朝鲜的Lazarus集团发起了一场网络运动, 利用虚假的工作机会来窃取欧洲无人机技术。
North Korea's Lazarus Group launched a cyber campaign using fake job offers to steal European drone technology.
2025年3月底,ESET发现了北朝鲜的Lazarus集团的新网络运动,这是正在进行的梦Job行动的一部分,目标是开发无人机的欧洲国防公司。
In late March 2025, ESET detected a new cyber campaign by North Korea’s Lazarus Group, part of the ongoing Operation DreamJob, targeting European defense firms developing drones.
攻击者利用伪造的工作报价,通过恶意软件的PDF阅读器和GitHub上的硬盘开源软件,提供远程接入的Trojan ScoringMathTea。
The attackers used fake job offers to deliver a remote-access trojan, ScoringMathTea, via malware-laced PDF readers and trojanized open-source software on GitHub.
对无人驾驶航空器技术的重视表明,有人试图窃取西方军事设计,用于反向工程,其战术包括新的DLL代理和直接X包装,以逃避探测。
The focus on UAV technology suggests efforts to steal Western military designs for reverse engineering, with tactics including new DLL proxying and DirectX wrappers to evade detection.
ESET高度自信地将这场运动归功于拉扎鲁斯,并列举了一贯的方法和选择目标的模式。
ESET attributes the campaign to Lazarus with high confidence, citing consistent methods and targeting patterns.