Gotta fly: Targeting the UAV sector
Operation DreamJob is a cyberespionage campaign by the North Korea-aligned Lazarus group targeting European defense companies specializing in UAV technology. The attackers use social engineering and trojanized open-source software to deliver a sophisticated malware toolset including ScoringMathTea RAT and BinMergeLoader. The campaign aims to steal intellectual property and manufacturing knowledge to support North Korea's drone program. Attack techniques involve multiple stages with droppers, loaders, and downloaders, exploiting user interaction and system reconnaissance. The threat poses a medium severity risk due to targeted espionage with potential long-term strategic impact on defense capabilities. European UAV manufacturers and defense contractors are primary targets, especially in countries with significant aerospace industries. Mitigation requires enhanced supply chain security, strict validation of open-source software, user training against social engineering, and robust endpoint detection. Countries like Germany, France, Italy, and the UK are most likely affected given their UAV sector prominence and defense industry size. The campaign does not require zero-day exploits but leverages social engineering and trojanized software, increasing the risk of successful infiltration. Defenders should prioritize monitoring for known malware components and suspicious network activity related to this campaign.
AI Analysis
Technical Summary
The Operation DreamJob campaign, attributed to the Lazarus group aligned with North Korea, targets European defense companies involved in unmanned aerial vehicle (UAV) technology. This cyberespionage effort aims to acquire proprietary UAV designs and manufacturing knowledge to bolster North Korea's drone capabilities. The attackers employ social engineering tactics to trick victims into executing trojanized versions of legitimate open-source projects, thereby gaining initial access. The malware toolset includes multiple components such as droppers, loaders, and downloaders, with key payloads being BinMergeLoader and the ScoringMathTea Remote Access Trojan (RAT). These tools facilitate stealthy persistence, reconnaissance, and data exfiltration. The campaign leverages various MITRE ATT&CK techniques including T1132.001 (Data Encoding), T1129 (Execution through Module Load), T1587.001 (Develop Capabilities), T1204.002 (User Execution: Malicious File), and others, indicating a sophisticated multi-stage infection chain. The attackers rely heavily on social engineering and supply chain compromise rather than zero-day exploits, making user awareness and software integrity critical defense points. The focus on UAV technology reflects North Korea's strategic priority to reverse engineer and develop drone capabilities through intellectual property theft. The campaign's medium severity rating reflects its targeted nature, potential impact on confidentiality of sensitive defense data, and the complexity of the attack chain.
Potential Impact
For European organizations, particularly those in the defense and aerospace sectors, this campaign threatens the confidentiality and integrity of highly sensitive UAV technology and intellectual property. Successful infiltration could lead to theft of proprietary designs, manufacturing processes, and strategic defense capabilities, undermining competitive advantage and national security. The exfiltrated data could enable North Korea to accelerate its drone development, potentially shifting regional military balances. Additionally, compromised systems may suffer operational disruptions or be used as footholds for further attacks. The campaign's reliance on social engineering and trojanized software increases the risk of insider compromise or inadvertent infection, especially in organizations with extensive use of open-source tools. The long-term impact includes erosion of trust in supply chains and increased costs for securing sensitive R&D environments. European defense contractors may face reputational damage and regulatory scrutiny if breaches become public. Overall, the threat poses a strategic espionage risk with potential cascading effects on defense readiness and technological leadership in UAV innovation.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to this campaign's tactics. First, enforce strict validation and integrity checks of all open-source software before deployment, including cryptographic verification and use of trusted repositories. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying behaviors associated with ScoringMathTea RAT and BinMergeLoader, such as unusual process injections, network communications, and file modifications. Conduct targeted user awareness training focused on recognizing social engineering attempts, especially spear-phishing and malicious file execution. Implement network segmentation to isolate sensitive UAV development environments and limit lateral movement. Monitor network traffic for anomalies consistent with data exfiltration techniques (e.g., encoded or tunneled communications). Employ application allowlisting to prevent execution of unauthorized binaries. Regularly audit and update incident response plans to include scenarios involving supply chain compromise and RAT infections. Collaborate with national cybersecurity agencies and share threat intelligence to stay informed about evolving Lazarus group tactics. Finally, consider enhanced physical and logical access controls around critical R&D assets to reduce insider threat risks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland
