North Korea’s Kimsuky Taps Trusted Platforms to Attack South Korea admin Uncategorized February 19, 2025 The campaign heavily uses Dropbox folders and PowerShell scripts to evade detection and quickly scrapped infrastructure components after researchers began poking around.