Skip to main content

Command Palette

Search for a command to run...

DPRK Attack Campaign: Abusing LNK Files and GitHub C2 Targeting South Korea

Published
19 min read
DPRK Attack Campaign: Abusing LNK Files and GitHub C2 Targeting South Korea

1. Executive Summary

In early April 2026, FortiGuard Labs disclosed an attack campaign linked to the Democratic People's Republic of Korea (DPRK), primarily targeting organizations in South Korea. This campaign is notable for abusing GitHub — a globally trusted platform — as Command and Control (C2) infrastructure, allowing malicious traffic to blend seamlessly with legitimate activity and bypass conventional security controls.

The initial vector is a Windows LNK (shortcut) file disguised as a legitimate PDF document, distributed via spearphishing emails targeting employees at South Korean companies. When a victim opens the file, a multi-stage attack chain is triggered: the LNK decodes and silently executes a PowerShell script that performs environment checks, establishes persistence via a Scheduled Task, and exfiltrates system information to GitHub using private repositories.

The campaign has been traced back to at least 2024, with earlier versions linked to the distribution of XenoRAT. The latest iterations remove identifying metadata, increase obfuscation, and expand the network of GitHub accounts used for C2. LNK file metadata — particularly the "Hangul Document" naming pattern — suggests ties to North Korean state-sponsored APT groups including Kimsuky, APT37, and Lazarus.

Risk to organizations running Windows with email-exposed users: HIGH. No zero-day vulnerability is required — a single click on an LNK file initiates the attack chain. GitHub is routinely whitelisted in enterprise environments, making exfiltration difficult to detect through conventional domain-based filtering.


2. Threat Information

2.1 Campaign Overview

Attribute Details
Campaign Name DPRK LNK-GitHub C2 Campaign
Threat Actor DPRK-affiliated (Kimsuky / APT37 / Lazarus — no definitive attribution)
Geographic Target South Korea
Targeted Sectors Finance, technology, investment, blockchain/AI (based on decoy PDF titles)
Activity Period At least since 2024; escalating activity in early 2026
Discovered By FortiGuard Labs (Cara Lin) — published April 2, 2026
Severity HIGH
Primary Source FortiGuard Labs

2.2 Attribution

Metadata extracted from LNK files — specifically the "Hangul Document" pattern in the Name field — is consistent with techniques used by North Korean state-sponsored APT groups: Kimsuky, APT37, and Lazarus. The use of GitHub C2 to distribute XenoRAT and its MoonPeak variant was previously documented by ENKI and Trellix and attributed to Kimsuky. AhnLab has also reported a similar LNK-based infection chain from Kimsuky leading to a Python-based backdoor.

⚠️ Note: Attribution has not been definitively confirmed. FortiGuard Labs describes this as "DPRK-related" — it may involve multiple groups sharing TTPs or infrastructure.

2.3 Targeting Profile

Based on decoy PDF titles collected from attack samples, the threat actor is targeting companies in:

  • AI / Blockchain Technology: TRAMS WINBOT AI Strategic Proposal.pdf.lnk

  • Investment / Funds: 상세 제안서 - 미래에셋 X AYC Fund.pdf.lnk (Mirae Asset × AYC Fund)

  • Fintech / Web3: (CONFIDENTIAL) AIN x Mine Korea 2026.pdf.lnk

  • Security / IOTRUST: CONFIDENTIAL IOTRUST OFFER.pdf.lnk

The strategic objective appears to be long-term surveillance and intelligence collection against South Korean organizations — not immediate destructive impact.


3. Technical Analysis

3.1 Initial Access Vector

Spearphishing emails carry obfuscated LNK files disguised as standard PDF documents. When the victim clicks the file, a decoy PDF is displayed to avoid suspicion while the malicious PowerShell script executes silently in the background.

LNK file containing an embedded PowerShell script — Source: FortiGuard Labs

Figure 1: LNK file containing an embedded PowerShell script — Source: FortiGuard Labs

3.2 Stage 1 — LNK File (Loader)

Evolution across versions:

Early versions (2024): Simple character concatenation used to conceal the GitHub C2 address and access token. Easily detectable — the script was clearly designed to execute a PowerShell command fetched from GitHub.