Indicators of Compromise
- url: https://galaterrace.com/wp-content/themes/hello-elementor/includes/functions.php
- url: https://www.mnmathleague.org/ckeditor/adapters/index.php
- url: https://www.scgestor.com.br/wp-content/themes/vantage/inc/template-headers.php
- ip: 104.247.162.67
- hash: 03d9b8f0fcf9173d2964ce7173d21e681dfa8da4
- ip: 193.39.187.165
- ip: 66.29.144.75
- url: https://coralsunmarine.com/wp-content/themes/flatsome/inc/functions/function-hand.php
- url: https://ecudecode.mx/redsocial/wp-content/themes/buddyx/inc/Customizer/usercomp.php
- url: https://kazitradebd.com/wp-content/themes/hello-elementor/includes/customizer/customizer-hand.php
- url: https://mediostresbarbas.com.ar/php_scrip/banahosting/index.php
- url: https://oldlinewoodwork.com/wp-content/themes/zubin/inc/index.php
- url: https://partnerls.pl/wp-content/themes/public/index.php
- url: https://pierregems.com/wp-content/themes/woodmart/inc/configs/js-hand.php
- url: https://spaincaramoon.com/realestate/wp-content/plugins/gravityforms/forward.php
- url: https://trainingpharmacist.co.uk/bootstrap/bootstrap.php
- url: https://www.anvil.org.ph/list/images/index.php
- url: https://www.bandarpowder.com/public/assets/buttons/bootstrap.php
- domain: coralsunmarine.com
- domain: ecudecode.mx
- domain: galaterrace.com
- domain: kazitradebd.com
- domain: mediostresbarbas.com.ar
- domain: oldlinewoodwork.com
- domain: partnerls.pl
- domain: pierregems.com
- domain: spaincaramoon.com
- domain: trainingpharmacist.co.uk
- domain: www.anvil.org.ph
- domain: www.bandarpowder.com
- domain: www.scgestor.com.br
- domain: www.scoringmnmathleague.org
Gotta fly: Targeting the UAV sector
Description
Operation DreamJob is a cyberespionage campaign by the North Korea-aligned Lazarus group targeting European defense companies specializing in UAV technology. The attackers use social engineering and trojanized open-source software to deliver a sophisticated malware toolset including ScoringMathTea RAT and BinMergeLoader. The campaign aims to steal intellectual property and manufacturing knowledge to support North Korea's drone program. Attack techniques involve multiple stages with droppers, loaders, and downloaders, exploiting user interaction and system reconnaissance. The threat poses a medium severity risk due to targeted espionage with potential long-term strategic impact on defense capabilities. European UAV manufacturers and defense contractors are primary targets, especially in countries with significant aerospace industries. Mitigation requires enhanced supply chain security, strict validation of open-source software, user training against social engineering, and robust endpoint detection. Countries like Germany, France, Italy, and the UK are most likely affected given their UAV sector prominence and defense industry size. The campaign does not require zero-day exploits but leverages social engineering and trojanized software, increasing the risk of successful infiltration. Defenders should prioritize monitoring for known malware components and suspicious network activity related to this campaign.
AI-Powered Analysis
Technical Analysis
The Operation DreamJob campaign, attributed to the Lazarus group aligned with North Korea, targets European defense companies involved in unmanned aerial vehicle (UAV) technology. This cyberespionage effort aims to acquire proprietary UAV designs and manufacturing knowledge to bolster North Korea's drone capabilities. The attackers employ social engineering tactics to trick victims into executing trojanized versions of legitimate open-source projects, thereby gaining initial access. The malware toolset includes multiple components such as droppers, loaders, and downloaders, with key payloads being BinMergeLoader and the ScoringMathTea Remote Access Trojan (RAT). These tools facilitate stealthy persistence, reconnaissance, and data exfiltration. The campaign leverages various MITRE ATT&CK techniques including T1132.001 (Data Encoding), T1129 (Execution through Module Load), T1587.001 (Develop Capabilities), T1204.002 (User Execution: Malicious File), and others, indicating a sophisticated multi-stage infection chain. The attackers rely heavily on social engineering and supply chain compromise rather than zero-day exploits, making user awareness and software integrity critical defense points. The focus on UAV technology reflects North Korea's strategic priority to reverse engineer and develop drone capabilities through intellectual property theft. The campaign's medium severity rating reflects its targeted nature, potential impact on confidentiality of sensitive defense data, and the complexity of the attack chain.
