InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: North Korean hacker lures defense engineer with fake job to steal drone secrets
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > North Korean hacker lures defense engineer with fake job to steal drone secrets
Technology

North Korean hacker lures defense engineer with fake job to steal drone secrets

October 23, 2025 4 Min Read
Share
North Korean hacker lures defense engineer with fake job to steal drone secrets
SHARE

Threat actors with ties to North Korea are believed to be responsible for a new wave of attacks targeting European companies operating in the defense industry as part of a long-running campaign known as North Korea. Operation Dream Job.

“Some of these[companies]are heavily involved in the unmanned aerial vehicle (UAV) field, suggesting that this operation may be related to North Korea’s current efforts to expand its drone program,” ESET security researchers Peter Kalnai and Alexis Lappin said in a report shared with Hacker News.

The ultimate goal of this campaign is assessed to be to steal sensitive information and manufacturing know-how using malware families such as ScoringMathTea and MISTPEN. A Slovak cybersecurity company said it observed a campaign starting in late March 2025.

Targeted companies include a metal engineering company in Southeastern Europe, an aircraft parts manufacturer in Central Europe, and a defense company in Central Europe.

ScoringMathTea (also known as ForestTiger) was previously observed by ESET in early 2023 in connection with cyberattacks targeting an Indian technology company and a Polish defense contractor, while MISTPEN was documented by Google Mandiant in September 2024 as part of an intrusion targeting companies in the energy and aerospace sectors. ScoringMathTea first appeared back in October 2022.

First exposed by Israeli cybersecurity firm ClearSky in 2020, Operation Dream Job is a sustained attack campaign launched by a prolific North Korean hacker group called Lazarus Group, which has also been tracked as APT-Q-1, Black Artemis, Diamond Sleet (formerly Zinc), Hidden Cobra, TEMP.Hermit, and UNC2970. The hacker group is believed to have been active since at least 2009.

In these attacks, attackers use social engineering lures similar to infection interviews to approach potential targets with high-paying job opportunities and trick them into infecting their systems with malware. This campaign also shows overlap with clusters tracked as DeathNote, NukeSped, Operation In(interception), and Operation North Star.

See also  Experts report a surge in automated botnet attacks targeting PHP servers and IoT devices

ESET researchers said: “The main theme is lucrative but fake job offers with malware aspects. Targets receive a decoy document with a job description and a trojanized PDF reader to open it.”

This attack chain leads to binary execution. This binary is responsible for sideloading a malicious DLL that drops ScoringMathTea and an advanced downloader codenamed BinMergeLoader that functions similarly to MISTPEN and uses Microsoft Graph APIs and tokens to retrieve additional payloads.

An alternative infection sequence is known to utilize an unknown dropper to deliver two intermediate payloads, with the first loading the latter. The end result is the deployment of ScoringMathTea, an advanced RAT that supports approximately 40 commands for complete control over compromised machines.

“For nearly three years, Lazarus has maintained a consistent modus operandi, deploying its main recommended payload, ScoringMathTea, and using similar techniques to Trojanize open source applications,” ESET said. “This predictable yet effective strategy provides enough polymorphism to evade security detection, even if it is insufficient to hide group identity and obfuscate the attribution process.”

Share This Article
Twitter Copy Link
Previous Article Pacific Drive drops unforgettable new DLC in the shadows, turning the underrated survival game into nightmare fuel Pacific Drive drops unforgettable new DLC in the shadows, turning the underrated survival game into nightmare fuel
Next Article Climate change and wildfires divide California gubernatorial candidates at forum Climate change and wildfires divide California gubernatorial candidates at forum

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

Malware Delivery Channels
Technology

North Korean hackers turn JSON service into covert malware delivery channel

3 Min Read
Malicious VSX extension 'SleepyDuck' uses Ethereum to keep command server alive
Technology

Malicious VSX extension ‘SleepyDuck’ uses Ethereum to keep command server alive

4 Min Read
XWiki Servers
Technology

RondoDox exploits unpatched XWiki servers to draw more devices into botnet

2 Min Read
Years of JSONFormatter and CodeBeautify leaks expose thousands of passwords and API keys
Technology

Years of JSONFormatter and CodeBeautify leaks expose thousands of passwords and API keys

4 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?