ID | Votes | Profile Description |
---|---|---|
Operation Dreamjob | 3 | Operation DreamJob is a campaign attributed to the Lazarus group, a North Korea-aligned group infamous for its cyberespionage and financial theft activities. The campaign was first coined in a blog post by ClearSky in August 2020, where it described Lazarus' attempts to target defense and aerospace |
ID | Type | Votes | Profile Description |
---|---|---|---|
Lazarus Group | Unspecified | 3 | The Lazarus Group, also known as APT38, is a notorious threat actor believed to be backed by the North Korean regime. This group has been associated with several high-profile cyber attacks and thefts, including the infamous $600 million Ronin sidechain exploit in 2022. Known for their sophisticated |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
CERT-EU | a year ago | Operation DreamJob - New Linux Malware Linked With 3CX Supply-Chain Attack | |
CERT-EU | a year ago | Lazarus hackers breach aerospace firm with new LightlessCan malware | |
CERT-EU | a year ago | Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company | |
ESET | a year ago | Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack | WeLiveSecurity | |
InfoSecurity-magazine | a year ago | Lazarus Group's DeathNote Campaign Reveals Shift in Targets | |
Securityaffairs | a year ago | Lazarus APT group employed Linux Malware in recent attacks | |
CERT-EU | a year ago | Lazarus APT group employed Linux Malware in recent attacks and was linked to 3CX supply chain attack | IT Security News | |
CERT-EU | a year ago | Lazarus Hackers' Linux Malware Linked to 3CX Supply-Chain Attack | |
DARKReading | a year ago | 3CX Supply Chain Attack Tied to Financial Trading App Breach | |
CERT-EU | a year ago | Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack? |