North Korean hackers stole sensitive information from Microsoft users

North Korean hackers stole sensitive information from Microsoft users

Assessment

Interactive Video

Science, Information Technology (IT), Architecture

11th Grade - University

Hard

Created by

Quizizz Content

FREE Resource

The transcript discusses a hacking operation named Thallium, where hackers used 50 domains to conduct cyber attacks. They sent spear phishing emails pretending to be from Microsoft, leading users to phishing pages to steal credentials. Once accessed, hackers could review emails and install malware like Kim Jong Rat and Baby Shark, which are remote access Trojans. These Trojans exfiltrate data and await further commands. The operation mainly targeted users in the US, Japan, and South Korea.

Read more

5 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What operation were the hackers involved in according to the text?

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 1 pt

What method did the hackers use to deceive users into providing their account credentials?

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

3 mins • 1 pt

What was the purpose of the misleading domains used by the hackers?

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

3 mins • 1 pt

What types of malware were mentioned in the text that were used by the hackers?

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 1 pt

Which countries were most targeted by the hackers according to the report?

Evaluate responses using AI:

OFF