Go to Top

Go to Top

1% blind spots, 100% risk.
Protect your business with white-hat hackers.

1% blind spots, 100% risk. Protect your business with white-hat hackers.

Identify vulnerabilities that could lead to data leaks from the attackers perspective,
and strengthen your security posture in advance.

Identify vulnerabilities that could lead to data leaks from the attackers perspective, and strengthen your security posture in advance.

Identify vulnerabilities that could lead to data leaks from the attackers perspective,and strengthen your security posture in advance.

The choice of security-first
enterprises: Enki WhiteHat.

The choice of security-first
enterprises: Enki WhiteHat.

With extensive project experience across industries,
we provide customized security solutions tailored to your business environment and needs.

With extensive project experience across industries,
we provide customized security solutions tailored to your business environment and needs.

With extensive project experience across industries, we provide customized security solutions tailored to your business environment and needs.

Large Enterprises

Financial Institutions

IT & Security Companies

Military / Public Sector Organizations

Large Enterprises

Financial Institutions

IT & Security Companies

Military / Public Sector Organizations

Large Enterprises

Financial Institutions

IT & Security Companies

Military / Public Sector Organizations

Unidentified hacks and relentless breaches

uncertainty keeps building up, while the burden of responsibility falls entirely on security teams.

uncertainty keeps building up, while the burden of responsibility falls entirely on security teams.

uncertainty keeps building up, while the burden of responsibility falls entirely on security teams.

With data breaches continuing to occur, is your company truly safe?

With data breaches continuing to occur, is your company truly safe?

With data breaches continuing to occur, is your company truly safe?

Uncontrolled IT Assets

Uncontrolled IT Assets

Uncontrolled IT Assets

Sophisticated Attacks

Sophisticated Attacks

Sophisticated Attacks

Frequent Feature Updates

Frequent Feature Updates

Frequent Feature Updates

Frequent Feature Updates

Increasing Vendor Connections

Increasing Vendor Connections

Increasing Vendor Connections

Cloud & Remote Work

Cloud & Remote Work

Cloud & Remote Work

AI Service Adoption

AI Service Adoption

AI Service Adoption

AI Service Adoption

Shortage of Security Personnel

Shortage of Security Personnel

Shortage of Security Personnel

Stricter Regulatory Requirements

Stricter Regulatory Requirements

Stricter Regulatory Requirements

Stay one step ahead of attackers.

Stay one step ahead of attackers.

Stay one step ahead of attackers.

Enterprise security must be meticulous.
Attackers exploit even the smallest 1% of blind sots— It’s time to think like them,
and adopt proactive, preventive security measures.

Enterprise security must be meticulous.
Attackers exploit even the smallest 1% of blind sots— It’s time to think like them,
and adopt proactive, preventive security measures.

Enterprise security must be meticulous.
Attackers exploit even the smallest 1% of blind sots— It’s time to think like them,
and adopt proactive, preventive security measures.

We uncover critical vulnerabilities that threaten your enterprise.

We uncover critical vulnerabilities that threaten your enterprise.

We uncover critical vulnerabilities that threaten your enterprise.

Ethical white-hat hackers simulate attacks from the attacker’s perspective to
identify issues that could lead to financial loss, data breaches, or service disruptions.

Ethical white-hat hackers simulate attacks from the attacker’s perspective to
identify issues that could lead to financial loss, data breaches, or service disruptions.

Ethical white-hat hackers simulate attacks from the attacker’s perspective toidentify issues that could lead to financial loss, data breaches, or service disruptions.

Server Takeover &
Privilege Escalation

Server Takeover &
Privilege Escalation

서버 보안을 상징하는 열쇠 아이콘
서버 보안을 상징하는 열쇠 아이콘

Validate potential for root-level server access remotely

Validate potential for root-level server access remotely

Identify server takeover scenarios via unused ports and vulnerable services

Identify server takeover scenarios via unused ports and vulnerable services

Detect internal server access paths through service vulnerability analysis

Detect internal server access paths through service vulnerability analysis

Malicious Activity

Malicious Activity

악성 행위를 상징하는 위험 신호 표시 아이콘
악성 행위를 상징하는 위험 신호 표시 아이콘

Simulate duplication of e-currency/points and fraudulent payments

Simulate duplication of e-currency/points and fraudulent payments

Prove feasibility of creating and distributing malicious apps

Prove feasibility of creating and distributing malicious apps

Validate privilege escalation through vulnerabilities (XSS, data exposure, etc.)

