Lazarus Group’s Nuclear Ambitions: Fake Jobs & Stealthy Malware Unleashed!
The Lazarus Group, with ties to North Korea, has now set its sights on the nuclear industry, moving beyond defense and cryptocurrency. Their latest tactic? Fake job postings featuring malware, like CookiePlus, which is as sneaky as a cat burglar in a ninja costume. Cybersecurity just got a new nemesis!

Hot Take:
Looks like the Lazarus Group has gone from stealing digital coins to going full-on Bond villain by targeting nuclear industries. What’s next? Are they going to try and hack the Batcave? Someone needs to tell these guys that they should stick to their day job—if only we knew what that was!
Key Points:
- North Korea-linked Lazarus Group is now eyeing the nuclear industry, escalating from previous targets.
- Employing fake job postings, they deliver malware camouflaged as job assessments.
- Utilizing advanced tools like “CookiePlus,” a memory-based malware hard to detect.
- Exploiting Chrome zero-day vulnerabilities and introducing new malware like “RustyAttr.”
- Heightened cybersecurity measures are now more critical than ever for sensitive sectors.
Already a member? Log in here