The North Korean state-sponsored threat actor Lazarus Group—also known as Labyrinth Chollima, Hidden Cobra, and Zinc—has intensified its global cyber-espionage campaign through Operation DreamJob, targeting European defense organizations involved in unmanned aerial vehicle (UAV) development.
This new wave of attacks, first observed in March 2025, focuses on engineering and defense manufacturers that supply drone hardware and software used in Ukraine. The campaign uses job-themed social engineering lures and malicious loaders, including ScoringMathTea and BinMergeLoader, to infiltrate systems and steal aerospace technology and UAV design intelligence.
Despite widespread awareness of these tactics, the defense sector remains vulnerable to Lazarus’ persistent espionage operations, which aim to accelerate Pyongyang’s domestic drone production by stealing cutting-edge UAV data.
Operation DreamJob represents one of Lazarus’ most strategically significant cyber-espionage campaigns to date, aligning with North Korea’s broader geopolitical and military ambitions.
The attacks reflect Lazarus’ continued evolution toward high-value intelligence theft, shifting from purely financial operations to strategic, defense-focused cyber espionage.
SHA1 Hashes:
28978E987BC59E75CA22562924EAB93355CF679E,
5E5BBA521F0034D342CC26DB8BCFECE57DBD4616,
B12EEB595FEEC2CFBF9A60E1CC21A14CE8873539,
26AA2643B07C48CB6943150ADE541580279E8E0E,
0CB73D70FD4132A4FF5493DAA84AAE839F6329D5,
03D9B8F0FCF9173D2964CE7173D21E681DFA8DA4,
71D0DDB7C6CAC4BA2BDE679941FA92A31FBEC1FF,
87B2DF764455164C6982BA9700F27EA34D3565DF,
E670C4275EC24D403E0D4DE7135CBCF1D54FF09C,
B6D8D8F5E0864F5DA788F96BE085ABECF3581CCE,
5B85DD485FD516AA1F4412801897A40A9BE31837,
B68C49841DC48E3672031795D85ED24F9F619782,
AC16B1BAEDE349E4824335E0993533BF5FC116B3,
2AA341B03FAC3054C57640122EA849BC0C2B6AF6,
CB7834BE7DE07F89352080654F7FEB574B42A2B8,
262B4ED6AC6A977135DECA5B0872B7D6D676083A,
086816466D9D9C12FCADA1C872B8C0FF0A5FC611,
2A2B20FDDD65BA28E7C57AC97A158C9F15A61B05
IPv4 Addresses:
23[.]111[.]133[.]162,
104[.]21[.]80[.]1,
70[.]32[.]24[.]131,
185[.]148[.]129[.]24,
66[.]29[.]144[.]75,
108[.]181[.]92[.]71,
104[.]247[.]162[.]67,
193[.]39[.]187[.]165,
172[.]67[.]193[.]139,
77[.]55[.]252[.]111,
45[.]148[.]29[.]122,
75[.]102[.]23[.]3,
152[.]42[.]239[.]211,
95[.]217[.]119[.]214
Domains:
coralsunmarine[.]com,
kazitradebd[.]com,
oldlinewoodwork[.]com,
www[.]mnmathleague[.]org,
pierregems[.]com,
www[.]scgestor[.]com[.]br,
galaterrace[.]com,
ecudecode[.]mx,
www[.]anvil[.]org[.]ph,
partnerls[.]pl,
trainingpharmacist[.]co[.]uk,
mediostresbarbas[.]com[.]ar,
www[.]bandarpowder[.]com,
spaincaramoon[.]com
File Names:
TSMSISrv.dll, libmupdf.dll, radcui.dll, HideFirstLetter.dll, libpcre.dll, webservices.dll,
RCX1A07.tmp, cache.dat, msadomr.dll, ComparePlus.dll, tzautosync.dat
URLs:
hxxps[:]//coralsunmarine[.]com/wp-content/themes/flatsome/inc/functions/function-hand[.]php,
hxxps[:]//kazitradebd[.]com/wp-content/themes/hello-elementor/includes/customizer/customizer-hand[.]php,
hxxps[:]//oldlinewoodwork[.]com/wp-content/themes/zubin/inc/index[.]php,
hxxps[:]//www[.]mnmathleague[.]org/ckeditor/adapters/index[.]php,
hxxps[:]//pierregems[.]com/wp-content/themes/woodmart/inc/configs/js-hand[.]php,
hxxps[:]//www[.]scgestor[.]com[.]br/wp-content/themes/vantage/inc/template-headers[.]php,
hxxps[:]//galaterrace[.]com/wp-content/themes/hello-elementor/includes/functions[.]php,
hxxps[:]//ecudecode[.]mx/redsocial/wp-content/themes/buddyx/inc/Customizer/usercomp[.]php,
hxxps[:]//www[.]anvil[.]org[.]ph/list/images/index[.]php,
hxxps[:]//partnerls[.]pl/wp-content/themes/public/index[.]php,
hxxps[:]//trainingpharmacist[.]co[.]uk/bootstrap/bootstrap[.]php,
hxxps[:]//mediostresbarbas[.]com[.]ar/php_scrip/banahosting/index[.]php,
hxxps[:]//www[.]bandarpowder[.]com/public/assets/buttons/bootstrap[.]php,
hxxps[:]//spaincaramoon[.]com/realestate/wp-content/plugins/gravityforms/forward[.]php
| Tactic | Technique | ID |
|---|---|---|
| Resource Development | Compromise Infrastructure – Server | T1584, T1584.004 |
| Initial Access | Phishing – Malicious File | T1566, T1204.002 |
| Execution | User Execution – Malicious File | T1204.002 |
| Persistence | Shared Modules, DLL Hijacking | T1129, T1574.001 |
| Defense Evasion | Obfuscated Files / Dynamic API Resolution | T1027, T1027.007 |
| Discovery | System and Process Discovery | T1082, T1057 |
| Exfiltration | Exfiltration Over C2 Channel | T1041 |
| Command and Control | Encrypted Web Protocols | T1071.001, T1573.001 |
| Impact | Masquerading | T1036 |
Get through updates and upcoming events, and more directly in your inbox