Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Gotta fly: Targeting the UAV sector

0
Medium
Published: Sun Nov 09 2025 (11/09/2025, 04:31:53 UTC)
Source: AlienVault OTX General

Description

Operation DreamJob is a cyberespionage campaign by the North Korea-aligned Lazarus group targeting European defense companies specializing in UAV technology. The attackers use social engineering and trojanized open-source software to deliver a sophisticated malware toolset including ScoringMathTea RAT and BinMergeLoader. The campaign aims to steal intellectual property and manufacturing knowledge to support North Korea's drone program. Attack techniques involve multiple stages with droppers, loaders, and downloaders, exploiting user interaction and system reconnaissance. The threat poses a medium severity risk due to targeted espionage with potential long-term strategic impact on defense capabilities. European UAV manufacturers and defense contractors are primary targets, especially in countries with significant aerospace industries. Mitigation requires enhanced supply chain security, strict validation of open-source software, user training against social engineering, and robust endpoint detection. Countries like Germany, France, Italy, and the UK are most likely affected given their UAV sector prominence and defense industry size. The campaign does not require zero-day exploits but leverages social engineering and trojanized software, increasing the risk of successful infiltration. Defenders should prioritize monitoring for known malware components and suspicious network activity related to this campaign.

AI-Powered Analysis

AILast updated: 11/10/2025, 11:36:53 UTC

Technical Analysis

The Operation DreamJob campaign, attributed to the Lazarus group aligned with North Korea, targets European defense companies involved in unmanned aerial vehicle (UAV) technology. This cyberespionage effort aims to acquire proprietary UAV designs and manufacturing knowledge to bolster North Korea's drone capabilities. The attackers employ social engineering tactics to trick victims into executing trojanized versions of legitimate open-source projects, thereby gaining initial access. The malware toolset includes multiple components such as droppers, loaders, and downloaders, with key payloads being BinMergeLoader and the ScoringMathTea Remote Access Trojan (RAT). These tools facilitate stealthy persistence, reconnaissance, and data exfiltration. The campaign leverages various MITRE ATT&CK techniques including T1132.001 (Data Encoding), T1129 (Execution through Module Load), T1587.001 (Develop Capabilities), T1204.002 (User Execution: Malicious File), and others, indicating a sophisticated multi-stage infection chain. The attackers rely heavily on social engineering and supply chain compromise rather than zero-day exploits, making user awareness and software integrity critical defense points. The focus on UAV technology reflects North Korea's strategic priority to reverse engineer and develop drone capabilities through intellectual property theft. The campaign's medium severity rating reflects its targeted nature, potential impact on confidentiality of sensitive defense data, and the complexity of the attack chain.

Potential Impact

For European organizations, particularly those in the defense and aerospace sectors, this campaign threatens the confidentiality and integrity of highly sensitive UAV technology and intellectual property. Successful infiltration could lead to theft of proprietary designs, manufacturing processes, and strategic defense capabilities, undermining competitive advantage and national security. The exfiltrated data could enable North Korea to accelerate its drone development, potentially shifting regional military balances. Additionally, compromised systems may suffer operational disruptions or be used as footholds for further attacks. The campaign's reliance on social engineering and trojanized software increases the risk of insider compromise or inadvertent infection, especially in organizations with extensive use of open-source tools. The long-term impact includes erosion of trust in supply chains and increased costs for securing sensitive R&D environments. European defense contractors may face reputational damage and regulatory scrutiny if breaches become public. Overall, the threat poses a strategic espionage risk with potential cascading effects on defense readiness and technological leadership in UAV innovation.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy tailored to this campaign's tactics. First, enforce strict validation and integrity checks of all open-source software before deployment, including cryptographic verification and use of trusted repositories. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying behaviors associated with ScoringMathTea RAT and BinMergeLoader, such as unusual process injections, network communications, and file modifications. Conduct targeted user awareness training focused on recognizing social engineering attempts, especially spear-phishing and malicious file execution. Implement network segmentation to isolate sensitive UAV development environments and limit lateral movement. Monitor network traffic for anomalies consistent with data exfiltration techniques (e.g., encoded or tunneled communications). Employ application allowlisting to prevent execution of unauthorized binaries. Regularly audit and update incident response plans to include scenarios involving supply chain compromise and RAT infections. Collaborate with national cybersecurity agencies and share threat intelligence to stay informed about evolving Lazarus group tactics. Finally, consider enhanced physical and logical access controls around critical R&D assets to reduce insider threat risks.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.welivesecurity.com/en/eset-research/gotta-fly-lazarus-targets-uav-sector/"]
Adversary
Lazarus
Pulse Id
6910193940d4cd48acfd0529
Threat Score
null

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttps://galaterrace.com/wp-content/themes/hello-elementor/includes/functions.php
urlhttps://www.mnmathleague.org/ckeditor/adapters/index.php
urlhttps://www.scgestor.com.br/wp-content/themes/vantage/inc/template-headers.php
urlhttps://coralsunmarine.com/wp-content/themes/flatsome/inc/functions/function-hand.php
urlhttps://ecudecode.mx/redsocial/wp-content/themes/buddyx/inc/Customizer/usercomp.php
urlhttps://kazitradebd.com/wp-content/themes/hello-elementor/includes/customizer/customizer-hand.php
urlhttps://mediostresbarbas.com.ar/php_scrip/banahosting/index.php
urlhttps://oldlinewoodwork.com/wp-content/themes/zubin/inc/index.php
urlhttps://partnerls.pl/wp-content/themes/public/index.php
urlhttps://pierregems.com/wp-content/themes/woodmart/inc/configs/js-hand.php
urlhttps://spaincaramoon.com/realestate/wp-content/plugins/gravityforms/forward.php
urlhttps://trainingpharmacist.co.uk/bootstrap/bootstrap.php
urlhttps://www.anvil.org.ph/list/images/index.php
urlhttps://www.bandarpowder.com/public/assets/buttons/bootstrap.php

Ip

ValueDescriptionCopy
ip104.247.162.67
ip193.39.187.165
ip66.29.144.75

Hash

ValueDescriptionCopy
hash03d9b8f0fcf9173d2964ce7173d21e681dfa8da4

Domain

ValueDescriptionCopy
domaincoralsunmarine.com
domainecudecode.mx
domaingalaterrace.com
domainkazitradebd.com
domainmediostresbarbas.com.ar
domainoldlinewoodwork.com
domainpartnerls.pl
domainpierregems.com
domainspaincaramoon.com
domaintrainingpharmacist.co.uk
domainwww.anvil.org.ph
domainwww.bandarpowder.com
domainwww.scgestor.com.br
domainwww.scoringmnmathleague.org

Threat ID: 6911ce0353b42a4b74c9b5a5

Added to database: 11/10/2025, 11:35:31 AM

Last enriched: 11/10/2025, 11:36:53 AM

Last updated: 12/24/2025, 3:54:52 PM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats