North Korean hacking group targeting European drone maker with ScoringMathTea malware

One of the most prolific hacking groups in North Korea has targeted at least three European companies manufacturing drones and other military equipment. 

Researchers at ESET said they found evidence of a new tentacle of the long-running Operation DreamJob campaign — where North Korea’s Lazarus group sends malware-laden emails purporting to be from recruiters at top companies. 

ESET researcher Peter Kálnai, who discovered the campaign, said the recent attacks were aimed at stealing proprietary information and manufacturing know-how regarding unmanned aerial vehicles. At least one of the malicious emails tracked by ESET explicitly mentioned drones, he added. 

“We have found evidence that one of the targeted entities is involved in the production of at least two UAV models that are currently employed in Ukraine, and which North Korea may have encountered on the front line,” ESET cyberthreat analyst Alexis Rapin explained.

“This entity is also involved in the supply chain of advanced single-rotor drones, a type of aircraft that Pyongyang is actively developing.”

The emails seen by ESET came with PDFs describing lucrative, but fake, job offers. The malware attached to the PDFs is called ScoringMathTea, a strain that allows attackers to take over infected machines and steal information. 

ESET said the companies attacked are active in the defense sector in Central and Southeastern Europe. Each company manufactures different types of military equipment or parts — much of which is being used in Ukraine thanks to military assistance from other European countries. 

ESET noted that the emails came right as North Korean soldiers were being deployed in Russia on the frontlines of the country’s war with Ukraine. The company’s researchers theorized that North Korea either wanted the information on drones both to help its soldiers in Russia and to assist in its own domestic manufacturing of unmanned aerial vehicles. 

Last week, the General Staff of Ukraine released a statement claiming it saw North Korean troops in the Russian city of Kursk using reconnaissance drones to find Ukrainian military positions. 

“The Defense Forces of Ukraine have intercepted communications between North Korean drone operators and personnel of the Russian army. North Korean UAV operators adjusted the fire of multiple launch rocket systems against Ukrainian positions,” the statement said. 

The researchers traced the use of the ScoringMathTea malware back to October 2022, when it was used in attacks on organizations in Portugal and Germany as part of fake job offer emails purporting to be from French company Airbus. 

It provides attackers with troves of information about a victim’s system and provides a gateway for threat actors to take further actions. 

ESET previously tracked compromises involving ScoringMathTea at companies in India, Poland, the U.K. and most recently Italy. The malware appears to be a hallmark of the Operation DreamJob campaign, the researchers said. 

“For nearly three years, Lazarus has maintained a consistent modus operandi, deploying its preferred main payload, ScoringMathTea, and using similar methods to trojanize open-source applications,” Kálnai said. 

Threat researchers at several companies have been tracking the Operation DreamJob campaign since 2020. Google warned in 2022 that 250 people working for 10 different news media, domain registrars, web hosting providers and software vendors were targeted by the campaign, receiving malicious emails from fake recruiters claiming to be from Disney, Google and Oracle. 

The emails contained spoofed links to legitimate job sites like Indeed and ZipRecruiter. 

The Lazarus Group is North Korea’s flagship hacking operation and has been accused of stealing billions in cryptocurrency from blockchain platforms while also facilitating the country’s longstanding IT worker scheme which has siphoned millions from U.S. companies.  

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Trump pardons former Binance CEO after guilty plea in letting cybercrime proceeds flow through platform

Next Post

Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack

Related Posts

6 Browser-Based Attacks Security Teams Need to Prepare For Right Now

Attacks that target users in their web browsers have seen an unprecedented rise in recent years. In this article, we’ll explore what a “browser-based attack” is, and why they’re proving to be so effective.  What is a browser-based attack? First, it’s important to establish what a browser-based attack is. In most scenarios, attackers don’t think of themselves as attacking your web browser.
Read More

Lean Teams, Higher Stakes: Why CISOs Must Rethink Incident Remediation

Big companies are getting smaller, and their CEOs want everyone to know it. Wells Fargo has cut its workforce by 23% over five years, Bank of America has shed 88,000 employees since 2010, and Verizon's CEO recently boasted that headcount is "going down all the time." What was once a sign of corporate distress has become a badge of honor, with executives celebrating lean operations and AI-driven
Read More

Salesloft Takes Drift Offline After OAuth Token Theft Hits Hundreds of Organizations

Salesloft on Tuesday announced that it's taking Drift temporarily offline "in the very near future," as multiple companies have been ensnared in a far-reaching supply chain attack spree targeting the marketing software-as-a-service product, resulting in the mass theft of authentication tokens. "This will provide the fastest path forward to comprehensively review the application and build
Read More