North Korean Hackers Exploit Fake Job Offers to Infiltrate European Defense Firms

In a sophisticated cyber espionage campaign, North Korean state-sponsored hackers have been targeting European defense companies, particularly those involved in unmanned aerial vehicle (UAV) technology. This operation, known as Operation Dream Job, aims to steal proprietary information and manufacturing techniques to bolster North Korea’s military capabilities.

The Modus Operandi of Operation Dream Job

The attackers employ social engineering tactics by posing as recruiters offering lucrative job opportunities. They approach employees of targeted companies, enticing them with fake job offers that require the download of malicious documents or software. Once the victim downloads and opens these files, malware is installed on their systems, granting the hackers unauthorized access.

Targeted Entities and Malware Deployment

Recent observations indicate that the campaign has been active since late March 2025, focusing on several European companies:

– A metal engineering firm in Southeastern Europe
– An aircraft component manufacturer in Central Europe
– A defense company in Central Europe

The primary malware tools used in these attacks are ScoringMathTea and MISTPEN. ScoringMathTea, also known as ForestTiger, is a remote access trojan (RAT) that allows attackers to execute approximately 40 commands, enabling full control over compromised systems. MISTPEN, documented by Google Mandiant in September 2024, functions as a sophisticated downloader that uses Microsoft Graph API and tokens to fetch additional payloads.

Historical Context and Consistency in Tactics

Operation Dream Job was first exposed by Israeli cybersecurity firm ClearSky in 2020. The campaign is attributed to the Lazarus Group, a North Korean hacking organization active since at least 2009. Over the years, the group has maintained a consistent approach, deploying similar malware and using trojanized open-source applications to achieve their objectives.

Implications and Recommendations

The persistent nature of these attacks underscores the importance of vigilance within the defense sector. Organizations should implement robust cybersecurity measures, including:

– Conducting regular security awareness training for employees
– Implementing advanced threat detection systems
– Establishing strict protocols for handling unsolicited job offers and external communications

By adopting these practices, companies can better protect themselves against sophisticated cyber threats and safeguard sensitive information critical to national security.