allegations of cyber subterfuge.<\/p>\n<div class=\"article-body__element__2p5pI\" readability=\"32\">\n<p data-testid=\"Body\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__extra_small__1Mw6v body__full_width__ekUdw body__extra_small_body__3QTYe sign-off__text__PU3Aj\">Reporting by Raphael Satter; Editing by Stephen Coates<\/p>\n<\/div>\n<p data-testid=\"Body\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__base__22dCE body__small_body__2vQyf article-body__element__2p5pI trust-badge\">Our Standards: <a data-testid=\"Link\" href=\"https:\/\/www.thomsonreuters.com\/en\/about-us\/trust-principles.html\" target=\"_blank\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__medium__1kbOh text__small__1kGq2 link__underline_default__2prE_\" rel=\"noopener\">The Thomson Reuters Trust Principles.<\/a><\/p>\n<div class=\"article-body__row__dFOPA article-body__element__2p5pI\"><a href=\"https:\/\/www.reutersagency.com\/en\/licensereuterscontent\/?utm_medium=rcom-article-media&amp;utm_campaign=rcom-rcp-lead\" target=\"_blank\" class=\"button__link__uTGln button__secondary__18moI button__round__1nYLA\" data-testid=\"Button\" rel=\"noopener\"><span class=\"button__container__3sgvk license-content-button__button__3okgd\"><span data-testid=\"Text\" class=\"text__text__1FZLe text__inherit-color__3208F text__regular__2N1Xr text__body_fixed__1I7Al license-content-button__text__3XBrA\"> Acquire Licensing Rights<\/span><svg fill=\"#666\" width=\"18\" height=\"18\" viewBox=\"0 0 32 32\" aria-hidden=\"true\"><path d=\"M15 6c.6 0 1 .4 1 1s-.4 1-1 1H9c-.6 0-1 .4-1 1v14a1.1 1.1 0 0 0 .2.6c.1.2.4.4.8.4h14c.6 0 1-.4 1-1v-6c0-.6.4-1 1-1s1 .4 1 1v6a3 3 0 0 1-3 3H9a3 3 0 0 1-2.2-.9A3 3 0 0 1 6 23V9a3 3 0 0 1 3-3Zm10 0 .4.1.5.5.1.4v6c0 .6-.4 1-1 1s-1-.4-1-1V9.4l-5.3 5.3a1 1 0 0 1-.7.3 1 1 0 0 1-.7-.3 1 1 0 0 1 0-1.4L22.6 8H19c-.6 0-1-.4-1-1s.4-1 1-1Z\" \/><\/svg><span>, opens new tab<\/span><\/span><\/a><\/div>\n<div class=\"article-body__element__2p5pI\" readability=\"31.396860986547\">\n<address class=\"author-bio__author-card__3h9uA\" readability=\"3.7488789237668\">\n<div class=\"author-bio__author-wrapper__3HHLV\"><a class=\"author-bio__author-image__3uDqF\" href=\"https:\/\/www.reuters.com\/authors\/raphael-satter\/\"><\/p>\n<div data-testid=\"Image\"><noscript><img decoding=\"async\" src=\"https:\/\/s3.amazonaws.com\/arc-authors\/reuters\/fdae37cc-f469-4f9b-a0be-7227a68598fb.jpg\"><\/noscript><\/div>\n<p><\/a><\/div>\n<p data-testid=\"Body\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__base__22dCE body__small_body__2vQyf author-bio__description__3uv33\">Reporter covering cybersecurity, surveillance, and disinformation for Reuters. Work has included investigations into state-sponsored espionage, deepfake-driven propaganda, and mercenary hacking.<\/p>\n<\/address>\n<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34984\/North-Korea-Hackers-Going-After-Russian-Targets-Microsoft-Says.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":53578,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[10675],"class_list":["post-53577","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentrussiacyberwarmilitarynorth-korea"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>North Korea Hackers Going After Russian Targets, Microsoft Says 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/north-korea-hackers-going-after-russian-targets-microsoft-says\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"North Korea Hackers Going After Russian Targets, Microsoft Says 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/north-korea-hackers-going-after-russian-targets-microsoft-says\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-07T13:27:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/HDQCSD5FTNKYNH6ARATDMPYLNQ.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korea-hackers-going-after-russian-targets-microsoft-says\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korea-hackers-going-after-russian-targets-microsoft-says\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"North Korea Hackers Going After Russian Targets, Microsoft Says\",\"datePublished\":\"2023-09-07T13:27:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korea-hackers-going-after-russian-targets-microsoft-says\\\/\"},\"wordCount\":422,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korea-hackers-going-after-russian-targets-microsoft-says\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/north-korea-hackers-going-after-russian-targets-microsoft-says-scaled.jpg\",\"keywords\":[\"headline,hacker,government,russia,cyberwar,military,north korea\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korea-hackers-going-after-russian-targets-microsoft-says\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korea-hackers-going-after-russian-targets-microsoft-says\\\/\",\"name\":\"North Korea Hackers Going After Russian