Intermediate versions: Basic character decoding functions added. Metadata still present: file name, size, modification date, and notably the "Name" field frequently reads "Hangul Document" — a reliable threat-hunting pivot.

LNK file with residual metadata still intact — Source: FortiGuard Labs

Figure 2: Intermediate version LNK file — "Hangul Document" metadata still present — Source: FortiGuard Labs

Latest versions (2026): All identifying metadata has been removed. Only a decoding function p1 remains in the LNK arguments, accepting three parameters: location, length, and an XOR key. This function decodes both the decoy PDF and the PowerShell script for the next stage.

Latest version LNK file with encoded payload — Source: FortiGuard Labs

Figure 3: Latest LNK version — payload encoded, metadata removed — Source: FortiGuard Labs

3.3 Stage 2 — PowerShell Script (Core Malware)

The PowerShell script decoded from the LNK performs four primary tasks:

a) Anti-Analysis / Sandbox Evasion

The script scans the running process list to detect VMs, debuggers, and forensic tools. The list includes over 40 processes:

vmxnet, vmusrvc, vmsrvc, vmtoolsd, vmwaretray, vboxservice, vboxtray,
idaq, idaq64, autoruns, dumpcap, de4dot, hookexplorer, ilspy, lordpe,
dnspy, petools, autorunsc, resourcehacker, filemon, regmon,
procexp, procexp64, tcpview, tcpview64, Procmon, Procmon64,
vmmap, vmmap64, portmon, processlasso, Wireshark, Fiddler,
ida, ida64, ImmunityDebugger, WinDump, x64dbg, x32dbg, OllyDbg, ProcessHacker

If any process in the list is detected → the script terminates immediately.

Script checking running processes to detect analysis environments — Source: FortiGuard Labs

Figure 4: PowerShell script scanning for sandbox/debugger processes — Source: FortiGuard Labs

b) Payload Deployment

Once a clean environment is confirmed, the script:

  • Reconstructs and Base64-decodes a series of encoded strings

  • Saves the plaintext payload to a randomly named folder within %Temp%

  • Drops a VBScript file

VBScript dropped into the Temp directory — Source: FortiGuard Labs

Figure 5: VBScript dropped into %Temp% — Source: FortiGuard Labs

c) Persistence via Scheduled Task

$action = New-ScheduledTaskAction -Execute 'wscript.exe' `
  -Argument ('"' + $vbsFilePath + '"')
$trigger = New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(5) `
  -RepetitionInterval (New-TimeSpan -Minutes 30)
$settings = New-ScheduledTaskSettingsSet -Hidden
Register-ScheduledTask `
  -TaskName "Technical Paper for Creata Chain Task S-1-12-12-3-1231241245BVSKLERh-SD234GHSI56" `
  -Action \(action -Trigger \)trigger -Settings $settings

The task runs wscript.exe against the VBScript every 30 minutes, with a task name crafted to resemble a legitimate technical document reference.

d) Initial Exfiltration — System Information

The script collects:

  • OS version and build number

  • Last boot time

  • List of currently running processes

Data is saved in the format: <timestamp>-<IP_address>-BEGIN.log, then uploaded to GitHub:

hxxps://api[.]github[.]com/repos/motoralis/singled/contents/kcca/technik

Using a hardcoded access token: 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

Script collecting system information and uploading to GitHub — Source: FortiGuard Labs

Figure 6: Script exfiltrating system information to GitHub via API — Source: FortiGuard Labs

3.4 C2 Infrastructure

The threat actor operates a strategically managed network of GitHub accounts:

GitHub Account Role Status
motoralis Primary operational hub — repo singled Actively used since 2025
God0808RAMA Secondary C2 Active
Pigresy80 Secondary C2 Active
entire73 Dormant / Backup Largely inactive for months
pandora0009 Secondary C2 Active
brandonleeodd93-blip Newly activated — redundancy Activated weeks ago

Infrastructure strategy:

  • Private repositories → payloads and exfiltrated logs hidden from public view

  • Traffic flows over HTTPS to github.com → blends with normal developer activity

  • GitHub is commonly whitelisted in enterprise environments → exfiltration goes unblocked

Attacker's primary GitHub account (motoralis) — Source: FortiGuard Labs

Figure 7: GitHub account motoralis — primary C2 hub with activity surge coinciding with LNK phishing waves — Source: FortiGuard Labs

