| Alias Description | Votes |
|---|---|
| DreamJob is a possible alias for Operation Dreamjob. "DreamJob" is a highly sophisticated and lucrative campaign led by the infamous Lazarus Group, a North Korea-aligned cybercriminal entity. The operation, first identified in a blog post by ClearSky in August 2020, targets defense and aerospace companies with an objective of cyberespionage. The group | 4 |
| Lazarus Group is a possible alias for Operation Dreamjob. The Lazarus Group, a notorious threat actor attributed to North Korea, is renowned for its malicious activities aimed at furthering the country's objectives. This group has been implicated in several high-profile cyber-attacks, including an attack in Spain known as Operation DreamJob. The exploitati | 3 |
| Alias Description | Association Type | Votes |
|---|---|---|
| The Lightlesscan Malware is associated with Operation Dreamjob. LightlessCan is a new and advanced malware, discovered by ESET, that has been added to North Korea's Lazarus group's arsenal. The malware is a successor to the group's flagship HTTP(S) Lazarus Remote Access Trojan (RAT) named BlindingCan. LightlessCan represents a significant advancement in maliciou | Unspecified | 2 |
| Preview | Source Link | CreatedAt | Title |
|---|---|---|---|
| ESET | 18 days ago | ||
| ESET | 18 days ago | ||
| Securityaffairs | a month ago | ||
| Securityaffairs | a month ago | ||
| InfoSecurity-magazine | a month ago | ||
| ESET | 9 months ago | ||
| CERT-EU | 2 years ago | ||
| CERT-EU | 2 years ago | ||
| DARKReading | 3 years ago | ||
| Securityaffairs | 3 years ago | ||
| ESET | 3 years ago | ||
| InfoSecurity-magazine | 3 years ago | ||
| CERT-EU | 3 years ago | ||
| CERT-EU | 3 years ago | ||
| CERT-EU | 3 years ago | ||
| CERT-EU | 2 years ago | ||
| Securityaffairs | 2 years ago | ||
| CERT-EU | 2 years ago | ||
| CERT-EU | 2 years ago |