Skip to Main Content
How we’re protecting users from government-backed attacks from North Korea
["How is Gemini changing Maps?", "What is \"vibe design?\"", "How can I learn new AI skills?"]

Threat Analysis Group

How we’re protecting users from government-backed attacks from North Korea



Picture of a phishing landing page

Drive-themed phishing landing page ARCHIPELAGO used in combination with “interview request” phishing emails.

picture of a Microsoft themed landing page

Microsoft 365-themed credential harvesting page

Picture of a document requesting an interview

After the recipient enters their password into the phishing page, they are redirected to a document with interview questions or an RFI as promised in the original phishing email

ARCHIPELAGO “browser-in-the-browser” phishing page

picture of a a phishing page

Example from 2015 of an ARCHIPELAGO phishing email

image of a phishing email

ARCHIPELAGO used legitimate cloud storage services to host benign PDFs with phishing links inside

image of a cloud storage service with phishing links

ARCHIPELAGO phishing email with a password-protected attachment. The password for decrypting the attachment is included in the body of the phishing email.

image of a phishing email