When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

From there, the recruiter shares a feedback document, which infects the victim with malware.

Hacker silhouette working on a laptop with North Korean flag on the background