3.5 Stage 3 — PowerShell Script (Live C2 Channel)

The Stage 3 script maintains a persistent C2 connection:

hxxps://raw[.]githubusercontent[.]com/motoralis/singled/main/kcca/paper[.]jim

Executed periodically via the Scheduled Task established earlier, this enables the attacker to:

  • Deliver additional modules or instructions

  • Execute remote commands

  • Monitor the victim over an extended period

PowerShell script maintaining a persistent C2 channel to GitHub — Source: FortiGuard Labs

Figure 8: Stage 3 PowerShell script maintaining C2 channel via raw.githubusercontent.com — Source: FortiGuard Labs

Keep-alive script: Collects network configuration and uploads logs periodically:

hxxps://api[.]github[.]com/repos/motoralis/singled/contents/jjyun/network/<Date>_<Time>-<IP_Address>-Real.log
Keep-alive script collecting network configuration and uploading to GitHub — Source: FortiGuard Labs

Figure 9: Keep-alive script logging network config in Date_Time-IP-Real.log format — Source: FortiGuard Labs

3.6 Kill Chain / Attack Flow

Step Phase Detailed Action MITRE ID
1 Initial Access Spearphishing email sent with LNK attachment disguised as PDF T1566.001
2 Execution Victim clicks → LNK silently executes PowerShell, displays decoy PDF T1204.002, T1059.001
3 Defense Evasion LNK decodes payload using XOR function p1(location, length, xorKey) T1027
4 Defense Evasion PowerShell scans process list, terminates if sandbox/debugger detected T1497.001
5 Execution PowerShell Base64-decodes VBScript, drops to %Temp%\<random>\ T1059.005, T1140
6 Persistence Scheduled Task created to run VBScript every 30 minutes T1053.005
7 Discovery Collects OS version, last boot time, running process list T1082, T1057
8 Exfiltration Uploads BEGIN.log to GitHub API (motoralis/singled/kcca/technik) T1567.001
9 C2 Fetches instructions from raw.githubusercontent.com/motoralis/singled/main/kcca/paper.jim T1102.002
10 Collection Keep-alive script periodically collects network configuration T1016
11 Exfiltration Periodically uploads Real.log to GitHub in Date_Time-IP-Real.log format T1567.001
Full attack chain from LNK to persistent C2 — Source: FortiGuard Labs

Figure 10: Complete attack chain — from phishing LNK to persistent GitHub C2 — Source: FortiGuard Labs


4. TTPs — MITRE ATT&CK

Tactic Technique ID Technique Name Campaign Context
Initial Access T1566.001 Spearphishing Attachment LNK file attached to phishing email, disguised as a legitimate PDF
Execution T1204.002 User Execution: Malicious File Victim manually opens the LNK file
Execution T1059.001 PowerShell PowerShell script runs silently as soon as LNK is opened
Execution T1059.005 VBScript VBScript dropped and executed by wscript.exe
Defense Evasion T1027 Obfuscated Files or Information XOR encoding in LNK arguments; Base64 encoding for VBScript payload
Defense Evasion T1140 Deobfuscate/Decode Files or Information Function p1 XOR-decodes payload directly within the LNK
Defense Evasion T1497.001 Virtualization/Sandbox Evasion: System Checks Scans 40+ analysis processes, terminates if detected
Defense Evasion T1218.005 System Binary Proxy Execution: wscript Uses wscript.exe to execute VBScript — avoids dropping PE files
Persistence T1053.005 Scheduled Task/Job: Scheduled Task "Technical Paper for Creata Chain Task..." runs every 30 minutes
Discovery T1082 System Information Discovery Collects OS version, build number, last boot time
Discovery T1057 Process Discovery Enumerates running processes, writes to BEGIN.log
Discovery T1016 System Network Configuration Discovery Keep-alive script collects network configuration
Collection T1074.001 Data Staged: Local Data Staging Log files staged in %Temp% prior to exfiltration
Command & Control T1102.002 Web Service: Bidirectional Communication GitHub API used for both receiving instructions and exfiltration
Exfiltration T1567.001 Exfiltration Over Web Service: GitHub BEGIN.log and Real.log uploaded to private GitHub repository

5. Severity Assessment

Level: HIGH

Criterion Assessment Notes
Impact Scope High Targets multiple sectors in South Korea; potential for regional expansion
Sophistication High LolBins, XOR encoding, sandbox evasion, GitHub C2, private repositories
Detectability Difficult Traffic hidden within HTTPS to github.com — routinely whitelisted
Actual Impact Medium–High System information exfiltration; potential escalation to long-term espionage
Exploitation Requirements Low Only requires a user click — no zero-day vulnerability needed
Persistence Level High Scheduled Task every 30 minutes, keep-alive mechanism, multiple backup GitHub accounts

6. Analysis & Forecast

This section reflects analyst assessments based on collected data combined with current threat landscape context. Inferential assessments are explicitly labeled.

6.1 Campaign Assessment

This campaign reflects a deliberate shift by DPRK-linked APT groups away from deploying complex custom malware toward a "minimum footprint" model — prioritizing native Windows tools (PowerShell, VBScript, Scheduled Tasks) and trusted cloud services (GitHub). This evolution is consistent with trends observed from Kimsuky and Lazarus over the past 18 months.

The use of GitHub is not opportunistic — it represents a calculated architectural decision: GitHub holds a valid TLS certificate, maintains stable IP ranges, and is almost never blocked in corporate environments. Private repositories ensure that payloads and stolen data remain hidden from public view. This C2 model is particularly difficult to address: blocking GitHub entirely would disrupt legitimate organizational operations.

The "keep-alive with network logs" pattern suggests the objective is not immediate destructive action but sustained persistent access for long-term intelligence collection — consistent with the profile of Kimsuky, known for espionage campaigns focused on South Korea.

6.2 Likely Next Targets (Analyst Assessment)

Based on decoy PDF titles collected (AI strategic proposals, investment funds, blockchain):

  • High probability: Technology startups, venture capital firms, and fintech organizations in South Korea will remain priority targets — aligned with DPRK's need for economic intelligence gathering.

  • Medium probability: The campaign may expand to Japan and Taiwan — adjacent technology/investment markets with similar target profiles.

  • Watch for: If GitHub is widely blocked or detected, the threat actor may pivot to GitLab, Bitbucket, or Azure DevOps as alternative C2 platforms — a pattern observed in similar campaigns.

6.3 Risk to Organizations Outside South Korea

The current campaign is clearly focused on South Korea. However:

  • Indirect risk exists for organizations with partners, subsidiaries, or joint ventures in South Korea — phishing emails may propagate along supply chains.

  • Organizations in technology, blockchain, and international investment sectors should remain alert — DPRK APT groups have a history of expanding targeting once TTPs are proven effective in a region.

  • Any organization that whitelists GitHub in its egress policy carries latent risk if a similar campaign targets it directly.

6.4 Broader Threat Landscape Implications

This campaign is part of a larger trend: APT groups increasingly leveraging legitimate cloud services (GitHub, OneDrive, Google Drive, Dropbox, Notion) as C2 to bypass defenses based on domain reputation and TLS inspection. This poses a fundamental challenge to traditional perimeter-based defense models.

The "LolBins + trusted cloud C2" methodology carries a significantly lower detection rate than custom malware and is being adopted by multiple APT groups — not exclusively DPRK-linked actors.


7. Recommendations & Defensive Measures

7.1 Immediate Actions (0–24h)

Threat Hunting — search for current indicators of compromise:

// KQL — Find abnormal Scheduled Tasks containing wscript.exe and VBS in Temp
DeviceProcessEvents
| where ProcessCommandLine has_all ("wscript.exe", "Temp")
| where InitiatingProcessFileName in~ ("svchost.exe", "taskeng.exe", "taskhostw.exe")
| project Timestamp, DeviceName, ProcessCommandLine, InitiatingProcessCommandLine
| order by Timestamp desc
// KQL — Find PowerShell calling GitHub API (exfiltration pattern)
DeviceNetworkEvents
| where RemoteUrl has "api.github.com/repos"
| where InitiatingProcessFileName =~ "powershell.exe"
| project Timestamp, DeviceName, RemoteUrl, InitiatingProcessCommandLine
| order by Timestamp desc
// KQL — Find LNK file execution spawning obfuscated PowerShell
DeviceProcessEvents
| where InitiatingProcessFileName =~ "explorer.exe"
| where FileName =~ "powershell.exe"
| where ProcessCommandLine has_any ("-enc", "-EncodedCommand", "XOR", "FromBase64String")
| project Timestamp, DeviceName, ProcessCommandLine, InitiatingProcessCommandLine

