"The attacks, which culminated in the deployment of a new modular backdoor referred to as CookiePlus, are part of a long-running cyber espionage campaign known as Operation Dream Job, which is also tracked as #NukeSped by cybersecurity company Kaspersky. It's known to be active since at least 2020, when it was exposed by ClearSky."
https://thehackernews.com/2024/12/lazarus-group-spotted-targeting-nuclear.html?_m=3n.009a.3544.lx0ao0a6qu.2k8m&m=1
https://thehackernews.com/2024/12/lazarus-group-spotted-targeting-nuclear.html?_m=3n.009a.3544.lx0ao0a6qu.2k8m&m=1