North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets
Threat actors with ties to North Korea have been attributed to a new wave of attacks targeting European companies active in the defense industry as part of a long-running campaign known as Operation Dream Job. "Some of these [companies] are heavily involved in the unmanned aerial vehicle (UAV) sector, suggesting that the operation may be linked to North Korea's current efforts to scale up its
AI Analysis
Technical Summary
Operation Dream Job is a long-running cyber espionage campaign attributed to the North Korean Lazarus Group, active since at least 2020 and recently observed intensifying in 2025. The campaign targets European defense sector companies, particularly those involved in unmanned aerial vehicle (UAV) development and manufacturing. Attackers employ social engineering tactics by sending fake job offers to defense engineers, luring them to open malicious documents. These documents use trojanized PDF readers to execute binaries that sideload malicious DLLs, deploying malware families such as ScoringMathTea (also known as ForestTiger) and MISTPEN. ScoringMathTea is an advanced remote access trojan (RAT) supporting approximately 40 commands, enabling attackers to gain full control over compromised systems. MISTPEN and the downloader BinMergeLoader leverage Microsoft Graph API and tokens to fetch additional payloads, demonstrating sophisticated multi-stage infection chains. The campaign targets companies in Central and Southeastern Europe, including metal engineering and aircraft component manufacturers. The attackers maintain a consistent but polymorphic approach to evade detection, reusing favored payloads and infection methods. While no public exploits are known, the operation poses a significant threat to the confidentiality and integrity of sensitive defense-related intellectual property. The campaign overlaps with other Lazarus-linked clusters and reflects North Korea's strategic interest in scaling its drone capabilities. The attack chain requires user interaction (opening malicious documents) but no prior authentication, making social engineering the primary infection vector.
Potential Impact
European defense companies, especially those involved in UAV technology, face significant risks from Operation Dream Job. The theft of proprietary drone designs, manufacturing processes, and sensitive defense data could undermine national security and defense industrial competitiveness. Compromised systems could lead to espionage, intellectual property theft, and potential sabotage. The campaign's focus on Central and Southeastern European companies indicates a targeted effort to weaken European defense capabilities. Loss of confidentiality could also impact defense contracts and international collaborations. The malware’s remote access capabilities allow attackers to maintain persistence, move laterally, and exfiltrate large volumes of data undetected. This could result in long-term operational disruptions and erosion of trust in affected organizations. The campaign’s use of legitimate APIs for payload delivery complicates detection and response, increasing the risk of successful breaches.
Mitigation Recommendations
1. Implement targeted security awareness training focused on spear-phishing and social engineering tactics, emphasizing the risks of unsolicited job offers and opening unknown documents. 2. Enforce strict document handling policies, including sandboxing and scanning of all incoming PDFs and attachments with advanced threat detection tools capable of identifying trojanized readers and malicious DLL sideloading. 3. Deploy endpoint detection and response (EDR) solutions tuned to detect behaviors associated with ScoringMathTea and MISTPEN malware, such as unusual DLL loading, use of Microsoft Graph API tokens, and network connections to suspicious domains. 4. Restrict use of Microsoft Graph API tokens and monitor their usage for anomalous activity indicative of malware payload fetching. 5. Apply network segmentation to isolate sensitive defense engineering environments and limit lateral movement opportunities. 6. Conduct regular threat hunting exercises focused on indicators of compromise related to Lazarus Group TTPs. 7. Maintain up-to-date threat intelligence feeds and collaborate with national cybersecurity agencies for timely alerts and response coordination. 8. Implement multi-factor authentication and least privilege principles to reduce the impact of compromised credentials.
