
"Some of these [companies' are heavily involved in the unmanned aerial vehicle (UAV) sector, suggesting that the operation may be linked to North Korea's current efforts to scale up its drone program," ESET security researchers Peter Kálnai and Alexis Rapin said in a report shared with The Hacker News. It's assessed that the end goal of the campaign is to plunder proprietary information and manufacturing know-how using malware families such as ScoringMathTea and MISTPEN."
"Operation Dream Job, first exposed by Israeli cybersecurity company ClearSky in 2020, is a persistent attack campaign mounted by a prolific North Korean hacking group dubbed Lazarus Group, which is also tracked as APT-Q-1, Black Artemis, Diamond Sleet (formerly Zinc), Hidden Cobra, TEMP.Hermit, and UNC2970. In these attacks, the threat actors leverage social engineering lures akin to Contagious Interview to approach prospective targets with lucrative job opportunities and trick them into infecting their systems with malware."
Threat actors tied to North Korea have mounted a new wave of attacks against European companies in the defense and unmanned aerial vehicle sectors. The campaign aims to plunder proprietary information and manufacturing know‑how using malware families such as ScoringMathTea and MISTPEN. ESET observed the operation beginning in late March 2025 and identified targets including a metal engineering firm in Southeastern Europe, an aircraft components manufacturer in Central Europe, and a defense company in Central Europe. Operation Dream Job employs social engineering lures offering lucrative job opportunities to trick victims into installing malware and compromising systems.
Read at The Hacker News
Unable to calculate read time
Collection
[
|
...
]