home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,868 of 2,445   
   Mike Powell to All   
   North Korean hackers targ   
   25 Oct 25 10:16:40   
   
   TZUTC: -0500   
   MSGID: 1625.consprcy@1:2320/105 2d622631   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   North Korean hackers target European defense firms with dream job scam   
      
   Date:   
   Fri, 24 Oct 2025 14:14:00 +0000   
      
   Description:   
   Lazarus is after drone know-how and has infiltrated three firms.   
      
   FULL STORY   
      
   Infamous North Korean state-sponsored threat actors, Lazarus Group, have been   
   targeting Southeastern European defense firms with their Operation DreamJob   
   scams.    
      
   Security researchers at ESET claim the goal of the attacks was to steal the   
   know-how and other proprietary information on unmanned aerial vehicles (UAV)   
   and drones.    
      
   Lazarus is known for its work in supporting North Koreas weapons development   
   program. This is usually done by attacking crypto firms, stealing money, and   
   then using it to fund research and development. In this case, the operation    
   is somewhat different, but the goal is the same.   
      
   ScoringMathTea    
      
   Operation DreamJob is Lazarus signature move. The group would create fake   
   companies, fake personas, and fake jobs, and then reach out to their targets,   
   offering lucrative positions.    
      
   People who take the bait are usually invited to multiple rounds of job   
   interviews and trials, in which they are asked to download PDF files,   
   programs, apps, and code.    
      
   However, instead of actually completing any trials, the victims would simply   
   be downloading malware .    
      
   ESET says the attacks took place at approximately the same time when North   
   Korean soldiers were in Russia, assisting the Russian army in the Kursk   
   region, which was in late 2024. At least three companies were breached, and   
   information on how to build drones was stolen.    
      
   The researchers explained that North Korea is building drones of its own, and   
   that many of the materials used in Eastern European drones are also used in   
   North Korea. They also explained that many of the drones designed in Eastern   
   Europe are being used in the Ukrainian war, which is why they were of   
   particular interest to Lazarus.    
      
   After breaching their targets, the attackers would deploy ScoringMathTea, a   
   remote access trojan (RAT) that grants full control over the compromised   
   machine.    
      
   We believe that it is likely that Operation DreamJob was  at least partially   
   aimed at stealing proprietary information, and manufacturing know-how,   
   regarding UAVs. The drone mention observed in one of the droppers   
   significantly reinforces this hypothesis, says ESET researcher Peter Klnai,   
   who discovered and analyzed these latest Lazarus attacks.    
      
   We have found evidence that one of the targeted entities is involved in the   
   production of at least two UAV models that are currently employed in Ukraine,   
   and which North Korea may have encountered on the front line. This entity is   
   also involved in the supply chain of advanced single-rotor drones, a type of   
   aircraft that Pyongyang is actively developing, adds Alexis Rapin, ESET   
   cyberthreat analyst.    
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/north-korean-hackers-target-european-de   
   fense-firms-with-dream-job-scam   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 206 300 307 317 400 426 428 470   
   SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca