North Korea's APT37 deploys FadeStealer to steal information from its targets. Apple patches vulnerabilities under active exploitation. Access to a US satellite is being hawked in a Russophone cybercrime forum. Russian hacktivist auxiliaries say they\u2019ve disrupted IFC.org. Unmasking pig-butchering scams. Social engineering as a method of account takeover. Fraudsters seen abusing generative AI. Sergey Medved from Quest Software describes the \u201cGreat Cloud Repatriation\u201d. Mark Ryland of AWS speaks with Rick Howard about software defined perimeters. And embedded URLs in malware.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/12/119\n\nSelected reading.\nRedEyes Group Wiretapping Individuals (APT37) (Ahn Lab)\nApple fixes iPhone software flaws used in widespread hacks of Russians (The Washington Post)\nApple issues emergency patch to address alleged spyware vulnerability (Cyberscoop)\nApple patch fixes zero-day kernel hole reported by Kaspersky \u2013 update now! (Sophos)\nMilitary Satellite Access Sold on Russian Hacker Forum for $15,000 (HackRead)\nWell done. Russian hackers shut down the IMF (Dzen.ru)\nWhy Malware Crypting Services Deserve More Scrutiny (KrebsOnSecurity)\nUnmasking Pig-Butchering Scams And Protecting Your Financial Future (Trend Micro)\nClassic Account Takeover via the Direct Deposit Change (Avanan)\nQ2 2023 Digital Trust & Safety Index (Sift)\nCompromised Domains account for over 50% of Embedded URLs in Malware Phishing Campaigns (Cofense)\nLearn more about your ad choices. Visit megaphone.fm/adchoices