North Korean hacking group targeting European drone maker with ScoringMathTea malware

One of the most prolific hacking groups in North Korea has targeted at least three European companies manufacturing drones and other military equipment. 

Researchers at ESET said they found evidence of a new tentacle of the long-running Operation DreamJob campaign — where North Korea’s Lazarus group sends malware-laden emails purporting to be from recruiters at top companies. 

ESET researcher Peter Kálnai, who discovered the campaign, said the recent attacks were aimed at stealing proprietary information and manufacturing know-how regarding unmanned aerial vehicles. At least one of the malicious emails tracked by ESET explicitly mentioned drones, he added. 

“We have found evidence that one of the targeted entities is involved in the production of at least two UAV models that are currently employed in Ukraine, and which North Korea may have encountered on the front line,” ESET cyberthreat analyst Alexis Rapin explained.

“This entity is also involved in the supply chain of advanced single-rotor drones, a type of aircraft that Pyongyang is actively developing.”

The emails seen by ESET came with PDFs describing lucrative, but fake, job offers. The malware attached to the PDFs is called ScoringMathTea, a strain that allows attackers to take over infected machines and steal information. 

ESET said the companies attacked are active in the defense sector in Central and Southeastern Europe. Each company manufactures different types of military equipment or parts — much of which is being used in Ukraine thanks to military assistance from other European countries. 

ESET noted that the emails came right as North Korean soldiers were being deployed in Russia on the frontlines of the country’s war with Ukraine. The company’s researchers theorized that North Korea either wanted the information on drones both to help its soldiers in Russia and to assist in its own domestic manufacturing of unmanned aerial vehicles. 

Last week, the General Staff of Ukraine released a statement claiming it saw North Korean troops in the Russian city of Kursk using reconnaissance drones to find Ukrainian military positions. 

“The Defense Forces of Ukraine have intercepted communications between North Korean drone operators and personnel of the Russian army. North Korean UAV operators adjusted the fire of multiple launch rocket systems against Ukrainian positions,” the statement said. 

The researchers traced the use of the ScoringMathTea malware back to October 2022, when it was used in attacks on organizations in Portugal and Germany as part of fake job offer emails purporting to be from French company Airbus. 

It provides attackers with troves of information about a victim’s system and provides a gateway for threat actors to take further actions. 

ESET previously tracked compromises involving ScoringMathTea at companies in India, Poland, the U.K. and most recently Italy. The malware appears to be a hallmark of the Operation DreamJob campaign, the researchers said. 

“For nearly three years, Lazarus has maintained a consistent modus operandi, deploying its preferred main payload, ScoringMathTea, and using similar methods to trojanize open-source applications,” Kálnai said. 

Threat researchers at several companies have been tracking the Operation DreamJob campaign since 2020. Google warned in 2022 that 250 people working for 10 different news media, domain registrars, web hosting providers and software vendors were targeted by the campaign, receiving malicious emails from fake recruiters claiming to be from Disney, Google and Oracle. 

The emails contained spoofed links to legitimate job sites like Indeed and ZipRecruiter. 

The Lazarus Group is North Korea’s flagship hacking operation and has been accused of stealing billions in cryptocurrency from blockchain platforms while also facilitating the country’s longstanding IT worker scheme which has siphoned millions from U.S. companies.  

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Trump pardons former Binance CEO after guilty plea in letting cybercrime proceeds flow through platform

Next Post

Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack

Related Posts

CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Broadcom VMware Tools and VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog, following reports of active exploitation in the wild. The vulnerability in question is CVE-2025-41244 (CVSS score: 7.8), which could be exploited by an attacker to attain
Read More

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

The supply chain campaign known as GlassWorm has once again reared its head, infiltrating both Microsoft Visual Studio Marketplace and Open VSX with 24 extensions impersonating popular developer tools and frameworks like Flutter, React, Tailwind, Vim, and Vue. GlassWorm was first documented in October 2025, detailing its use of the Solana blockchain for command-and-control (C2) and harvest npm,
Read More

Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain

Cybersecurity researchers have uncovered a malicious Chrome extension that poses as a legitimate Ethereum wallet but harbors functionality to exfiltrate users' seed phrases. The name of the extension is "Safery: Ethereum Wallet," with the threat actor describing it as a "secure wallet for managing Ethereum cryptocurrency with flexible settings." It was uploaded to the Chrome Web Store on
Read More