Validate privilege escalation through vulnerabilities (XSS, data exposure, etc.)

Verify potential bypass routes via external staff/employee devices

Verify potential bypass routes via external staff/employee devices

Data Exfiltration

Data Exfiltration

자료를 상징하는 폴더 아이콘
자료를 상징하는 폴더 아이콘
자료를 상징하는 폴더 아이콘

Confirm risk of sensitive data leaks (customer PII, internal documents, etc.)

Confirm risk of sensitive data leaks (customer PII, internal documents, etc.)

Demonstrate external data exfiltration via arbitrary command execution

Demonstrate external data exfiltration via arbitrary command execution

Validate customer data access after admin privilege hijacking

Validate customer data access after admin privilege hijacking

Assess data extraction risks from bypassing existing security solutions

Assess data extraction risks from bypassing existing security solutions

Reproduce external data transmission via SSH tunneling scenarios

Reproduce external data transmission via SSH tunneling scenarios

Enki Products

Enki Products

OFFen

OFFen

OFFen

No more waiting,
Vulnerability assessments

No more waiting,
Vulnerability assessments

more

more

more

ASM

ASM

ASM

Visualize every hidden threat in your asset network—no blind spots.

Visualize every hidden threat in your asset network—no blind spots.

Checklist/Offensive PT

Checklist/Offensive PT

Checklist/Offensive PT

Optimized for ISMS-P certification
Assess only what you need—specific websites, apps, or systems

Optimized for ISMS-P certification
Assess only what you need—specific websites, apps, or systems

Red Team

Red Team

Red Team

End-to-End security assessments by professional white-hat hackers through real-world attack scenarios

End-to-End security assessments by professional white-hat hackers through real-world attack scenarios

Enki Products

Enki Products

CAMP

CAMP

CAMP

A security capability growth platform that enhances your team’s practical skills and strengthens internal response—even in critical moments.

A security capability growth platform that enhances your team’s practical skills and strengthens internal response—even in critical moments.

more

more

more

Training

Training

Training

Build solid security capabilities from the ground up through practice-driven learning in digital forensics, incident response, malware analysis, web hacking, and security device operations.

Build solid security capabilities from the ground up through practice-driven learning in digital forensics, incident response, malware analysis, web hacking, and security device operations.

Wargame

Wargame

Wargame

Strengthen core skills by solving domain-specific challenges, share high-quality write-ups, and boost motivation with a ranking system.

Strengthen core skills by solving domain-specific challenges, share high-quality write-ups, and boost motivation with a ranking system.

CTF (Capture the Flag)

CTF (Capture the Flag)

CTF (Capture the Flag)

Easily set up in-house CTF environments using diverse content—even for non-specialists—and assess team-wide security capabilities.

Easily set up in-house CTF environments using diverse content—even for non-specialists—and assess team-wide security capabilities.

Attack-Defense Exercises

Attack-Defense Exercises

Attack-Defense Exercises

Strengthen organizational collaboration with real-time attack and defense drills in a virtual infrastructure that mirrors the enterprise environment, using real-world cases (TTPs, vulnerabilities, scenarios).

Strengthen organizational collaboration with real-time attack and defense drills in a virtual infrastructure that mirrors the enterprise environment, using real-world cases (TTPs, vulnerabilities, scenarios).

Enki Service

Enki Service

Offensive Security Assessments

Experienced white-hat hackers with advanced technical expertise conduct comprehensive assessments across your IT infrastructure. They identify and validate threats that could lead to financial loss, data breaches, or service disruptions, and provide actionable defense strategies.

more

Red Teaming

Compliance Audits

Penetration Testing

Remediation Checks

Cyber Threat Intelligence

Backed by the analysis of over 20,000 malware samples from North Korea, China, Russia, and beyond, our experts deliver refined threat intelligence and tailored response strategies. During incidents, we trace attacker behaviors, infiltration paths, and impact scope to eliminate root causes and strengthen defenses.

more

Malware Analysis

Digital Forensics

Security Training & Exercises

As Korea’s #1 cyber defense competition operator, we provide high-quality, real-world challenges that simulate actual incidents. With extensive penetration testing and global competition experience, we deliver the latest cybersecurity training and customized practice environments designed to equip professionals with immediately applicable skills.

more

Hands-on Training

CTF Operations

Phishing Simulations

Offensive Security Assessments

Experienced white-hat hackers with advanced technical expertise conduct comprehensive assessments across your IT infrastructure. They identify and validate threats that could lead to financial loss, data breaches, or service disruptions, and provide actionable defense strategies.

more

Red Teaming

Compliance Audits

Penetration Testing

Remediation Checks

Cyber Threat Intelligence

Backed by the analysis of over 20,000 malware samples from North Korea, China, Russia, and beyond, our experts deliver refined threat intelligence and tailored response strategies. During incidents, we trace attacker behaviors, infiltration paths, and impact scope to eliminate root causes and strengthen defenses.

more

Malware Analysis

Digital Forensics

Security Training & Exercises

As Korea’s #1 cyber defense competition operator, we provide high-quality, real-world challenges that simulate actual incidents. With extensive penetration testing and global competition experience, we deliver the latest cybersecurity training and customized practice environments designed to equip professionals with immediately applicable skills.

more

Hands-on Training

CTF Operations

Phishing Simulations

Offensive Security Assessments

Experienced white-hat hackers with advanced technical expertise conduct comprehensive assessments across your IT infrastructure. They identify and validate threats that could lead to financial loss, data breaches, or service disruptions, and provide actionable defense strategies.

more

Red Teaming

Compliance Audits

Penetration Testing

Remediation Checks

Cyber Threat Intelligence

Backed by the analysis of over 20,000 malware samples from North Korea, China, Russia, and beyond, our experts deliver refined threat intelligence and tailored response strategies. During incidents, we trace attacker behaviors, infiltration paths, and impact scope to eliminate root causes and strengthen defenses.

more

Malware Analysis

Digital Forensics

Security Training & Exercises

As Korea’s #1 cyber defense competition operator, we provide high-quality, real-world challenges that simulate actual incidents. With extensive penetration testing and global competition experience, we deliver the latest cybersecurity training and customized practice environments designed to equip professionals with immediately applicable skills.

more

Hands-on Training

CTF Operations

Phishing Simulations

Check out the latest
threat insights and reports.

more

more

more

Threat Intelligence

Kimsuky Distributing Malicious Mobile App via QR Code

In September 2025, the ENKI WhiteHat Threat Research Team detected a malicious mobile application distributed via phishing websites. The threat actor leveraged QR codes and notification pop-ups to lure victims into installing and executing the malware on their mobile devices.Our analysis confirms this sample as the latest iteration of "DOCSWAP," a malware strain originally named by S2W in March 2025. While this version retains the behavioral patterns of earlier variants, it implements a distinct internal APK decryption mechanism. Additionally, we uncovered multiple indicators connecting this activity to the DPRK-nexus threat actor, Kimsuky.Leveraging APK metadata and infrastructure overlaps, we identified three additional malicious applications and seven C&C servers. The threat actor designed each application with distinct decoy themes to deceive victims and evade suspicion.

EnkiWhiteHat

Dec 16, 2025

Threat Intelligence

Kimsuky Distributing Malicious Mobile App via QR Code

In September 2025, the ENKI WhiteHat Threat Research Team detected a malicious mobile application distributed via phishing websites. The threat actor leveraged QR codes and notification pop-ups to lure victims into installing and executing the malware on their mobile devices.Our analysis confirms this sample as the latest iteration of "DOCSWAP," a malware strain originally named by S2W in March 2025. While this version retains the behavioral patterns of earlier variants, it implements a distinct internal APK decryption mechanism. Additionally, we uncovered multiple indicators connecting this activity to the DPRK-nexus threat actor, Kimsuky.Leveraging APK metadata and infrastructure overlaps, we identified three additional malicious applications and seven C&C servers. The threat actor designed each application with distinct decoy themes to deceive victims and evade suspicion.

EnkiWhiteHat

Dec 16, 2025

Threat Intelligence

Kimsuky Distributing Malicious Mobile App via QR Code

In September 2025, the ENKI WhiteHat Threat Research Team detected a malicious mobile application distributed via phishing websites. The threat actor leveraged QR codes and notification pop-ups to lure victims into installing and executing the malware on their mobile devices.Our analysis confirms this sample as the latest iteration of "DOCSWAP," a malware strain originally named by S2W in March 2025. While this version retains the behavioral patterns of earlier variants, it implements a distinct internal APK decryption mechanism. Additionally, we uncovered multiple indicators connecting this activity to the DPRK-nexus threat actor, Kimsuky.Leveraging APK metadata and infrastructure overlaps, we identified three additional malicious applications and seven C&C servers. The threat actor designed each application with distinct decoy themes to deceive victims and evade suspicion.

