Gotta fly: Lazarus targets the UAV sector
ESET researchers have uncovered a new instance of Operation DreamJob, a campaign attributed to the North Korea-aligned Lazarus group, targeting European defense companies involved in UAV technology. The attacks align with North Korea's efforts to enhance its drone program, likely aiming to steal proprietary information and manufacturing know-how. The campaign uses social engineering tactics, trojanized open-source projects, and deploys the ScoringMathTea RAT. The attackers' toolset includes various droppers, loaders, and downloaders, with a focus on UAV-related targets. This activity highlights the ongoing threat posed by Lazarus and North Korea's interest in advancing its drone capabilities through cyberespionage.
AI Analysis
Technical Summary
Operation DreamJob is a cyberespionage campaign attributed to the Lazarus group, a North Korea-aligned threat actor, targeting European defense companies specializing in unmanned aerial vehicle (UAV) technology. The campaign's objective is to steal proprietary information and manufacturing know-how to support North Korea's drone program development. Attackers employ social engineering techniques to lure victims, including the use of trojanized open-source projects that appear legitimate but contain malicious payloads. The primary malware deployed is the ScoringMathTea Remote Access Trojan (RAT), supported by a suite of droppers, loaders, and downloaders such as QuanPinLoader and BinMergeLoader, facilitating stealthy and persistent access. The campaign leverages multiple MITRE ATT&CK techniques including command and control over standard protocols (T1071.001), credential dumping (T1003), process injection (T1055), and data staging (T1074.002), indicating a sophisticated multi-stage intrusion. The attackers focus on UAV-related targets, reflecting North Korea's strategic interest in enhancing its drone capabilities through cyberespionage. No known public exploits are reported, suggesting reliance on social engineering and supply chain compromise rather than zero-day vulnerabilities. The campaign underscores the ongoing threat posed by Lazarus to European defense sectors, emphasizing the need for vigilance against targeted malware and social engineering attacks.
Potential Impact
For European organizations, particularly those involved in UAV technology and defense manufacturing, this campaign poses a significant risk to the confidentiality and integrity of sensitive intellectual property and operational data. Theft of proprietary UAV designs and manufacturing processes could undermine competitive advantage, lead to loss of revenue, and compromise national security. The presence of advanced malware like ScoringMathTea RAT enables persistent access, data exfiltration, and potential sabotage. Additionally, successful intrusions could facilitate further attacks on supply chains or critical infrastructure. The campaign's focus on social engineering increases the likelihood of initial compromise, especially if employee awareness is insufficient. Given the strategic importance of UAV technology in defense, the impact extends beyond individual companies to broader European defense capabilities and geopolitical stability.
Mitigation Recommendations
Organizations should implement targeted detection and response capabilities for the specific malware families involved, including ScoringMathTea RAT, QuanPinLoader, and BinMergeLoader. Enhancing email and web filtering to detect trojanized open-source projects and suspicious attachments is critical. Conduct thorough vetting and monitoring of open-source components integrated into development pipelines to prevent supply chain compromises. Employee training focused on recognizing social engineering tactics and phishing attempts must be prioritized. Network segmentation and strict access controls can limit lateral movement if compromise occurs. Deploy endpoint detection and response (EDR) solutions capable of identifying process injection, credential dumping, and unusual command and control traffic. Regularly audit and update threat intelligence feeds to stay informed about Lazarus group TTPs. Finally, collaborate with national cybersecurity agencies and defense sector partners to share indicators of compromise and coordinate defense strategies.
