Gotta fly: Lazarus targets the UAV sector
The Lazarus group, aligned with North Korea, is conducting a cyberespionage campaign named Operation DreamJob targeting European defense companies involved in UAV technology. The attackers use social engineering, trojanized open-source projects, and deploy the ScoringMathTea RAT along with various loaders and droppers to infiltrate targeted networks. The campaign aims to steal proprietary UAV-related information and manufacturing expertise to advance North Korea's drone capabilities. This activity highlights a persistent threat to the confidentiality and integrity of sensitive defense data. The attack does not require known exploits but relies on sophisticated malware delivery and social engineering. European UAV sector organizations are at risk of intellectual property theft and potential operational disruption. Mitigation requires targeted detection of the specific malware families, enhanced supply chain security, and employee awareness training. Countries with significant UAV defense industries and geopolitical tensions with North Korea are most likely affected. The threat severity is assessed as high due to the strategic value of stolen data and the advanced persistent threat actor involved.
AI Analysis
Technical Summary
Operation DreamJob is a cyberespionage campaign attributed to the Lazarus group, a North Korea-aligned threat actor, targeting European defense companies specializing in unmanned aerial vehicle (UAV) technology. The campaign's objective is to steal proprietary information and manufacturing know-how to support North Korea's drone program development. Attackers employ social engineering techniques to lure victims, including the use of trojanized open-source projects that appear legitimate but contain malicious payloads. The primary malware deployed is the ScoringMathTea Remote Access Trojan (RAT), supported by a suite of droppers, loaders, and downloaders such as QuanPinLoader and BinMergeLoader, facilitating stealthy and persistent access. The campaign leverages multiple MITRE ATT&CK techniques including command and control over standard protocols (T1071.001), credential dumping (T1003), process injection (T1055), and data staging (T1074.002), indicating a sophisticated multi-stage intrusion. The attackers focus on UAV-related targets, reflecting North Korea's strategic interest in enhancing its drone capabilities through cyberespionage. No known public exploits are reported, suggesting reliance on social engineering and supply chain compromise rather than zero-day vulnerabilities. The campaign underscores the ongoing threat posed by Lazarus to European defense sectors, emphasizing the need for vigilance against targeted malware and social engineering attacks.
Potential Impact
For European organizations, particularly those involved in UAV technology and defense manufacturing, this campaign poses a significant risk to the confidentiality and integrity of sensitive intellectual property and operational data. Theft of proprietary UAV designs and manufacturing processes could undermine competitive advantage, lead to loss of revenue, and compromise national security. The presence of advanced malware like ScoringMathTea RAT enables persistent access, data exfiltration, and potential sabotage. Additionally, successful intrusions could facilitate further attacks on supply chains or critical infrastructure. The campaign's focus on social engineering increases the likelihood of initial compromise, especially if employee awareness is insufficient. Given the strategic importance of UAV technology in defense, the impact extends beyond individual companies to broader European defense capabilities and geopolitical stability.
Mitigation Recommendations
Organizations should implement targeted detection and response capabilities for the specific malware families involved, including ScoringMathTea RAT, QuanPinLoader, and BinMergeLoader. Enhancing email and web filtering to detect trojanized open-source projects and suspicious attachments is critical. Conduct thorough vetting and monitoring of open-source components integrated into development pipelines to prevent supply chain compromises. Employee training focused on recognizing social engineering tactics and phishing attempts must be prioritized. Network segmentation and strict access controls can limit lateral movement if compromise occurs. Deploy endpoint detection and response (EDR) solutions capable of identifying process injection, credential dumping, and unusual command and control traffic. Regularly audit and update threat intelligence feeds to stay informed about Lazarus group TTPs. Finally, collaborate with national cybersecurity agencies and defense sector partners to share indicators of compromise and coordinate defense strategies.