EnkiWhiteHat

Dec 16, 2025

Vulnerability research

Complete Analysis of the React2Shell (CVE-2025-55182) Vulnerability

Before diving into the React2Shell vulnerability, a light understanding of the concept of React Server Component, which may be somewhat unfamiliar to security personnel, and Prototype Pollution, which may be unfamiliar to developers, is needed.React Server Component & Flight ProtocolWhen providing web services, processing the web pages displayed to users entirely on the server side and providing the completed DOM is called Server-Side Rendering (SSR). In contrast, delivering only data in an API format and processing the actual DOM composition on the user's web browser (Client-side) is called Client-Side Rendering (CSR).CSR enables a richer web service experience and interaction by providing the skeletal structure of the page to the user, while all actual DOM composition is performed on the user's web browser. However, as frontend functionalities become increasingly complex, the amount of computations that the browser needs to handle has increased, leading to greater consumption of the user's device resources and decreased user experience due to performance degradation.To address these issues, React introduced React Server Components (RSC), which handle significant portions of rendering on the server rather than the client. RSC is a technology where the execution of React components occurs on the server side, and the execution results are rendered on the client. It is a concept that combines the existing SSR and CSR, rendering the state of the new page only up to the React Component form on the server, and allowing clients to render the components, thereby reducing client-side load.Although JSON is an excellent serialization format for handling data, it is unsuitable for dealing with complex React Components. To handle React Components appropriately, it must be able to process complex types and references such as Promise, Blob, and Map, beyond simple strings, dictionaries, and arrays. Therefore, RSC uses a unique protocol and serialization format called the Flight Protocol.ExpressionTypeExampleDescription$$Escaped $"$$hello" → "$hello"Literal string starting with $$@Promise/Chunk"$@0"Reference to chunk ID 0$FServer Reference"$F0"Server function reference$TTemporary Ref"$T"Opaque temporary reference$QMap"$Q0"Map object at chunk 0$WSet"$W0"Set object at chunk 0$KFormData"$K0"FormData at chunk 0FormData object$BBlob"$B0"Blob at chunk 0Blob object$nBigInt"$n123"BigInt value$DDate"$D2024-01-01"Date object$NNaN"$N"NaN value$IInfinity"$I"Infinity$--Infinity/-0"$-I" or "$-0"Negative infinity or negative zero$uundefined"$u"Undefined value$RReadableStream"$R0"ReadableStream$0-9a-fChunk Reference"$1", "$a"Reference to chunk by hex IDPrototype PollutionObjects in Javascript are quite distinct from the object style commonly known as 'object-oriented' in Java or C++. In Javascript, when objects are created, they are not inherited from a class but from another object. In other words, new objects do not clone from a specific template (Class) but expand their functionality based on another object they reference.In this inheritance structure, a Prototype is the parent object referred to by an object, and it is the target where a lookup continues for properties or methods not directly possessed by the object. For example, in Javascript, an array uses Array.prototype as its prototype, where methods like toString and push are implemented, allowing them to be used through the prototype.Due to this characteristic of Javascript, if a property can be set on a prototype object through any means, it can seem as if newly created objects have that property set. This act of polluting the prototype or accessing it inappropriately is called Prototype Pollution. It might be a somewhat unfamiliar concept at first, but it can be easily understood through the example code below, and we'll explore Prototype Pollution in more detail later.