Affected Countries
United Kingdom, France, Germany, Italy, Spain, Poland, Sweden, Finland
Indicators of Compromise
- ip: 104.247.162.67
- hash: 03d9b8f0fcf9173d2964ce7173d21e681dfa8da4
- ip: 193.39.187.165
- ip: 66.29.144.75
- url: https://coralsunmarine.com/wp-content/themes/flatsome/inc/functions/function-hand.php
- url: https://ecudecode.mx/redsocial/wp-content/themes/buddyx/inc/Customizer/usercomp.php
- url: https://galaterrace.com/wp-content/themes/hello-elementor/includes/functions.php
- url: https://kazitradebd.com/wp-content/themes/hello-elementor/includes/customizer/customizer-hand.php
- url: https://mediostresbarbas.com.ar/php_scrip/banahosting/index.php
- url: https://oldlinewoodwork.com/wp-content/themes/zubin/inc/index.php
- url: https://partnerls.pl/wp-content/themes/public/index.php
- url: https://pierregems.com/wp-content/themes/woodmart/inc/configs/js-hand.php
- url: https://spaincaramoon.com/realestate/wp-content/plugins/gravityforms/forward.php
- url: https://trainingpharmacist.co.uk/bootstrap/bootstrap.php
- url: https://www.anvil.org.ph/list/images/index.php
- url: https://www.bandarpowder.com/public/assets/buttons/bootstrap.php
- url: https://www.mnmathleague.org/ckeditor/adapters/index.php
- url: https://www.scgestor.com.br/wp-content/themes/vantage/inc/template-headers.php
- domain: coralsunmarine.com
- domain: ecudecode.mx
- domain: galaterrace.com
- domain: kazitradebd.com
- domain: mediostresbarbas.com.ar
- domain: oldlinewoodwork.com
- domain: partnerls.pl
- domain: pierregems.com
- domain: spaincaramoon.com
- domain: trainingpharmacist.co.uk
- domain: www.anvil.org.ph
- domain: www.bandarpowder.com
- domain: www.mnmathleague.org
- domain: www.scgestor.com.br
- domain: www.scoringmnmathleague.org
Gotta fly: Lazarus targets the UAV sector
Description
ESET researchers have uncovered a new instance of Operation DreamJob, a campaign attributed to the North Korea-aligned Lazarus group, targeting European defense companies involved in UAV technology. The attacks align with North Korea's efforts to enhance its drone program, likely aiming to steal proprietary information and manufacturing know-how. The campaign uses social engineering tactics, trojanized open-source projects, and deploys the ScoringMathTea RAT. The attackers' toolset includes various droppers, loaders, and downloaders, with a focus on UAV-related targets. This activity highlights the ongoing threat posed by Lazarus and North Korea's interest in advancing its drone capabilities through cyberespionage.
AI-Powered Analysis
Technical Analysis
Operation DreamJob is a cyberespionage campaign attributed to the Lazarus group, a North Korea-aligned threat actor, targeting European defense companies specializing in unmanned aerial vehicle (UAV) technology. The campaign's objective is to steal proprietary information and manufacturing know-how to support North Korea's drone program development. Attackers employ social engineering techniques to lure victims, including the use of trojanized open-source projects that appear legitimate but contain malicious payloads. The primary malware deployed is the ScoringMathTea Remote Access Trojan (RAT), supported by a suite of droppers, loaders, and downloaders such as QuanPinLoader and BinMergeLoader, facilitating stealthy and persistent access. The campaign leverages multiple MITRE ATT&CK techniques including command and control over standard protocols (T1071.001), credential dumping (T1003), process injection (T1055), and data staging (T1074.002), indicating a sophisticated multi-stage intrusion. The attackers focus on UAV-related targets, reflecting North Korea's strategic interest in enhancing its drone capabilities through cyberespionage. No known public exploits are reported, suggesting reliance on social engineering and supply chain compromise rather than zero-day vulnerabilities. The campaign underscores the ongoing threat posed by Lazarus to European defense sectors, emphasizing the need for vigilance against targeted malware and social engineering attacks.
Potential Impact
For European organizations, particularly those involved in UAV technology and defense manufacturing, this campaign poses a significant risk to the confidentiality and integrity of sensitive intellectual property and operational data. Theft of proprietary UAV designs and manufacturing processes could undermine competitive advantage, lead to loss of revenue, and compromise national security. The presence of advanced malware like ScoringMathTea RAT enables persistent access, data exfiltration, and potential sabotage. Additionally, successful intrusions could facilitate further attacks on supply chains or critical infrastructure. The campaign's focus on social engineering increases the likelihood of initial compromise, especially if employee awareness is insufficient. Given the strategic importance of UAV technology in defense, the impact extends beyond individual companies to broader European defense capabilities and geopolitical stability.