Affected Countries
United Kingdom, France, Germany, Italy, Spain, Poland, Sweden, Finland
Indicators of Compromise
- ip: 104.247.162.67
- hash: 03d9b8f0fcf9173d2964ce7173d21e681dfa8da4
- ip: 193.39.187.165
- ip: 66.29.144.75
- url: https://coralsunmarine.com/wp-content/themes/flatsome/inc/functions/function-hand.php
- url: https://ecudecode.mx/redsocial/wp-content/themes/buddyx/inc/Customizer/usercomp.php
- url: https://galaterrace.com/wp-content/themes/hello-elementor/includes/functions.php
- url: https://kazitradebd.com/wp-content/themes/hello-elementor/includes/customizer/customizer-hand.php
- url: https://mediostresbarbas.com.ar/php_scrip/banahosting/index.php
- url: https://oldlinewoodwork.com/wp-content/themes/zubin/inc/index.php
- url: https://partnerls.pl/wp-content/themes/public/index.php
- url: https://pierregems.com/wp-content/themes/woodmart/inc/configs/js-hand.php
- url: https://spaincaramoon.com/realestate/wp-content/plugins/gravityforms/forward.php
- url: https://trainingpharmacist.co.uk/bootstrap/bootstrap.php
- url: https://www.anvil.org.ph/list/images/index.php
- url: https://www.bandarpowder.com/public/assets/buttons/bootstrap.php
- url: https://www.mnmathleague.org/ckeditor/adapters/index.php
- url: https://www.scgestor.com.br/wp-content/themes/vantage/inc/template-headers.php
- domain: coralsunmarine.com
- domain: ecudecode.mx
- domain: galaterrace.com
- domain: kazitradebd.com
- domain: mediostresbarbas.com.ar
- domain: oldlinewoodwork.com
- domain: partnerls.pl
- domain: pierregems.com
- domain: spaincaramoon.com
- domain: trainingpharmacist.co.uk
- domain: www.anvil.org.ph
- domain: www.bandarpowder.com
- domain: www.mnmathleague.org
- domain: www.scgestor.com.br
- domain: www.scoringmnmathleague.org
Gotta fly: Lazarus targets the UAV sector
Description
The Lazarus group, aligned with North Korea, is conducting a cyberespionage campaign named Operation DreamJob targeting European defense companies involved in UAV technology. The attackers use social engineering, trojanized open-source projects, and deploy the ScoringMathTea RAT along with various loaders and droppers to infiltrate targeted networks. The campaign aims to steal proprietary UAV-related information and manufacturing expertise to advance North Korea's drone capabilities. This activity highlights a persistent threat to the confidentiality and integrity of sensitive defense data. The attack does not require known exploits but relies on sophisticated malware delivery and social engineering. European UAV sector organizations are at risk of intellectual property theft and potential operational disruption. Mitigation requires targeted detection of the specific malware families, enhanced supply chain security, and employee awareness training. Countries with significant UAV defense industries and geopolitical tensions with North Korea are most likely affected. The threat severity is assessed as high due to the strategic value of stolen data and the advanced persistent threat actor involved.
AI-Powered Analysis
Technical Analysis
Operation DreamJob is a cyberespionage campaign attributed to the Lazarus group, a North Korea-aligned threat actor, targeting European defense companies specializing in unmanned aerial vehicle (UAV) technology. The campaign's objective is to steal proprietary information and manufacturing know-how to support North Korea's drone program development. Attackers employ social engineering techniques to lure victims, including the use of trojanized open-source projects that appear legitimate but contain malicious payloads. The primary malware deployed is the ScoringMathTea Remote Access Trojan (RAT), supported by a suite of droppers, loaders, and downloaders such as QuanPinLoader and BinMergeLoader, facilitating stealthy and persistent access. The campaign leverages multiple MITRE ATT&CK techniques including command and control over standard protocols (T1071.001), credential dumping (T1003), process injection (T1055), and data staging (T1074.002), indicating a sophisticated multi-stage intrusion. The attackers focus on UAV-related targets, reflecting North Korea's strategic interest in enhancing its drone capabilities through cyberespionage. No known public exploits are reported, suggesting reliance on social engineering and supply chain compromise rather than zero-day vulnerabilities. The campaign underscores the ongoing threat posed by Lazarus to European defense sectors, emphasizing the need for vigilance against targeted malware and social engineering attacks.
