Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data

Posted on October 25, 2025October 25, 2025 By CWS

North Korean state-sponsored hackers from the Lazarus APT group launched a cyberespionage marketing campaign focusing on European corporations concerned in unmanned aerial car growth.

Beginning in late March 2025, attackers compromised three protection organizations throughout Central and Southeastern Europe, deploying superior malware to steal proprietary UAV expertise.

The marketing campaign, tracked as Operation DreamJob, employed social engineering utilizing fraudulent job affords to achieve preliminary entry.

The assaults centered on corporations manufacturing drone parts and growing UAV software program, aligning with North Korea’s efforts to develop its drone program.

Researchers found compromised methods contained malicious droppers with the inner DLL identify DroneEXEHijackingLoader.dll, offering proof of the marketing campaign’s deal with drone expertise theft.

Targets obtained pretend job descriptions with trojanized PDF readers that initiated multi-stage an infection processes.

Welivesecurity analysts recognized the primary payload as ScoringMathTea, a complicated distant entry trojan serving as Lazarus’s flagship malware since late 2022.

The RAT offers complete management over compromised machines by way of roughly 40 instructions, enabling file manipulation, course of management, and knowledge exfiltration.

ScoringMathTea maintains communication with command-and-control infrastructure by way of compromised servers hosted inside WordPress directories.

The malware’s C&C site visitors employs a number of encryption layers, using the IDEA algorithm adopted by base64 encoding.

Examples of 2025 Operation DreamJob execution chains delivering BinMergeLoader and ScoringMathTea (Supply – Welivesecurity)

Community evaluation revealed connections to compromised domains together with coralsunmarine[.]com, mnmathleague[.]org, and spaincaramoon[.]com.

Superior An infection Mechanism and Evasion Ways

The Lazarus group demonstrated technical sophistication by incorporating malicious loading routines into official open-source initiatives from GitHub.

Attackers trojanized software program together with TightVNC Viewer, MuPDF reader, and plugins for WinMerge and Notepad++.

This offers twin benefits: the malware inherits official look of trusted functions whereas executing malicious payloads.

The an infection chain employs DLL side-loading and proxying methods. Reliable executables similar to wksprt.exe and wkspbroker.exe side-load malicious libraries like webservices.dll and radcui.dll.

These compromised DLLs include two export units: capabilities for proxying to protect utility habits, and malicious code loading subsequent phases.

The malware employs sturdy encryption all through the an infection lifecycle. Early-stage droppers retrieve encrypted payloads from file system or registry, decrypt them utilizing AES-128 or ChaCha20 algorithms, then load them into reminiscence.

This leverages the MemoryModule library for reflective DLL injection, permitting code execution fully in-memory with out writing decrypted parts to disk.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Aerial, Attacking, Confidential, Data, Hackers, Industry, Korean, North, Steal, Unmanned, Vehicle

Post navigation

Previous Post: 5 Deception Solutions that are Changing the Cybersecurity Game 
Next Post: Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject Malicious Modules

Related Posts

Top 30 Best Penetration Testing Tools Cyber Security News
MediaTek July 2025 Security Update Patches Vulnerabilities Affecting a Wide Range of Their Chipsets Cyber Security News
Operation Silk Lure Weaponizing Windows Scheduled Tasks to Drop ValleyRAT Cyber Security News
Developers Beware of npm Phishing Email That Steal Your Login Credentials Cyber Security News
OnePlus OxygenOS Vulnerability Allows Any App to Read SMS Data Without Permission Cyber Security News
Hackers can Hijack Your Dash Cams in Seconds and Weaponize it for Future Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws
  • Users Report Teams and Access Issues
  • Windows Cloud Files Mini Filter Driver 0-Day Vulnerability Exploited in the Wild to Escalate Privileges
  • UK Sanctions Russian and Chinese Firms Suspected of Being ‘Malign Actors’ in Information Warfare
  • Adobe Patches Nearly 140 Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws
  • Users Report Teams and Access Issues
  • Windows Cloud Files Mini Filter Driver 0-Day Vulnerability Exploited in the Wild to Escalate Privileges
  • UK Sanctions Russian and Chinese Firms Suspected of Being ‘Malign Actors’ in Information Warfare
  • Adobe Patches Nearly 140 Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark