North Korean hacking group targeting European drone maker with ScoringMathTea malware
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读全文,抓住主要信息。 文章讲的是朝鲜的Lazarus黑客组织攻击了三家欧洲无人机和军事设备制造公司。他们使用名为ScoringMathTea的恶意软件,通过伪装成招聘邮件来传播。目标是窃取专有信息和制造技术,尤其是用于乌克兰的无人机。此外,这些攻击可能与朝鲜在俄罗斯前线的行动有关。 接下来,我需要把这些要点浓缩成一段话,确保不超过100字,并且不使用“文章内容总结”之类的开头。要直接描述事件的核心。 可能的结构是:谁做了什么,方法是什么,目标是什么。同时提到乌克兰的情况和恶意软件名称。 现在试着组织语言:“朝鲜Lazarus黑客组织通过伪装成招聘邮件传播ScoringMathTea恶意软件,攻击三家欧洲无人机和军事设备制造公司,窃取专有信息和制造技术。这些公司生产的无人机目前在乌克兰使用,攻击可能与朝鲜在俄罗斯前线的行动有关。” 检查字数是否在100字以内,并确保信息准确无误。 </think> 朝鲜Lazarus黑客组织通过伪装成招聘邮件传播ScoringMathTea恶意软件,攻击三家欧洲无人机和军事设备制造公司,窃取专有信息和制造技术。这些公司生产的无人机目前在乌克兰使用,攻击可能与朝鲜在俄罗斯前线的行动有关。 2025-10-24 01:16:11 Author: therecord.media(查看原文) 阅读量:14 收藏

One of the most prolific hacking groups in North Korea has targeted at least three European companies manufacturing drones and other military equipment. 

Researchers at ESET said they found evidence of a new tentacle of the long-running Operation DreamJob campaign — where North Korea’s Lazarus group sends malware-laden emails purporting to be from recruiters at top companies. 

ESET researcher Peter Kálnai, who discovered the campaign, said the recent attacks were aimed at stealing proprietary information and manufacturing know-how regarding unmanned aerial vehicles. At least one of the malicious emails tracked by ESET explicitly mentioned drones, he added. 

“We have found evidence that one of the targeted entities is involved in the production of at least two UAV models that are currently employed in Ukraine, and which North Korea may have encountered on the front line,” ESET cyberthreat analyst Alexis Rapin explained.

“This entity is also involved in the supply chain of advanced single-rotor drones, a type of aircraft that Pyongyang is actively developing.”

The emails seen by ESET came with PDFs describing lucrative, but fake, job offers. The malware attached to the PDFs is called ScoringMathTea, a strain that allows attackers to take over infected machines and steal information. 

ESET said the companies attacked are active in the defense sector in Central and Southeastern Europe. Each company manufactures different types of military equipment or parts — much of which is being used in Ukraine thanks to military assistance from other European countries. 

ESET noted that the emails came right as North Korean soldiers were being deployed in Russia on the frontlines of the country’s war with Ukraine. The company’s researchers theorized that North Korea either wanted the information on drones both to help its soldiers in Russia and to assist in its own domestic manufacturing of unmanned aerial vehicles. 

Last week, the General Staff of Ukraine released a statement claiming it saw North Korean troops in the Russian city of Kursk using reconnaissance drones to find Ukrainian military positions. 

“The Defense Forces of Ukraine have intercepted communications between North Korean drone operators and personnel of the Russian army. North Korean UAV operators adjusted the fire of multiple launch rocket systems against Ukrainian positions,” the statement said. 

ScoringMathTea

The researchers traced the use of the ScoringMathTea malware back to October 2022, when it was used in attacks on organizations in Portugal and Germany as part of fake job offer emails purporting to be from French company Airbus. 

It provides attackers with troves of information about a victim’s system and provides a gateway for threat actors to take further actions. 

ESET previously tracked compromises involving ScoringMathTea at companies in India, Poland, the U.K. and most recently Italy. The malware appears to be a hallmark of the Operation DreamJob campaign, the researchers said. 

“For nearly three years, Lazarus has maintained a consistent modus operandi, deploying its preferred main payload, ScoringMathTea, and using similar methods to trojanize open-source applications,” Kálnai said. 

Threat researchers at several companies have been tracking the Operation DreamJob campaign since 2020. Google warned in 2022 that 250 people working for 10 different news media, domain registrars, web hosting providers and software vendors were targeted by the campaign, receiving malicious emails from fake recruiters claiming to be from Disney, Google and Oracle. 

The emails contained spoofed links to legitimate job sites like Indeed and ZipRecruiter. 

The Lazarus Group is North Korea’s flagship hacking operation and has been accused of stealing billions in cryptocurrency from blockchain platforms while also facilitating the country’s longstanding IT worker scheme which has siphoned millions from U.S. companies.  

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.


文章来源: https://therecord.media/north-korea-hackers-target-europe-drone-makers
如有侵权请联系:admin#unsafe.sh