Oct 23, 2025 • ESET WeLiveSecurity
Gotta fly: Lazarus targets the UAV sector
ESET research has identified a new iteration of the Operation DreamJob cyberespionage campaign attributed to the Lazarus Group, a North Korea-aligned Advanced...
Executive Summary
ESET research has identified a new iteration of the Operation DreamJob cyberespionage campaign attributed to the Lazarus Group, a North Korea-aligned Advanced Persistent Threat (APT) actor. This campaign specifically targets the Unmanned Aerial Vehicle (UAV) sector, indicating a strategic interest in aerospace and defense technologies. The activity underscores the persistent threat posed by state-sponsored actors seeking intellectual property and sensitive technical data within critical infrastructure industries. While specific malware families were not detailed in this summary, the association with Lazarus suggests sophisticated tooling and social engineering techniques typically employed in job-themed lures. Organizations within the UAV and broader aerospace sectors should enhance monitoring for suspicious recruitment-related communications and enforce strict access controls. Immediate mitigation involves updating threat intelligence feeds to include Operation DreamJob indicators and conducting employee awareness training regarding spear-phishing attempts masquerading as employment opportunities to prevent initial compromise and data exfiltration.
Summary
ESET research analyzes a recent instance of the Operation DreamJob cyberespionage campaign conducted by Lazarus, a North Korea-aligned APT group
Published Analysis
ESET research has identified a new iteration of the Operation DreamJob cyberespionage campaign attributed to the Lazarus Group, a North Korea-aligned Advanced Persistent Threat (APT) actor. This campaign specifically targets the Unmanned Aerial Vehicle (UAV) sector, indicating a strategic interest in aerospace and defense technologies. The activity underscores the persistent threat posed by state-sponsored actors seeking intellectual property and sensitive technical data within critical infrastructure industries. While specific malware families were not detailed in this summary, the association with Lazarus suggests sophisticated tooling and social engineering techniques typically employed in job-themed lures. Organizations within the UAV and broader aerospace sectors should enhance monitoring for suspicious recruitment-related communications and enforce strict access controls. Immediate mitigation involves updating threat intelligence feeds to include Operation DreamJob indicators and conducting employee awareness training regarding spear-phishing attempts masquerading as employment opportunities to prevent initial compromise and data exfiltration. ESET research analyzes a recent instance of the Operation DreamJob cyberespionage campaign conducted by Lazarus, a North Korea-aligned APT group ESET research analyzes a recent instance of the Operation DreamJob cyberespionage campaign conducted by Lazarus, a North Korea-aligned APT group
Linked Entities
- Lazarus Group