EnkiWhiteHat

Dec 9, 2025

Vulnerability research

Complete Analysis of the React2Shell (CVE-2025-55182) Vulnerability

Before diving into the React2Shell vulnerability, a light understanding of the concept of React Server Component, which may be somewhat unfamiliar to security personnel, and Prototype Pollution, which may be unfamiliar to developers, is needed.React Server Component & Flight ProtocolWhen providing web services, processing the web pages displayed to users entirely on the server side and providing the completed DOM is called Server-Side Rendering (SSR). In contrast, delivering only data in an API format and processing the actual DOM composition on the user's web browser (Client-side) is called Client-Side Rendering (CSR).CSR enables a richer web service experience and interaction by providing the skeletal structure of the page to the user, while all actual DOM composition is performed on the user's web browser. However, as frontend functionalities become increasingly complex, the amount of computations that the browser needs to handle has increased, leading to greater consumption of the user's device resources and decreased user experience due to performance degradation.To address these issues, React introduced React Server Components (RSC), which handle significant portions of rendering on the server rather than the client. RSC is a technology where the execution of React components occurs on the server side, and the execution results are rendered on the client. It is a concept that combines the existing SSR and CSR, rendering the state of the new page only up to the React Component form on the server, and allowing clients to render the components, thereby reducing client-side load.Although JSON is an excellent serialization format for handling data, it is unsuitable for dealing with complex React Components. To handle React Components appropriately, it must be able to process complex types and references such as Promise, Blob, and Map, beyond simple strings, dictionaries, and arrays. Therefore, RSC uses a unique protocol and serialization format called the Flight Protocol.ExpressionTypeExampleDescription$$Escaped $"$$hello" → "$hello"Literal string starting with $$@Promise/Chunk"$@0"Reference to chunk ID 0$FServer Reference"$F0"Server function reference$TTemporary Ref"$T"Opaque temporary reference$QMap"$Q0"Map object at chunk 0$WSet"$W0"Set object at chunk 0$KFormData"$K0"FormData at chunk 0FormData object$BBlob"$B0"Blob at chunk 0Blob object$nBigInt"$n123"BigInt value$DDate"$D2024-01-01"Date object$NNaN"$N"NaN value$IInfinity"$I"Infinity$--Infinity/-0"$-I" or "$-0"Negative infinity or negative zero$uundefined"$u"Undefined value$RReadableStream"$R0"ReadableStream$0-9a-fChunk Reference"$1", "$a"Reference to chunk by hex IDPrototype PollutionObjects in Javascript are quite distinct from the object style commonly known as 'object-oriented' in Java or C++. In Javascript, when objects are created, they are not inherited from a class but from another object. In other words, new objects do not clone from a specific template (Class) but expand their functionality based on another object they reference.In this inheritance structure, a Prototype is the parent object referred to by an object, and it is the target where a lookup continues for properties or methods not directly possessed by the object. For example, in Javascript, an array uses Array.prototype as its prototype, where methods like toString and push are implemented, allowing them to be used through the prototype.Due to this characteristic of Javascript, if a property can be set on a prototype object through any means, it can seem as if newly created objects have that property set. This act of polluting the prototype or accessing it inappropriately is called Prototype Pollution. It might be a somewhat unfamiliar concept at first, but it can be easily understood through the example code below, and we'll explore Prototype Pollution in more detail later.

