"The attacks, which culminated in the deployment of a new modular backdoor referred to as CookiePlus, are part of a long-running cyber espionage campaign known as Operation Dream Job, which is also tracked as #NukeSped by cybersecurity company Kaspersky. It's known to be active since at least 2020, when it was exposed by ClearSky."
https://thehackernews.com/2024/12/lazarus-group-spotted-targeting-nuclear.html?_m=3n.009a.3544.lx0ao0a6qu.2k8m&m=1
Lazarus Group Spotted Targeting Nuclear Engineers with CookiePlus Malware

Lazarus Group's CookiePlus malware targets nuclear engineers, showcasing DPRK's evolving arsenal and $1.34B in 2024 crypto thefts.

The Hacker News
"Circumstances of the Andariel Group Exploiting an Apache ActiveMQ Vulnerability (CVE-2023-46604)" published by Ahnlab. #NukeSped, #CVE-2023-46604, #Andariel, #CTI, #OSINT, #LAZARUS https://asec.ahnlab.com/en/59318/
Circumstances of the Andariel Group Exploiting an Apache ActiveMQ Vulnerability (CVE-2023-46604) - ASEC BLOG

AhnLab Security Emergency response Center

ASEC BLOG
"Circumstances of an Attack Exploiting an Asset Management Program (Andariel Group)" published by Ahnlab. #Andariel, #NukeSped, #LilithRAT, #BlackRAT, #TigerRAT, #CTI, #OSINT, #LAZARUS https://asec.ahnlab.com/en/59073/
Circumstances of an Attack Exploiting an Asset Management Program (Andariel Group) - ASEC BLOG

AhnLab Security Emergency response Center

ASEC BLOG
"자산 관리 프로그램을 악용한 공격 정황 포착 (Andariel 그룹)" published by Ahnlab. #Andariel, #NukeSped, #LilithRAT, #BlackRAT, #TigerRAT, #CTI, #OSINT, #LAZARUS https://asec.ahnlab.com/ko/58215/
자산 관리 프로그램을 악용한 공격 정황 포착 (Andariel 그룹) - ASEC BLOG

AhnLab Security Emergency response Center

ASEC BLOG
"Analysis of Andariel's New Attack Activities" published by Ahnlab. #NukeSped, #Andariel, #AndarLoader, #Andardoor, #CTI, #OSINT, #LAZARUS https://asec.ahnlab.com/en/56405/
Analysis of Andariel's New Attack Activities - ASEC BLOG

AhnLab Security Emergency response Center

ASEC BLOG
"Andariel 그룹의 새로운 공격 활동 분석" published by Ahnlab. #Andariel, #NukeSped, #AndarLoader, #Andardoor, #CTI, #OSINT, #LAZARUS https://asec.ahnlab.com/ko/56256/
Andariel 그룹의 새로운 공격 활동 분석 - ASEC BLOG

AhnLab Security Emergency response Center

ASEC BLOG
Mac users targetted by Lazarus ‘fileless’ Trojan - The Lazarus hacking group are trying to sneak a ‘fileless’ Trojan on to Apple computers, disguised... more: https://nakedsecurity.sophos.com/2019/12/06/mac-users-targetted-by-lazarus-fileless-trojan/ #filelessmalware #cryptocurrency #lazarusgroup #nukesped #malware #apple #macos
Mac users targetted by Lazarus ‘fileless’ Trojan

Naked Security