Saturday, January 31, 2026

Kim Jong Un Oversees ‘Nuclear Trigger’ Drill in Latest Show of Force

Kim Jong Un oversaw a missile exercise to enhance North Korea's nuclear readiness, emphasizing the need for rapid response to threats.

THE VILE TRILOGY: Seoul Now Joins Pyongyang and Beijing In A New Axis of Appeasement and Disarmament

The People Power Party criticizes the Lee Jae Myung administration's North Korea policy, calling it a dangerous peace fantasy amid missile provocations.

Google Faces Backlash in South Korea Over Request to Transfer Sensitive Map Data Abroad

Academics oppose Google's map data export request, citing security risks and urging the South Korean government to reject it.

North Korean Hackers Use AI Deepfakes to Infiltrate 320 Companies, CrowdStrike Reveals

NorthKoreaNorth Korean Hackers Use AI Deepfakes to Infiltrate 320 Companies, CrowdStrike Reveals
CrowdStrike report analyzes how North Korea-linked hacker organization FAMOUS CHOLLIMA conducted cyberattacks last year (extract from the report) / News1
CrowdStrike report analyzes how North Korea-linked hacker organization FAMOUS CHOLLIMA conducted cyberattacks last year (extract from the report) / News1

A North Korean-linked hacker group leveraged generative artificial intelligence (AI) to infiltrate over 320 companies last year by posing as remote work software developers.

Global cybersecurity firm CrowdStrike disclosed this information in its 2025 Threat Hunting Report on the Monday.

The group, known as FAMOUS CHOLLIMA, primarily targeted large corporations in North America, Western Europe, and East Asia, executing extensive insider attack campaigns. The number of affected companies surged by 220% compared to the previous year.

Notably, the hackers automated their entire attack process using generative AI. They employed AI-generated fake resumes, conducted deepfake interviews, and used fabricated identities to complete tasks, thereby effectively infiltrating corporate networks.

Even after gaining access, they masked their limited English proficiency by utilizing AI agent code and translation tools.

CrowdStrike reported that FAMOUS CHOLLIMA disseminated seven types of malware, continually tweaking file download and execution methods to evade detection. Their operational speed far exceeds that of other state-sponsored groups.

The firm also highlighted that numerous global hackers are now launching swift and sophisticated cyberattacks using generative AI.

Analysts suggest that these hackers are specifically targeting the autonomous AI agents recently adopted by many companies. They exploit vulnerabilities in AI agent development tools to steal internal access rights and credentials, resulting in an increase in malware distribution cases.

The ability to rapidly develop malware using AI presents yet another significant challenge. In some cases, less than 24 hours elapsed between initial infiltration and ransomware deployment.

Meanwhile, cloud breach attacks have risen by 136% compared to the previous year, with 40% of these incidents attributed to Chinese-linked groups. Notable attack groups, such as Genesis Panda and Mucky Panda, have evaded detection by exploiting cloud configuration errors and trusted access rights.

Adam Meyers, Senior Vice President of CrowdStrike’s Attack Response Operations, stated that attackers are targeting AI agents by exploiting software-as-a-service (SaaS) platforms, cloud consoles, and advanced privilege accounts.

Check Out Our Content

Check Out Other Tags:

Most Popular Articles