Alerts
Events
DCR
Explore Cyware Products
Alerts
Events
DCR
Go to listing page
North Korean Hackers Exploit Two MITRE Sub-Techniques: Phantom DLL Hijacking, TCC Abuse
Threat Actors
April 13, 2024
Dark Reading
The first, not entirely new, sub-technique involves manipulation of Transparency, Consent, and Control (TCC), a security protocol that regulates application permissions on Apple's macOS.
Read More
North Korean hackers
Transparency, Consent, and Control (TCC)
TCC Manipulation
Phantom DLL Hijacking
Privileged Access
Publisher
Previous
Telegram Fixes Windows App Zero-Day Used to Launch Pyth ...
Malware and Vulnerabilities
Next
FBI Warns of Massive Wave of Road Toll SMS Phishing Att ...
Threat Intel & Info Sharing