Article Details
Scrape Timestamp (UTC): 2025-10-23 12:42:54.375
Original Article Text
Click to Toggle View
North Korean Lazarus hackers targeted European defense companies. North Korean Lazarus hackers compromised three European companies in the defense sector through a coordinated Operation DreamJob campaign leveraging fake recruitment lures. The threat group's activity was detected in late March and targeted organizations involved in the development of unmanned aerial vehicle (UAV) technology. ‘Operation DreamJob’ is a long-running Lazarus campaign where the adversary, posing as a recruiter at a big company (either real or fake), approaches employees at an organization of interest with job offers for a high-profile role. The targets are tricked into downloading malicious files that give hackers access to the systems of the target company. The tactic has been used in the past against cryptocurrency and DeFi firms, software developers, journalists, security researchers, and also organizations in the defense sector, including the aerospace industry. Researchers at cybersecurity company ESET say that in the most recent Operation DreamJob they analyzed, Lazarus focused on UAV-related technology, which aligns with current geo-political developments and coincides with North Korea’s increased effort to build a drone arsenal "inspired" by Western designs. Targeting makers of drone components ESET observed in late March that "in-the-wild [DreamJob] attacks successively targeted" a metal engineering firm in Southeastern Europe, an aircraft parts maker, and a defense company, both in Central Europe. However, the cybersecurity company did not provide any details on the success the hackers had with targeting the three companies. All three companies make military equipment that is currently deployed in Ukraine as part of their countries' military assistance. Two of them, though, "are clearly involved in the development of UAV technology, with one manufacturing critical drone components and the other reportedly engaged in the design of UAV-related software." Analyzing the infection chain, the researchers found that it started with the victim launching a trojanized open-source application or plugin, such as the MuPDF viewer, Notepad++, WinMerge plugins, TightVNC Viewer, libpcre, and DirectX wrappers. Loading the trojanized DLL or malware dropper was achieved through DLL sideloading, an evasion technique that uses a legitimate but vulnerable software to load the malicious payload. In the next stage, the payload is decrypted and loaded directly into memory using MemoryModule-style routines. The final stage malware is the ScoringMathTea RAT (Remote Access Trojan), which establishes communication with the command-and-control (C2) infrastructure and awaits instructions. In one alternative infection chain, a malware loader named BinMergeLoader (MISTPEN) is used instead of the RAT, which abuses the Microsoft Graph API and tokens to retrieve additional payloads. The ScoringMathTea RAT, first documented in 2023, supports 40 commands in its latest version, which give the attackers a broad range of operational versatility, from command execution to dropping new malware. “The implemented functionality is the usual required by Lazarus: manipulation of files and processes, exchanging the configuration, collecting the victim’s system info, opening a TCP connection, and executing local commands or new payloads downloaded from the C&C server,” explains ESET. ESET comments that despite the repeated exposure of Operation DreamJob tactics and social engineering lures via reports, it continues to remain an effective modus operandi for North Korean threat actors. The cybersecurity company provides an extensive set of indicators of compromise (IoCs) for the domains and malicious tools Lazarus hackers used in the DreamJob campaign against European organizations in the defense sector. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.
Daily Brief Summary
North Korean Lazarus hackers targeted three European defense companies in a campaign called Operation DreamJob, focusing on unmanned aerial vehicle (UAV) technology.
The campaign used fake recruitment offers to trick employees into downloading malicious files, granting hackers access to company systems.
ESET researchers noted the campaign aligns with North Korea's efforts to enhance its drone capabilities, inspired by Western designs.
The attack chain involved trojanized applications and DLL sideloading to deploy the ScoringMathTea RAT, enabling remote access and control.
The RAT supports 40 commands, allowing attackers to manipulate files, execute commands, and download additional malware.
Despite previous exposure, Operation DreamJob remains effective, highlighting the ongoing threat posed by North Korean cyber activities.
ESET provided indicators of compromise (IoCs) to help organizations detect and mitigate the threat from Lazarus hackers.