Affected Countries
Slovakia, Poland, Czech Republic, Hungary, Romania
North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets
Description
Threat actors with ties to North Korea have been attributed to a new wave of attacks targeting European companies active in the defense industry as part of a long-running campaign known as Operation Dream Job. "Some of these [companies] are heavily involved in the unmanned aerial vehicle (UAV) sector, suggesting that the operation may be linked to North Korea's current efforts to scale up its
AI-Powered Analysis
Technical Analysis
Operation Dream Job is a long-running cyber espionage campaign attributed to the North Korean Lazarus Group, active since at least 2020 and recently observed intensifying in 2025. The campaign targets European defense sector companies, particularly those involved in unmanned aerial vehicle (UAV) development and manufacturing. Attackers employ social engineering tactics by sending fake job offers to defense engineers, luring them to open malicious documents. These documents use trojanized PDF readers to execute binaries that sideload malicious DLLs, deploying malware families such as ScoringMathTea (also known as ForestTiger) and MISTPEN. ScoringMathTea is an advanced remote access trojan (RAT) supporting approximately 40 commands, enabling attackers to gain full control over compromised systems. MISTPEN and the downloader BinMergeLoader leverage Microsoft Graph API and tokens to fetch additional payloads, demonstrating sophisticated multi-stage infection chains. The campaign targets companies in Central and Southeastern Europe, including metal engineering and aircraft component manufacturers. The attackers maintain a consistent but polymorphic approach to evade detection, reusing favored payloads and infection methods. While no public exploits are known, the operation poses a significant threat to the confidentiality and integrity of sensitive defense-related intellectual property. The campaign overlaps with other Lazarus-linked clusters and reflects North Korea's strategic interest in scaling its drone capabilities. The attack chain requires user interaction (opening malicious documents) but no prior authentication, making social engineering the primary infection vector.
Potential Impact
European defense companies, especially those involved in UAV technology, face significant risks from Operation Dream Job. The theft of proprietary drone designs, manufacturing processes, and sensitive defense data could undermine national security and defense industrial competitiveness. Compromised systems could lead to espionage, intellectual property theft, and potential sabotage. The campaign's focus on Central and Southeastern European companies indicates a targeted effort to weaken European defense capabilities. Loss of confidentiality could also impact defense contracts and international collaborations. The malware’s remote access capabilities allow attackers to maintain persistence, move laterally, and exfiltrate large volumes of data undetected. This could result in long-term operational disruptions and erosion of trust in affected organizations. The campaign’s use of legitimate APIs for payload delivery complicates detection and response, increasing the risk of successful breaches.
Mitigation Recommendations
1. Implement targeted security awareness training focused on spear-phishing and social engineering tactics, emphasizing the risks of unsolicited job offers and opening unknown documents. 2. Enforce strict document handling policies, including sandboxing and scanning of all incoming PDFs and attachments with advanced threat detection tools capable of identifying trojanized readers and malicious DLL sideloading. 3. Deploy endpoint detection and response (EDR) solutions tuned to detect behaviors associated with ScoringMathTea and MISTPEN malware, such as unusual DLL loading, use of Microsoft Graph API tokens, and network connections to suspicious domains. 4. Restrict use of Microsoft Graph API tokens and monitor their usage for anomalous activity indicative of malware payload fetching. 5. Apply network segmentation to isolate sensitive defense engineering environments and limit lateral movement opportunities. 6. Conduct regular threat hunting exercises focused on indicators of compromise related to Lazarus Group TTPs. 7. Maintain up-to-date threat intelligence feeds and collaborate with national cybersecurity agencies for timely alerts and response coordination. 8. Implement multi-factor authentication and least privilege principles to reduce the impact of compromised credentials.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/10/north-korean-hackers-lure-defense.html","fetched":true,"fetchedAt":"2025-10-24T01:00:05.303Z","wordCount":1094}
Threat ID: 68facf9f00e9e97283b112e2
Added to database: 10/24/2025, 1:00:15 AM
Last enriched: 10/24/2025, 1:00:28 AM
Last updated: 12/6/2025, 12:24:22 PM
Views: 201
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13748: CWE-639 Authorization Bypass Through User-Controlled Key in techjewel Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
MediumCVE-2025-13907: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tunilame CSS3 Buttons
MediumCVE-2025-13899: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pntrinh TR Timthumb
MediumCVE-2025-13898: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sozan45 Ultra Skype Button
MediumCVE-2025-13896: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdiscover Social Feed Gallery Portfolio
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.