Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data

Posted on October 25, 2025October 25, 2025 By CWS

North Korean state-sponsored hackers from the Lazarus APT group launched a cyberespionage marketing campaign focusing on European corporations concerned in unmanned aerial car growth.

Beginning in late March 2025, attackers compromised three protection organizations throughout Central and Southeastern Europe, deploying superior malware to steal proprietary UAV expertise.

The marketing campaign, tracked as Operation DreamJob, employed social engineering utilizing fraudulent job affords to achieve preliminary entry.

The assaults centered on corporations manufacturing drone parts and growing UAV software program, aligning with North Korea’s efforts to develop its drone program.

Researchers found compromised methods contained malicious droppers with the inner DLL identify DroneEXEHijackingLoader.dll, offering proof of the marketing campaign’s deal with drone expertise theft.

Targets obtained pretend job descriptions with trojanized PDF readers that initiated multi-stage an infection processes.

Welivesecurity analysts recognized the primary payload as ScoringMathTea, a complicated distant entry trojan serving as Lazarus’s flagship malware since late 2022.

The RAT offers complete management over compromised machines by way of roughly 40 instructions, enabling file manipulation, course of management, and knowledge exfiltration.

ScoringMathTea maintains communication with command-and-control infrastructure by way of compromised servers hosted inside WordPress directories.

The malware’s C&C site visitors employs a number of encryption layers, using the IDEA algorithm adopted by base64 encoding.

Examples of 2025 Operation DreamJob execution chains delivering BinMergeLoader and ScoringMathTea (Supply – Welivesecurity)

Community evaluation revealed connections to compromised domains together with coralsunmarine[.]com, mnmathleague[.]org, and spaincaramoon[.]com.

Superior An infection Mechanism and Evasion Ways

The Lazarus group demonstrated technical sophistication by incorporating malicious loading routines into official open-source initiatives from GitHub.

Attackers trojanized software program together with TightVNC Viewer, MuPDF reader, and plugins for WinMerge and Notepad++.

This offers twin benefits: the malware inherits official look of trusted functions whereas executing malicious payloads.

The an infection chain employs DLL side-loading and proxying methods. Reliable executables similar to wksprt.exe and wkspbroker.exe side-load malicious libraries like webservices.dll and radcui.dll.

These compromised DLLs include two export units: capabilities for proxying to protect utility habits, and malicious code loading subsequent phases.

The malware employs sturdy encryption all through the an infection lifecycle. Early-stage droppers retrieve encrypted payloads from file system or registry, decrypt them utilizing AES-128 or ChaCha20 algorithms, then load them into reminiscence.

This leverages the MemoryModule library for reflective DLL injection, permitting code execution fully in-memory with out writing decrypted parts to disk.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Aerial, Attacking, Confidential, Data, Hackers, Industry, Korean, North, Steal, Unmanned, Vehicle

Post navigation

Previous Post: 5 Deception Solutions that are Changing the Cybersecurity Game 
Next Post: Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject Malicious Modules

Related Posts

New Variant of The XCSSET Malware Attacking macOS App Developers Cyber Security News
10 Best VPN Alternatives in 2025 Cyber Security News
Threat Actors Allegedly Claim Access to Nokia’s Internal Network Cyber Security News
EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections Cyber Security News
Apache SeaTunnel Vulnerability Allows Unauthorized Users to Perform Deserialization Attack Cyber Security News
United Natural Foods Suffers Cyberattack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 81% Router Usres Have Not Changed Default Admin Passwords, Exposing Devices to Hackers
  • iOS 26 Deletes Pegasus and Predator Spyware Infection Evidence by Overwriting The ‘shutdown.log’ file on Reboot
  • nsKnox Launches Adaptive Payment Security™, Solving the “Impossible Triangle” of B2B Fraud Prevention
  • Ubiquiti UniFi Door Access App Vulnerability Exposes API Management Without Authentication
  • X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 81% Router Usres Have Not Changed Default Admin Passwords, Exposing Devices to Hackers
  • iOS 26 Deletes Pegasus and Predator Spyware Infection Evidence by Overwriting The ‘shutdown.log’ file on Reboot
  • nsKnox Launches Adaptive Payment Security™, Solving the “Impossible Triangle” of B2B Fraud Prevention
  • Ubiquiti UniFi Door Access App Vulnerability Exposes API Management Without Authentication
  • X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News