Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

BAM’s molecular printing platform transforms on-site PFAS analysis

Six Android malware families target Pix payments, banking apps, and crypto wallets

Our position on PFAS sample testing

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » North Korean hacker lures defense engineer with fake job to steal drone secrets
Identity

North Korean hacker lures defense engineer with fake job to steal drone secrets

userBy userOctober 23, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 23, 2025Rabi LakshmananCyber ​​espionage/threat intelligence

A new wave of attacks targeting European companies in the defense industry, part of a long-running campaign known as Operation Dream Job, is believed to be the work of attackers with ties to North Korea.

“Some of these companies are heavily involved in the unmanned aerial vehicle (UAV) space, suggesting that this operation may be related to North Korea’s current efforts to expand its drone program,” ESET security researchers Peter Kalnai and Alexis Lapin said in a report shared with Hacker News.[companies’areheavilyinvolvedintheunmannedaerialvehicle(UAV)sectorsuggestingthattheoperationmaybelinkedtoNorthKorea’scurrenteffortstoscaleupitsdroneprogram”ESETsecurityresearchersPeterKálnaiandAlexisRapinsaidinareportsharedwithTheHackerNews[companies’areheavilyinvolvedintheunmannedaerialvehicle(UAV)sectorsuggestingthattheoperationmaybelinkedtoNorthKorea’scurrenteffortstoscaleupitsdroneprogram”ESETsecurityresearchersPeterKálnaiandAlexisRapinsaidinareportsharedwithTheHackerNews

The ultimate goal of this campaign is assessed to be to steal sensitive information and manufacturing know-how using malware families such as ScoringMathTea and MISTPEN. A Slovak cybersecurity company said it observed a campaign starting in late March 2025.

DFIR retainer service

Targeted companies include a metal engineering company in Southeastern Europe, an aircraft parts manufacturer in Central Europe, and a defense company in Central Europe.

ScoringMathTea (also known as ForestTiger) was previously observed by ESET in early 2023 in connection with cyberattacks targeting an Indian technology company and a Polish defense contractor, while MISTPEN was documented by Google Mandiant in September 2024 as part of an intrusion targeting companies in the energy and aerospace sectors. ScoringMathTea first appeared back in October 2022.

First exposed by Israeli cybersecurity firm ClearSky in 2020, Operation Dream Job is a sustained attack campaign launched by a prolific North Korean hacker group called Lazarus Group, which has also been tracked as APT-Q-1, Black Artemis, Diamond Sleet (formerly Zinc), Hidden Cobra, TEMP.Hermit, and UNC2970. The hacker group is believed to have been active since at least 2009.

In these attacks, attackers use social engineering lures similar to infection interviews to approach potential targets with high-paying job opportunities and trick them into infecting their systems with malware. This campaign also shows overlap with clusters tracked as DeathNote, NukeSped, Operation In(interception), and Operation North Star.

ESET researchers said: “The main theme is lucrative but fake job offers with malware aspects. Targets receive a decoy document with a job description and a trojanized PDF reader to open it.”

CIS build kit

This attack chain leads to binary execution. This binary is responsible for sideloading a malicious DLL that drops ScoringMathTea and an advanced downloader codenamed BinMergeLoader that functions similarly to MISTPEN and uses Microsoft Graph APIs and tokens to retrieve additional payloads.

An alternative infection sequence is known to utilize an unknown dropper to deliver two intermediate payloads, with the first loading the latter. The end result is the deployment of ScoringMathTea, an advanced RAT that supports approximately 40 commands for complete control over compromised machines.

“For nearly three years, Lazarus has maintained a consistent modus operandi, deploying its main recommended payload, ScoringMathTea, and using similar techniques to Trojanize open source applications,” ESET said. “This predictable yet effective strategy provides enough polymorphism to evade security detection, even if it is insufficient to hide group identity and obfuscate the attribution process.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSora update brings AI pet videos, new social features, and Android version coming soon
Next Article US government charges former L3Harris cyber chief with trade secret theft
user
  • Website

Related Posts

Six Android malware families target Pix payments, banking apps, and crypto wallets

March 12, 2026

CISA reports active exploitation of n8n RCE bug as 24,700 instances remain exposed

March 12, 2026

Researchers trick Perplexity’s Comet AI browser into phishing scam in under 4 minutes

March 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

BAM’s molecular printing platform transforms on-site PFAS analysis

Six Android malware families target Pix payments, banking apps, and crypto wallets

Our position on PFAS sample testing

CISA reports active exploitation of n8n RCE bug as 24,700 instances remain exposed

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.