Lazarus Strikes Again: North Korean Hackers Target Nuclear Employees in Espionage Escapade
Lazarus APT targeted an unnamed nuclear-related organization’s employees in January 2024 as part of Operation Dream Job. Using a complex infection chain, the group deployed various malware strains to evade detection. Researchers believe that the introduction of new modular malware like CookiePlus indicates Lazarus is continually upgrading its cyber espionage toolkit.

Hot Take:
Looks like Lazarus APT is back at it again with their sneaky cyber shenanigans, this time targeting employees at a nuclear organization. What’s next, hacking into an asteroid mining operation? Maybe they should consider a new career in malware development, given their arsenal keeps evolving faster than the plot of a telenovela!
Key Points:
- Lazarus Group targeted employees at a nuclear-related organization in January 2024.
- The attack involved an intricate infection chain using various malware types.
- CookieTime malware played a key role, masquerading as a legitimate service.
- Lazarus used compromised WordPress servers for command and control operations.
- The group continues to enhance their malware arsenal, introducing CookiePlus.
Already a member? Log in here