Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Gotta fly: Lazarus targets the UAV sector

0
Medium
Published: Thu Oct 23 2025 (10/23/2025, 13:51:03 UTC)
Source: AlienVault OTX General

Description

The Lazarus group, aligned with North Korea, is conducting a cyberespionage campaign named Operation DreamJob targeting European defense companies involved in UAV technology. The attackers use social engineering, trojanized open-source projects, and deploy the ScoringMathTea RAT along with various loaders and droppers to infiltrate targeted networks. The campaign aims to steal proprietary UAV-related information and manufacturing expertise to advance North Korea's drone capabilities. This activity highlights a persistent threat to the confidentiality and integrity of sensitive defense data. The attack does not require known exploits but relies on sophisticated malware delivery and social engineering. European UAV sector organizations are at risk of intellectual property theft and potential operational disruption. Mitigation requires targeted detection of the specific malware families, enhanced supply chain security, and employee awareness training. Countries with significant UAV defense industries and geopolitical tensions with North Korea are most likely affected. The threat severity is assessed as high due to the strategic value of stolen data and the advanced persistent threat actor involved.

AI-Powered Analysis

AILast updated: 10/24/2025, 11:25:00 UTC

Technical Analysis

Operation DreamJob is a cyberespionage campaign attributed to the Lazarus group, a North Korea-aligned threat actor, targeting European defense companies specializing in unmanned aerial vehicle (UAV) technology. The campaign's objective is to steal proprietary information and manufacturing know-how to support North Korea's drone program development. Attackers employ social engineering techniques to lure victims, including the use of trojanized open-source projects that appear legitimate but contain malicious payloads. The primary malware deployed is the ScoringMathTea Remote Access Trojan (RAT), supported by a suite of droppers, loaders, and downloaders such as QuanPinLoader and BinMergeLoader, facilitating stealthy and persistent access. The campaign leverages multiple MITRE ATT&CK techniques including command and control over standard protocols (T1071.001), credential dumping (T1003), process injection (T1055), and data staging (T1074.002), indicating a sophisticated multi-stage intrusion. The attackers focus on UAV-related targets, reflecting North Korea's strategic interest in enhancing its drone capabilities through cyberespionage. No known public exploits are reported, suggesting reliance on social engineering and supply chain compromise rather than zero-day vulnerabilities. The campaign underscores the ongoing threat posed by Lazarus to European defense sectors, emphasizing the need for vigilance against targeted malware and social engineering attacks.

Potential Impact

For European organizations, particularly those involved in UAV technology and defense manufacturing, this campaign poses a significant risk to the confidentiality and integrity of sensitive intellectual property and operational data. Theft of proprietary UAV designs and manufacturing processes could undermine competitive advantage, lead to loss of revenue, and compromise national security. The presence of advanced malware like ScoringMathTea RAT enables persistent access, data exfiltration, and potential sabotage. Additionally, successful intrusions could facilitate further attacks on supply chains or critical infrastructure. The campaign's focus on social engineering increases the likelihood of initial compromise, especially if employee awareness is insufficient. Given the strategic importance of UAV technology in defense, the impact extends beyond individual companies to broader European defense capabilities and geopolitical stability.

Mitigation Recommendations

Organizations should implement targeted detection and response capabilities for the specific malware families involved, including ScoringMathTea RAT, QuanPinLoader, and BinMergeLoader. Enhancing email and web filtering to detect trojanized open-source projects and suspicious attachments is critical. Conduct thorough vetting and monitoring of open-source components integrated into development pipelines to prevent supply chain compromises. Employee training focused on recognizing social engineering tactics and phishing attempts must be prioritized. Network segmentation and strict access controls can limit lateral movement if compromise occurs. Deploy endpoint detection and response (EDR) solutions capable of identifying process injection, credential dumping, and unusual command and control traffic. Regularly audit and update threat intelligence feeds to stay informed about Lazarus group TTPs. Finally, collaborate with national cybersecurity agencies and defense sector partners to share indicators of compromise and coordinate defense strategies.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.welivesecurity.com/en/eset-research/gotta-fly-lazarus-targets-uav-sector"]
Adversary
Lazarus
Pulse Id
68fa32c80f24106e04d886f7
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip104.247.162.67
ip193.39.187.165
ip66.29.144.75

Hash

ValueDescriptionCopy
hash03d9b8f0fcf9173d2964ce7173d21e681dfa8da4

Url

ValueDescriptionCopy
urlhttps://coralsunmarine.com/wp-content/themes/flatsome/inc/functions/function-hand.php
urlhttps://ecudecode.mx/redsocial/wp-content/themes/buddyx/inc/Customizer/usercomp.php
urlhttps://galaterrace.com/wp-content/themes/hello-elementor/includes/functions.php
urlhttps://kazitradebd.com/wp-content/themes/hello-elementor/includes/customizer/customizer-hand.php
urlhttps://mediostresbarbas.com.ar/php_scrip/banahosting/index.php
urlhttps://oldlinewoodwork.com/wp-content/themes/zubin/inc/index.php
urlhttps://partnerls.pl/wp-content/themes/public/index.php
urlhttps://pierregems.com/wp-content/themes/woodmart/inc/configs/js-hand.php
urlhttps://spaincaramoon.com/realestate/wp-content/plugins/gravityforms/forward.php
urlhttps://trainingpharmacist.co.uk/bootstrap/bootstrap.php
urlhttps://www.anvil.org.ph/list/images/index.php
urlhttps://www.bandarpowder.com/public/assets/buttons/bootstrap.php
urlhttps://www.mnmathleague.org/ckeditor/adapters/index.php
urlhttps://www.scgestor.com.br/wp-content/themes/vantage/inc/template-headers.php

Domain

ValueDescriptionCopy
domaincoralsunmarine.com
domainecudecode.mx
domaingalaterrace.com
domainkazitradebd.com
domainmediostresbarbas.com.ar
domainoldlinewoodwork.com
domainpartnerls.pl
domainpierregems.com
domainspaincaramoon.com
domaintrainingpharmacist.co.uk
domainwww.anvil.org.ph
domainwww.bandarpowder.com
domainwww.mnmathleague.org
domainwww.scgestor.com.br
domainwww.scoringmnmathleague.org

Threat ID: 68fb5e869505544a4c48472d

Added to database: 10/24/2025, 11:09:58 AM

Last enriched: 10/24/2025, 11:25:00 AM

Last updated: 10/25/2025, 3:11:12 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats