Lazarus Group Targets Nuclear Sector with Malware
/ 1 min read
🧬 Lazarus Group Expands Cyber Attacks to Nuclear Industry. The Lazarus Group, linked to North Korea, has shifted its focus to the nuclear sector, employing sophisticated tactics such as fake job postings to deliver malware. Their recent campaign, dubbed “Operation DreamJob,” involves enticing victims with job offers that contain malicious files disguised as assessments. The group utilizes advanced tools like the Ranid Downloader and a new plugin-based malware called “CookiePlus,” which operates in memory to evade detection. Additionally, they exploit vulnerabilities, including a Google Chrome zero-day, to enhance their attacks. This escalation highlights the urgent need for improved cybersecurity measures in sensitive industries, as the Lazarus Group continues to refine its methods and maintain a persistent threat.
