Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Lazarus Hackers Actively Attacking European Drone Manufacturing Companies

Lazarus Hackers Actively Attacking European Drone Manufacturing Companies

Posted on January 26, 2026January 26, 2026 By CWS

Lazarus, a classy North Korean-aligned hacking group often known as HIDDEN COBRA, has launched a brand new wave of focused assaults towards European drone producers and protection contractors.

The marketing campaign, tracked as Operation DreamJob, emerged in late March 2025 and particularly targets organizations creating unmanned aerial car expertise throughout Central and Southeastern Europe.

Researchers have recognized this exercise as a part of a broader strategic effort by North Korea to speed up its home drone program, significantly following elevated funding in trendy warfare capabilities noticed within the Russia-Ukraine battle.

The marketing campaign represents a major escalation in cyberespionage ways geared toward stealing proprietary manufacturing data and mental property from the aerospace and protection sectors.

Three European firms have been confirmed as targets, with at the least two closely concerned in designing superior single-rotor drones and producing crucial UAV elements at the moment deployed in energetic battle zones.

The timing of those assaults coincides with North Korea’s reported efforts to mass-produce fight and reconnaissance drones just like Western fashions just like the MQ-9 Reaper and RQ-4 World Hawk.

Welivesecurity analysts and researchers famous that the malware infrastructure utilized in these assaults employs subtle supply mechanisms designed to evade conventional safety defenses.

Examples of 2025 Operation DreamJob execution chains delivering BinMergeLoader and ScoringMathTea (Supply – Welivesecurity)

The assault begins with social engineering, particularly utilizing pretend job gives for prestigious positions to trick staff into downloading trojanized paperwork.

As soon as executed, the malware deploys a sequence of specialised instruments designed to keep up persistent entry and keep away from detection on compromised techniques.

An infection mechanism

The first an infection mechanism depends on DLL side-loading, a way the place official Home windows purposes are exploited to load malicious libraries with out triggering safety alerts.

A dropper with a suspicious inside title and exports from a official Microsoft library (Supply – Welivesecurity)

The attackers have included their malware into trojanized variations of standard open-source software program, together with TightVNC Viewer, MuPDF reader, and WinMerge plugins.

One significantly revealing dropper contained the interior filename DroneEXEHijackingLoader.dll, instantly referencing the attackers’ marketing campaign deal with drone expertise.

The primary payload deployed throughout all incidents is ScoringMathTea, a distant entry trojan that gives attackers full management over compromised machines.

This subtle malware gives roughly 40 completely different instructions for system manipulation, file exfiltration, and additional payload deployment.

What makes ScoringMathTea significantly harmful is its capacity to stay utterly encrypted on disk, solely decrypting in reminiscence throughout execution, making conventional file-based detection almost inconceivable with out superior behavioral monitoring.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Actively, Attacking, Companies, Drone, European, Hackers, Lazarus, Manufacturing

Post navigation

Previous Post: Winning Against AI-Based Attacks Requires a Combined Defensive Approach
Next Post: ‘Stanley’ Malware Toolkit Enables Phishing via Website Spoofing

Related Posts

CISA Warns of Critical SunPower Device Vulnerability Let Attackers Gain Full Device Access CISA Warns of Critical SunPower Device Vulnerability Let Attackers Gain Full Device Access Cyber Security News
BlackSuit Ransomware’s Data Leak and Negotiation Portal Seized BlackSuit Ransomware’s Data Leak and Negotiation Portal Seized Cyber Security News
LANSCOPE Endpoint Manager Vulnerability Let Attackers Execute Remote Code LANSCOPE Endpoint Manager Vulnerability Let Attackers Execute Remote Code Cyber Security News
VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands Cyber Security News
PyPI Warns of New Phishing Attack Targeting Developers With Fake PyPI site PyPI Warns of New Phishing Attack Targeting Developers With Fake PyPI site Cyber Security News
pnpm 11 Enhances Security with Default Release Age Setting pnpm 11 Enhances Security with Default Release Age Setting Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark