The hackers "obfuscated the true source of the malware by emulating code used by a North Korean group, creating the potential for misattribution," …

This article was originally published here