Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data

Posted on October 25, 2025October 25, 2025 By CWS

North Korean state-sponsored hackers from the Lazarus APT group launched a cyberespionage marketing campaign focusing on European corporations concerned in unmanned aerial car growth.

Beginning in late March 2025, attackers compromised three protection organizations throughout Central and Southeastern Europe, deploying superior malware to steal proprietary UAV expertise.

The marketing campaign, tracked as Operation DreamJob, employed social engineering utilizing fraudulent job affords to achieve preliminary entry.

The assaults centered on corporations manufacturing drone parts and growing UAV software program, aligning with North Korea’s efforts to develop its drone program.

Researchers found compromised methods contained malicious droppers with the inner DLL identify DroneEXEHijackingLoader.dll, offering proof of the marketing campaign’s deal with drone expertise theft.

Targets obtained pretend job descriptions with trojanized PDF readers that initiated multi-stage an infection processes.

Welivesecurity analysts recognized the primary payload as ScoringMathTea, a complicated distant entry trojan serving as Lazarus’s flagship malware since late 2022.

The RAT offers complete management over compromised machines by way of roughly 40 instructions, enabling file manipulation, course of management, and knowledge exfiltration.

ScoringMathTea maintains communication with command-and-control infrastructure by way of compromised servers hosted inside WordPress directories.

The malware’s C&C site visitors employs a number of encryption layers, using the IDEA algorithm adopted by base64 encoding.

Examples of 2025 Operation DreamJob execution chains delivering BinMergeLoader and ScoringMathTea (Supply – Welivesecurity)

Community evaluation revealed connections to compromised domains together with coralsunmarine[.]com, mnmathleague[.]org, and spaincaramoon[.]com.

Superior An infection Mechanism and Evasion Ways

The Lazarus group demonstrated technical sophistication by incorporating malicious loading routines into official open-source initiatives from GitHub.

Attackers trojanized software program together with TightVNC Viewer, MuPDF reader, and plugins for WinMerge and Notepad++.

This offers twin benefits: the malware inherits official look of trusted functions whereas executing malicious payloads.

The an infection chain employs DLL side-loading and proxying methods. Reliable executables similar to wksprt.exe and wkspbroker.exe side-load malicious libraries like webservices.dll and radcui.dll.

These compromised DLLs include two export units: capabilities for proxying to protect utility habits, and malicious code loading subsequent phases.

The malware employs sturdy encryption all through the an infection lifecycle. Early-stage droppers retrieve encrypted payloads from file system or registry, decrypt them utilizing AES-128 or ChaCha20 algorithms, then load them into reminiscence.

This leverages the MemoryModule library for reflective DLL injection, permitting code execution fully in-memory with out writing decrypted parts to disk.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Aerial, Attacking, Confidential, Data, Hackers, Industry, Korean, North, Steal, Unmanned, Vehicle

Post navigation

Previous Post: New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways
Next Post: Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials

Related Posts

LegalPwn Attack Exploits Gemini, ChatGPT and other AI Tools into Executing Malware Cyber Security News
CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks Cyber Security News
CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild Cyber Security News
Critical ASP.NET Vulnerability Allows Attacker To Bypass Security Feature Remotely Cyber Security News
Women’s Dating App Tea Exposes Selfie Images of 13,000 Users Cyber Security News
New Harrods Data Breach Exposes 430,000 Customer Personal Records Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
  • North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data
  • New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways
  • OpenAI ChatGPT Atlas Browser Jailbroken to Disguise Malicious Prompt as URLs
  • Ransomware Actors Targeting Global Public Sectors and Critical Services in Targeted Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
  • North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data
  • New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways
  • OpenAI ChatGPT Atlas Browser Jailbroken to Disguise Malicious Prompt as URLs
  • Ransomware Actors Targeting Global Public Sectors and Critical Services in Targeted Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News