Crime ❯ Cybercrime ❯ Identity Theft
Malware-Free Attacks
A controlled ANY.RUN sandbox posing as a developer laptop revealed a DPRK-linked workflow built for identity takeover with quiet persistence.