Check Scheduled Tasks:

# Find abnormal Scheduled Tasks containing wscript.exe
Get-ScheduledTask | Where-Object {
    $_.Actions.Execute -like "*wscript*" -or
    $_.Actions.Arguments -like "*Temp*"
} | Select-Object TaskName, TaskPath, @{n='Execute';e={$_.Actions.Execute}} | Format-List

Block/Report C2-linked GitHub Accounts:

Contact GitHub Security to report and request suspension of: motoralis, God0808RAMA, Pigresy80, entire73, pandora0009, brandonleeodd93-blip

Revoke the compromised GitHub token:

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

→ This token has been publicly disclosed. Verify whether it appears in your environment.

7.2 Detection Rules

Sigma Rule — LNK File Spawning Encoded PowerShell:

title: LNK File Spawning Obfuscated PowerShell
id: a1b2c3d4-e5f6-7890-abcd-ef1234567890
status: experimental
description: Detects LNK file spawning PowerShell with encoded/obfuscated command — pattern of DPRK LNK campaigns
references:
  - https://www.fortinet.com/blog/threat-research/dprk-related-campaigns-with-lnk-and-github-c2
author: SOC Analyst Team
date: 2026-04-10
tags:
  - attack.initial_access
  - attack.t1566.001
  - attack.execution
  - attack.t1059.001
  - attack.defense_evasion
  - attack.t1027
logsource:
  category: process_creation
  product: windows
detection:
  selection:
    ParentImage|endswith: '\explorer.exe'
    Image|endswith: '\powershell.exe'
    CommandLine|contains:
      - '-enc '
      - '-EncodedCommand'
      - 'FromBase64String'
      - 'XOR'
  lnk_parent:
    ParentCommandLine|contains: '.lnk'
  condition: selection and lnk_parent
falsepositives:
  - Legitimate admin scripts executed from shortcut files
level: high

Sigma Rule — Suspicious Scheduled Task with VBScript in Temp:

title: Suspicious Scheduled Task VBScript Temp Execution
id: b2c3d4e5-f6a7-8901-bcde-f12345678901
status: experimental
description: Detects Scheduled Task running wscript.exe with VBScript in %Temp% — persistence mechanism of DPRK campaign
references:
  - https://www.fortinet.com/blog/threat-research/dprk-related-campaigns-with-lnk-and-github-c2
author: SOC Analyst Team
date: 2026-04-10
tags:
  - attack.persistence
  - attack.t1053.005
  - attack.execution
  - attack.t1059.005
logsource:
  category: process_creation
  product: windows
detection:
  selection:
    ParentImage|endswith:
      - '\svchost.exe'
      - '\taskeng.exe'
      - '\taskhostw.exe'
    Image|endswith: '\wscript.exe'
    CommandLine|contains:
      - '\Temp\'
      - '\AppData\Local\Temp\'
  condition: selection
falsepositives:
  - Legitimate software using wscript in temp (rare)
level: high

Sigma Rule — GitHub API Exfiltration via PowerShell:

title: PowerShell Exfiltration to GitHub API
id: c3d4e5f6-a7b8-9012-cdef-123456789012
status: experimental
description: Detects PowerShell sending data to GitHub API — exfiltration pattern of DPRK campaign
references:
  - https://www.fortinet.com/blog/threat-research/dprk-related-campaigns-with-lnk-and-github-c2
author: SOC Analyst Team
date: 2026-04-10
tags:
  - attack.exfiltration
  - attack.t1567.001
  - attack.command_and_control
  - attack.t1102.002
logsource:
  category: network_connection
  product: windows
detection:
  selection:
    Image|endswith: '\powershell.exe'
    DestinationHostname|contains:
      - 'api.github.com'
      - 'raw.githubusercontent.com'
    DestinationPort: 443
  filter_legitimate:
    CommandLine|contains:
      - 'chocolatey'
      - 'winget'
      - 'scoop'
  condition: selection and not filter_legitimate
falsepositives:
  - Legitimate DevOps automation via PowerShell
level: medium

7.3 Long-Term Prevention

Email & File:

