Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Two days after OpenAI’s Atlas, Microsoft reboots nearly identical AI browser

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » North Korean hacker lures defense engineer with fake job to steal drone secrets
Identity

North Korean hacker lures defense engineer with fake job to steal drone secrets

userBy userOctober 23, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 23, 2025Rabi LakshmananCyber ​​espionage/threat intelligence

A new wave of attacks targeting European companies in the defense industry, part of a long-running campaign known as Operation Dream Job, is believed to be the work of attackers with ties to North Korea.

“Some of these companies are heavily involved in the unmanned aerial vehicle (UAV) space, suggesting that this operation may be related to North Korea’s current efforts to expand its drone program,” ESET security researchers Peter Kalnai and Alexis Lapin said in a report shared with Hacker News.[companies’areheavilyinvolvedintheunmannedaerialvehicle(UAV)sectorsuggestingthattheoperationmaybelinkedtoNorthKorea’scurrenteffortstoscaleupitsdroneprogram”ESETsecurityresearchersPeterKálnaiandAlexisRapinsaidinareportsharedwithTheHackerNews[companies’areheavilyinvolvedintheunmannedaerialvehicle(UAV)sectorsuggestingthattheoperationmaybelinkedtoNorthKorea’scurrenteffortstoscaleupitsdroneprogram”ESETsecurityresearchersPeterKálnaiandAlexisRapinsaidinareportsharedwithTheHackerNews

The ultimate goal of this campaign is assessed to be to steal sensitive information and manufacturing know-how using malware families such as ScoringMathTea and MISTPEN. A Slovak cybersecurity company said it observed a campaign starting in late March 2025.

DFIR retainer service

Targeted companies include a metal engineering company in Southeastern Europe, an aircraft parts manufacturer in Central Europe, and a defense company in Central Europe.

ScoringMathTea (also known as ForestTiger) was previously observed by ESET in early 2023 in connection with cyberattacks targeting an Indian technology company and a Polish defense contractor, while MISTPEN was documented by Google Mandiant in September 2024 as part of an intrusion targeting companies in the energy and aerospace sectors. ScoringMathTea first appeared back in October 2022.

First exposed by Israeli cybersecurity firm ClearSky in 2020, Operation Dream Job is a sustained attack campaign launched by a prolific North Korean hacker group called Lazarus Group, which has also been tracked as APT-Q-1, Black Artemis, Diamond Sleet (formerly Zinc), Hidden Cobra, TEMP.Hermit, and UNC2970. The hacker group is believed to have been active since at least 2009.

In these attacks, attackers use social engineering lures similar to infection interviews to approach potential targets with high-paying job opportunities and trick them into infecting their systems with malware. This campaign also shows overlap with clusters tracked as DeathNote, NukeSped, Operation In(interception), and Operation North Star.

ESET researchers said: “The main theme is lucrative but fake job offers with malware aspects. Targets receive a decoy document with a job description and a trojanized PDF reader to open it.”

CIS build kit

This attack chain leads to binary execution. This binary is responsible for sideloading a malicious DLL that drops ScoringMathTea and an advanced downloader codenamed BinMergeLoader that functions similarly to MISTPEN and uses Microsoft Graph APIs and tokens to retrieve additional payloads.

An alternative infection sequence is known to utilize an unknown dropper to deliver two intermediate payloads, with the first loading the latter. The end result is the deployment of ScoringMathTea, an advanced RAT that supports approximately 40 commands for complete control over compromised machines.

“For nearly three years, Lazarus has maintained a consistent modus operandi, deploying its main recommended payload, ScoringMathTea, and using similar techniques to Trojanize open source applications,” ESET said. “This predictable yet effective strategy provides enough polymorphism to evade security detection, even if it is insufficient to hide group identity and obfuscate the attribution process.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSora update brings AI pet videos, new social features, and Android version coming soon
Next Article US government charges former L3Harris cyber chief with trade secret theft
user
  • Website

Related Posts

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

October 23, 2025

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

October 23, 2025

Protecting AI at scale and speed — learn the framework in this free webinar

October 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Two days after OpenAI’s Atlas, Microsoft reboots nearly identical AI browser

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

US government charges former L3Harris cyber chief with trade secret theft

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.