Potential Impact
For European organizations, particularly those in the defense and aerospace sectors, this campaign threatens the confidentiality and integrity of highly sensitive UAV technology and intellectual property. Successful infiltration could lead to theft of proprietary designs, manufacturing processes, and strategic defense capabilities, undermining competitive advantage and national security. The exfiltrated data could enable North Korea to accelerate its drone development, potentially shifting regional military balances. Additionally, compromised systems may suffer operational disruptions or be used as footholds for further attacks. The campaign's reliance on social engineering and trojanized software increases the risk of insider compromise or inadvertent infection, especially in organizations with extensive use of open-source tools. The long-term impact includes erosion of trust in supply chains and increased costs for securing sensitive R&D environments. European defense contractors may face reputational damage and regulatory scrutiny if breaches become public. Overall, the threat poses a strategic espionage risk with potential cascading effects on defense readiness and technological leadership in UAV innovation.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to this campaign's tactics. First, enforce strict validation and integrity checks of all open-source software before deployment, including cryptographic verification and use of trusted repositories. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying behaviors associated with ScoringMathTea RAT and BinMergeLoader, such as unusual process injections, network communications, and file modifications. Conduct targeted user awareness training focused on recognizing social engineering attempts, especially spear-phishing and malicious file execution. Implement network segmentation to isolate sensitive UAV development environments and limit lateral movement. Monitor network traffic for anomalies consistent with data exfiltration techniques (e.g., encoded or tunneled communications). Employ application allowlisting to prevent execution of unauthorized binaries. Regularly audit and update incident response plans to include scenarios involving supply chain compromise and RAT infections. Collaborate with national cybersecurity agencies and share threat intelligence to stay informed about evolving Lazarus group tactics. Finally, consider enhanced physical and logical access controls around critical R&D assets to reduce insider threat risks.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.welivesecurity.com/en/eset-research/gotta-fly-lazarus-targets-uav-sector/"]
- Adversary
- Lazarus
- Pulse Id
- 6910193940d4cd48acfd0529
- Threat Score
- null
Indicators of Compromise
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://galaterrace.com/wp-content/themes/hello-elementor/includes/functions.php | — | |
urlhttps://www.mnmathleague.org/ckeditor/adapters/index.php | — | |
urlhttps://www.scgestor.com.br/wp-content/themes/vantage/inc/template-headers.php | — | |
urlhttps://coralsunmarine.com/wp-content/themes/flatsome/inc/functions/function-hand.php | — | |
urlhttps://ecudecode.mx/redsocial/wp-content/themes/buddyx/inc/Customizer/usercomp.php | — | |
urlhttps://kazitradebd.com/wp-content/themes/hello-elementor/includes/customizer/customizer-hand.php | — | |
urlhttps://mediostresbarbas.com.ar/php_scrip/banahosting/index.php | — | |
urlhttps://oldlinewoodwork.com/wp-content/themes/zubin/inc/index.php | — | |
urlhttps://partnerls.pl/wp-content/themes/public/index.php | — | |
urlhttps://pierregems.com/wp-content/themes/woodmart/inc/configs/js-hand.php | — | |
urlhttps://spaincaramoon.com/realestate/wp-content/plugins/gravityforms/forward.php | — | |
urlhttps://trainingpharmacist.co.uk/bootstrap/bootstrap.php | — | |
urlhttps://www.anvil.org.ph/list/images/index.php | — | |
urlhttps://www.bandarpowder.com/public/assets/buttons/bootstrap.php | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip104.247.162.67 | — | |
ip193.39.187.165 | — | |
ip66.29.144.75 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash03d9b8f0fcf9173d2964ce7173d21e681dfa8da4 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaincoralsunmarine.com | — | |
domainecudecode.mx | — | |
domaingalaterrace.com | — | |
domainkazitradebd.com | — | |
domainmediostresbarbas.com.ar | — | |
domainoldlinewoodwork.com | — | |
domainpartnerls.pl | — | |
domainpierregems.com | — | |
domainspaincaramoon.com | — | |
domaintrainingpharmacist.co.uk | — | |
domainwww.anvil.org.ph | — | |
domainwww.bandarpowder.com | — | |
domainwww.scgestor.com.br | — | |
domainwww.scoringmnmathleague.org | — |
Threat ID: 6911ce0353b42a4b74c9b5a5
Added to database: 11/10/2025, 11:35:31 AM
Last enriched: 11/10/2025, 11:36:53 AM
Last updated: 12/24/2025, 3:54:52 PM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Evasive Panda APT poisons DNS requests to deliver MgBot
MediumThreatFox IOCs for 2025-12-23
MediumDissecting a Multi-Stage macOS Infostealer
MediumNew MacSync Stealer Disguised as Trusted Mac App Hunts Your Saved Passwords
Medium2025 Holiday Scams: Docusign Phishing Meets Loan Spam
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.