  • Configure email gateways to block or quarantine .lnk files attached to emails from external senders

  • Enable Content Disarm and Reconstruction (CDR) where available to strip active code from files before delivery

  • Conduct security awareness training on LNK files disguised as PDFs — this remains a highly effective phishing technique

PowerShell & Scripting:

  • Enable PowerShell Script Block Logging and Module Logging across all endpoints

  • Enforce Constrained Language Mode for PowerShell on non-administrative workstations

  • Monitor wscript.exe and cscript.exe execution — especially when the parent process is svchost.exe

GitHub & Cloud C2:

  • Do not block GitHub entirely (operational disruption risk) — instead:

    • Monitor and alert when PowerShell or script processes call api.github.com or raw.githubusercontent.com

    • Implement User and Entity Behavior Analytics (UEBA) to detect anomalous GitHub API calls

    • Enforce SSL/TLS inspection for GitHub traffic where policy permits

Scheduled Tasks:

  • Monitor creation of new Scheduled Tasks, particularly those invoking wscript.exe with paths in %Temp%

  • Restrict Scheduled Task creation rights for non-administrative users where not operationally required

7.4 References


8. Indicators of Compromise (IOCs)

Note: URLs and domains are defanged (brackets around .) to prevent accidental activation. Revoke the listed token if found in your environment.

8.1 Domain / URL — C2 Endpoints

URL Description Source
hxxps://api[.]github[.]com/repos/motoralis/singled/contents/kcca/technik Upload initial system log (BEGIN.log) FortiGuard Labs
hxxps://raw[.]githubusercontent[.]com/motoralis/singled/main/kcca/paper[.]jim Fetch C2 instructions / additional modules FortiGuard Labs
hxxps://api[.]github[.]com/repos/motoralis/singled/contents/jjyun/network/<Date>_<Time>-<IP_Address>-Real.log Upload network keep-alive logs FortiGuard Labs
hxxps://api[.]github[.]com/repos/motoralis Primary C2 repository root FortiGuard Labs

8.2 GitHub Accounts — C2 Infrastructure

Account Role Notes
motoralis Primary C2 hub Active since 2025
God0808RAMA Secondary Active
Pigresy80 Secondary Active
entire73 Dormant backup Largely inactive
pandora0009 Secondary Active
brandonleeodd93-blip Newly activated Redundancy

8.3 Credentials — C2 Access Token

Type Value Notes
GitHub Personal Access Token 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 Hardcoded in PowerShell script. Publicly disclosed — revoke if present in environment

8.4 File Hashes — LNK Files (SHA-256)

SHA-256 Filename Notes
af0309aa38d067373c54b2a7774a32f68ab72cb2dbf5aed74ac784b079830184 TRAMS WINBOT AI Strategic Proposal.pdf.lnk AI/Tech lure
9c3f2bd300ad2ef8584cc48adc47aab61bf85fc653d923e106c73fc6ec3ea1dc 전략적 파트너십 상세 제안서.pdf.lnk Partnership Proposal lure
f20fde3a9381c22034f7ecd4fef2396a85c05bfd54f7db3ad6bcd00c9e09d421 상세 제안서 - 미래에셋 X AYC Fund.pdf.lnk Investment Fund lure
484a16d779d67c7339125ceac10b9abf1aa47f561f40058789bfe2acda548282 CONFIDENTIAL IOTRUST OFFER.pdf.lnk Security Offer lure
c0866bb72c7a12a0288f434e16ba14eeaa35d3c4cff4a86046c553c15679c0b5 (CONFIDENTIAL) AIN x Mine Korea 2026.pdf.lnk Web3/Blockchain lure

8.5 File System Artifacts

Path Description
%Temp%\<random_folder>\ VBScript and payload drop directory
%Temp%\<timestamp>-<IP>-BEGIN.log Initial system info exfiltration log
Scheduled Task: Technical Paper for Creata Chain Task S-1-12-12-3-* Persistence mechanism — runs wscript.exe every 30 minutes

8.6 Malware Detection Signature

Vendor Signature Name
FortiGuard Antivirus LNK/Agent.ALN!tr

More from this blog

F

FPT IS Security

731 posts

Dedicated to providing insightful articles on cybersecurity threat intelligence, aimed at empowering individuals and organizations to navigate the digital landscape safely.