Security researchers: Here's how the Lazarus hackers start their attacks

Here’s how North Korea’s Lazarus hackers use LinkedIn to reach targets and Office macros to compromise hosts.

Article Link: Security researchers: Here's how the Lazarus hackers start their attacks | ZDNet