Event JSON
{
"id": "d462440137c4c8b23c9b3667db71c4ce33af5bc216831e1740227a32d645fbfa",
"pubkey": "c65691145402e71ffc943862badf66302e47b37f5285441c6ccc592cc114408d",
"created_at": 1719020368,
"kind": 1,
"tags": [
[
"p",
"f7d0478e54eaa6e0cc98adf81d712148bce169a2c21b1c0f7a4ed446c6adc09e",
"wss://relay.mostr.pub"
],
[
"p",
"f6870afcde4480ec8508f50304859e14a51309ff24ab3f0f862c52bdc4af8747",
"wss://relay.mostr.pub"
],
[
"e",
"1d727e9bc4abc64b6466c661601e580fcf2ede6fb130e305948436c698742746",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://infosec.exchange/users/screaminggoat/statuses/112657718863553021",
"activitypub"
]
],
"content": "nostr:npub17lgy0rj5a2nwpnyc4hup6ufpfz7wz6dzcgd3crm6fm2yd34dcz0qlk9uux Genians (Korean company) first reported Kimsuky APT using the MSC attack vector on 05 June 2024: https://www.genians.co.kr/blog/threat_intelligence/facebook (Korean language)",
"sig": "fbc7eb062f85a655ef52faee03f4ce1fa04ddb9f47f1424f3ec223f6a2ad26c0eb85f7139eaeb84c49027a64fdda619af1ca7a8e23553d64c7bc5b229b6eedee"
}