Targets, Microsoft Says 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korea-hackers-going-after-russian-targets-microsoft-says\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korea-hackers-going-after-russian-targets-microsoft-says\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/north-korea-hackers-going-after-russian-targets-microsoft-says-scaled.jpg\",\"datePublished\":\"2023-09-07T13:27:57+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korea-hackers-going-after-russian-targets-microsoft-says\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korea-hackers-going-after-russian-targets-microsoft-says\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korea-hackers-going-after-russian-targets-microsoft-says\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/north-korea-hackers-going-after-russian-targets-microsoft-says-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/north-korea-hackers-going-after-russian-targets-microsoft-says-scaled.jpg\",\"width\":2560,\"height\":1662},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/north-korea-hackers-going-after-russian-targets-microsoft-says\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,russia,cyberwar,military,north korea\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentrussiacyberwarmilitarynorth-korea\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"North Korea Hackers Going After Russian Targets, Microsoft Says\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"North Korea Hackers Going After Russian Targets, Microsoft Says 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/north-korea-hackers-going-after-russian-targets-microsoft-says\/","og_locale":"en_US","og_type":"article","og_title":"North Korea Hackers Going After Russian Targets, Microsoft Says 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/north-korea-hackers-going-after-russian-targets-microsoft-says\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-09-07T13:27:57+00:00","og_image":[{"url":"https:\/\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/HDQCSD5FTNKYNH6ARATDMPYLNQ.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/north-korea-hackers-going-after-russian-targets-microsoft-says\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/north-korea-hackers-going-after-russian-targets-microsoft-says\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"North Korea Hackers Going After Russian Targets, Microsoft Says","datePublished":"2023-09-07T13:27:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/north-korea-hackers-going-after-russian-targets-microsoft-says\/"},"wordCount":422,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/north-korea-hackers-going-after-russian-targets-microsoft-says\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/north-korea-hackers-going-after-russian-targets-microsoft-says-scaled.jpg","keywords":["headline,hacker,government,russia,cyberwar,military,north korea"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/north-korea-hackers-going-after-russian-targets-microsoft-says\/","url":"https:\/\/www.threatshub.org\/blog\/north-korea-hackers-going-after-russian-targets-microsoft-says\/","name":"North Korea Hackers Going After Russian Targets, Microsoft Says 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/north-korea-hackers-going-after-russian-targets-microsoft-says\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/north-korea-hackers-going-after-russian-targets-microsoft-says\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/north-korea-hackers-going-after-russian-targets-microsoft-says-scaled.jpg","datePublished":"2023-09-07T13:27:57+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/north-korea-hackers-going-after-russian-targets-microsoft-says\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/north-korea-hackers-going-after-russian-targets-microsoft-says\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/north-korea-hackers-going-after-russian-targets-microsoft-says\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/north-korea-hackers-going-after-russian-targets-microsoft-says-scaled.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/north-korea-hackers-going-after-russian-targets-microsoft-says-scaled.jpg","width":2560,"height":1662},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/north-korea-hackers-going-after-russian-targets-microsoft-says\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,russia,cyberwar,military,north korea","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentrussiacyberwarmilitarynorth-korea\/"},{"@type":"ListItem","position":3,"name":"North Korea Hackers Going After Russian Targets, Microsoft Says"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53577"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53577\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/53578"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}