Potential Impact
For European organizations, particularly those involved in UAV technology and defense manufacturing, this campaign poses a significant risk to the confidentiality and integrity of sensitive intellectual property and operational data. Theft of proprietary UAV designs and manufacturing processes could undermine competitive advantage, lead to loss of revenue, and compromise national security. The presence of advanced malware like ScoringMathTea RAT enables persistent access, data exfiltration, and potential sabotage. Additionally, successful intrusions could facilitate further attacks on supply chains or critical infrastructure. The campaign's focus on social engineering increases the likelihood of initial compromise, especially if employee awareness is insufficient. Given the strategic importance of UAV technology in defense, the impact extends beyond individual companies to broader European defense capabilities and geopolitical stability.
Mitigation Recommendations
Organizations should implement targeted detection and response capabilities for the specific malware families involved, including ScoringMathTea RAT, QuanPinLoader, and BinMergeLoader. Enhancing email and web filtering to detect trojanized open-source projects and suspicious attachments is critical. Conduct thorough vetting and monitoring of open-source components integrated into development pipelines to prevent supply chain compromises. Employee training focused on recognizing social engineering tactics and phishing attempts must be prioritized. Network segmentation and strict access controls can limit lateral movement if compromise occurs. Deploy endpoint detection and response (EDR) solutions capable of identifying process injection, credential dumping, and unusual command and control traffic. Regularly audit and update threat intelligence feeds to stay informed about Lazarus group TTPs. Finally, collaborate with national cybersecurity agencies and defense sector partners to share indicators of compromise and coordinate defense strategies.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.welivesecurity.com/en/eset-research/gotta-fly-lazarus-targets-uav-sector"]
- Adversary
- Lazarus
- Pulse Id
- 68fa32c80f24106e04d886f7
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip104.247.162.67 | — | |
ip193.39.187.165 | — | |
ip66.29.144.75 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash03d9b8f0fcf9173d2964ce7173d21e681dfa8da4 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://coralsunmarine.com/wp-content/themes/flatsome/inc/functions/function-hand.php | — | |
urlhttps://ecudecode.mx/redsocial/wp-content/themes/buddyx/inc/Customizer/usercomp.php | — | |
urlhttps://galaterrace.com/wp-content/themes/hello-elementor/includes/functions.php | — | |
urlhttps://kazitradebd.com/wp-content/themes/hello-elementor/includes/customizer/customizer-hand.php | — | |
urlhttps://mediostresbarbas.com.ar/php_scrip/banahosting/index.php | — | |
urlhttps://oldlinewoodwork.com/wp-content/themes/zubin/inc/index.php | — | |
urlhttps://partnerls.pl/wp-content/themes/public/index.php | — | |
urlhttps://pierregems.com/wp-content/themes/woodmart/inc/configs/js-hand.php | — | |
urlhttps://spaincaramoon.com/realestate/wp-content/plugins/gravityforms/forward.php | — | |
urlhttps://trainingpharmacist.co.uk/bootstrap/bootstrap.php | — | |
urlhttps://www.anvil.org.ph/list/images/index.php | — | |
urlhttps://www.bandarpowder.com/public/assets/buttons/bootstrap.php | — | |
urlhttps://www.mnmathleague.org/ckeditor/adapters/index.php | — | |
urlhttps://www.scgestor.com.br/wp-content/themes/vantage/inc/template-headers.php | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaincoralsunmarine.com | — | |
domainecudecode.mx | — | |
domaingalaterrace.com | — | |
domainkazitradebd.com | — | |
domainmediostresbarbas.com.ar | — | |
domainoldlinewoodwork.com | — | |
domainpartnerls.pl | — | |
domainpierregems.com | — | |
domainspaincaramoon.com | — | |
domaintrainingpharmacist.co.uk | — | |
domainwww.anvil.org.ph | — | |
domainwww.bandarpowder.com | — | |
domainwww.mnmathleague.org | — | |
domainwww.scgestor.com.br | — | |
domainwww.scoringmnmathleague.org | — |
Threat ID: 68fb5e869505544a4c48472d
Added to database: 10/24/2025, 11:09:58 AM
Last enriched: 10/24/2025, 11:25:00 AM
Last updated: 10/25/2025, 3:11:12 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.