North Korean-linked threat actors, specifically the Lazarus Group, are targeting European defense and aerospace companies in a campaign called Operation Dream Job. They use social engineering and malware like ScoringMathTea and MISTPEN to steal proprietary information, with indications of efforts to enhance North Koreaβs drone capabilities. #LazarusGroup #OperationDreamJob #ScoringMathTea #MISTPEN #DefenseIndustry
Keypoints
- The campaign is attributed to North Koreaβs Lazarus Group, active since at least 2009.
- Targets include European companies in aerospace, energy, and defense sectors.
- Threat actors use social engineering, offering fake job opportunities to inflict malware.
- Malware families like ScoringMathTea and MISTPEN are used to steal proprietary data.
- The attack methods involve trojanized applications, malicious DLLs, and sophisticated downloaders.
Read More: https://thehackernews.com/2025/10/north-korean-hackers-lure-defense.html