North Korean threat actors have been observed sending phishing to compromise targets and obtain access to a victim's KakaoTalk desktop application to distribute malicious payloads to certain contacts.
If you're a penetration tester, red teamer, or security engineer, this book gives you patterns that you can adapt to your environment.