EnkiWhiteHat

Dec 9, 2025

Vulnerability research

Complete Analysis of the React2Shell (CVE-2025-55182) Vulnerability

Before diving into the React2Shell vulnerability, a light understanding of the concept of React Server Component, which may be somewhat unfamiliar to security personnel, and Prototype Pollution, which may be unfamiliar to developers, is needed.React Server Component & Flight ProtocolWhen providing web services, processing the web pages displayed to users entirely on the server side and providing the completed DOM is called Server-Side Rendering (SSR). In contrast, delivering only data in an API format and processing the actual DOM composition on the user's web browser (Client-side) is called Client-Side Rendering (CSR).CSR enables a richer web service experience and interaction by providing the skeletal structure of the page to the user, while all actual DOM composition is performed on the user's web browser. However, as frontend functionalities become increasingly complex, the amount of computations that the browser needs to handle has increased, leading to greater consumption of the user's device resources and decreased user experience due to performance degradation.To address these issues, React introduced React Server Components (RSC), which handle significant portions of rendering on the server rather than the client. RSC is a technology where the execution of React components occurs on the server side, and the execution results are rendered on the client. It is a concept that combines the existing SSR and CSR, rendering the state of the new page only up to the React Component form on the server, and allowing clients to render the components, thereby reducing client-side load.Although JSON is an excellent serialization format for handling data, it is unsuitable for dealing with complex React Components. To handle React Components appropriately, it must be able to process complex types and references such as Promise, Blob, and Map, beyond simple strings, dictionaries, and arrays. Therefore, RSC uses a unique protocol and serialization format called the Flight Protocol.ExpressionTypeExampleDescription$$Escaped $"$$hello" → "$hello"Literal string starting with $$@Promise/Chunk"$@0"Reference to chunk ID 0$FServer Reference"$F0"Server function reference$TTemporary Ref"$T"Opaque temporary reference$QMap"$Q0"Map object at chunk 0$WSet"$W0"Set object at chunk 0$KFormData"$K0"FormData at chunk 0FormData object$BBlob"$B0"Blob at chunk 0Blob object$nBigInt"$n123"BigInt value$DDate"$D2024-01-01"Date object$NNaN"$N"NaN value$IInfinity"$I"Infinity$--Infinity/-0"$-I" or "$-0"Negative infinity or negative zero$uundefined"$u"Undefined value$RReadableStream"$R0"ReadableStream$0-9a-fChunk Reference"$1", "$a"Reference to chunk by hex IDPrototype PollutionObjects in Javascript are quite distinct from the object style commonly known as 'object-oriented' in Java or C++. In Javascript, when objects are created, they are not inherited from a class but from another object. In other words, new objects do not clone from a specific template (Class) but expand their functionality based on another object they reference.In this inheritance structure, a Prototype is the parent object referred to by an object, and it is the target where a lookup continues for properties or methods not directly possessed by the object. For example, in Javascript, an array uses Array.prototype as its prototype, where methods like toString and push are implemented, allowing them to be used through the prototype.Due to this characteristic of Javascript, if a property can be set on a prototype object through any means, it can seem as if newly created objects have that property set. This act of polluting the prototype or accessing it inappropriately is called Prototype Pollution. It might be a somewhat unfamiliar concept at first, but it can be easily understood through the example code below, and we'll explore Prototype Pollution in more detail later.

EnkiWhiteHat

Dec 9, 2025

KimJongRAT 변종 썸네일

Threat Intelligence

Kimsuky’s Ongoing Evolution of KimJongRAT and Expanding Threats

Since the 2010s, KimJongRAT has continued to surface in the wild. First designated in 2013, KimJongRAT has been consistently attributed to DPRK-nexus threat actor Kimsuky.Recently, the attacker employed KimJongRAT variants that contain only data‑theft logic while omitting C&C communication logic, distributing two branches of malware: a PE executable and a PowerShell script. ENKI WhiteHat Threat Research Team has continuously tracked this activity, identifying new infrastructure and related campaigns by the same actor.During tracking, we obtained multiple phishing emails, confirming the use of social engineering to prompt execution. The attacker abused GitHub to distribute malware, selecting either a PE executable or a PowerShell script based on predefined criteria.caption - Overview of attacker activity

EnkiWhiteHat

Nov 21, 2025

KimJongRAT 변종 썸네일

Threat Intelligence

Kimsuky’s Ongoing Evolution of KimJongRAT and Expanding Threats

Since the 2010s, KimJongRAT has continued to surface in the wild. First designated in 2013, KimJongRAT has been consistently attributed to DPRK-nexus threat actor Kimsuky.Recently, the attacker employed KimJongRAT variants that contain only data‑theft logic while omitting C&C communication logic, distributing two branches of malware: a PE executable and a PowerShell script. ENKI WhiteHat Threat Research Team has continuously tracked this activity, identifying new infrastructure and related campaigns by the same actor.During tracking, we obtained multiple phishing emails, confirming the use of social engineering to prompt execution. The attacker abused GitHub to distribute malware, selecting either a PE executable or a PowerShell script based on predefined criteria.caption - Overview of attacker activity

EnkiWhiteHat

Nov 21, 2025

KimJongRAT 변종 썸네일

Threat Intelligence

Kimsuky’s Ongoing Evolution of KimJongRAT and Expanding Threats

Since the 2010s, KimJongRAT has continued to surface in the wild. First designated in 2013, KimJongRAT has been consistently attributed to DPRK-nexus threat actor Kimsuky.Recently, the attacker employed KimJongRAT variants that contain only data‑theft logic while omitting C&C communication logic, distributing two branches of malware: a PE executable and a PowerShell script. ENKI WhiteHat Threat Research Team has continuously tracked this activity, identifying new infrastructure and related campaigns by the same actor.During tracking, we obtained multiple phishing emails, confirming the use of social engineering to prompt execution. The attacker abused GitHub to distribute malware, selecting either a PE executable or a PowerShell script based on predefined criteria.caption - Overview of attacker activity

EnkiWhiteHat

Nov 21, 2025

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.