Mitigation Recommendations
Organizations should implement targeted detection and response capabilities for the specific malware families involved, including ScoringMathTea RAT, QuanPinLoader, and BinMergeLoader. Enhancing email and web filtering to detect trojanized open-source projects and suspicious attachments is critical. Conduct thorough vetting and monitoring of open-source components integrated into development pipelines to prevent supply chain compromises. Employee training focused on recognizing social engineering tactics and phishing attempts must be prioritized. Network segmentation and strict access controls can limit lateral movement if compromise occurs. Deploy endpoint detection and response (EDR) solutions capable of identifying process injection, credential dumping, and unusual command and control traffic. Regularly audit and update threat intelligence feeds to stay informed about Lazarus group TTPs. Finally, collaborate with national cybersecurity agencies and defense sector partners to share indicators of compromise and coordinate defense strategies.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.welivesecurity.com/en/eset-research/gotta-fly-lazarus-targets-uav-sector"]
- Adversary
- Lazarus
- Pulse Id
- 68fa32c80f24106e04d886f7
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip104.247.162.67 | — | |
ip193.39.187.165 | — | |
ip66.29.144.75 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash03d9b8f0fcf9173d2964ce7173d21e681dfa8da4 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://coralsunmarine.com/wp-content/themes/flatsome/inc/functions/function-hand.php | — | |
urlhttps://ecudecode.mx/redsocial/wp-content/themes/buddyx/inc/Customizer/usercomp.php | — | |
urlhttps://galaterrace.com/wp-content/themes/hello-elementor/includes/functions.php | — | |
urlhttps://kazitradebd.com/wp-content/themes/hello-elementor/includes/customizer/customizer-hand.php | — | |
urlhttps://mediostresbarbas.com.ar/php_scrip/banahosting/index.php | — | |
urlhttps://oldlinewoodwork.com/wp-content/themes/zubin/inc/index.php | — | |
urlhttps://partnerls.pl/wp-content/themes/public/index.php | — | |
urlhttps://pierregems.com/wp-content/themes/woodmart/inc/configs/js-hand.php | — | |
urlhttps://spaincaramoon.com/realestate/wp-content/plugins/gravityforms/forward.php | — | |
urlhttps://trainingpharmacist.co.uk/bootstrap/bootstrap.php | — | |
urlhttps://www.anvil.org.ph/list/images/index.php | — | |
urlhttps://www.bandarpowder.com/public/assets/buttons/bootstrap.php | — | |
urlhttps://www.mnmathleague.org/ckeditor/adapters/index.php | — | |
urlhttps://www.scgestor.com.br/wp-content/themes/vantage/inc/template-headers.php | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaincoralsunmarine.com | — | |
domainecudecode.mx | — | |
domaingalaterrace.com | — | |
domainkazitradebd.com | — | |
domainmediostresbarbas.com.ar | — | |
domainoldlinewoodwork.com | — | |
domainpartnerls.pl | — | |
domainpierregems.com | — | |
domainspaincaramoon.com | — | |
domaintrainingpharmacist.co.uk | — | |
domainwww.anvil.org.ph | — | |
domainwww.bandarpowder.com | — | |
domainwww.mnmathleague.org | — | |
domainwww.scgestor.com.br | — | |
domainwww.scoringmnmathleague.org | — |
Threat ID: 68fb5e869505544a4c48472d
Added to database: 10/24/2025, 11:09:58 AM
Last enriched: 10/24/2025, 11:25:00 AM
Last updated: 12/8/2025, 7:00:29 AM
Views: 207
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-12-07
MediumThreatFox IOCs for 2025-12-06
MediumChinese State Hackers Use New BRICKSTORM Malware Against VMware Systems
MediumAutoIT3 Compiled Scripts Dropping Shellcodes, (Fri, Dec 5th)
MediumThreatFox IOCs for 2025-12-05
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.