April 20, 2023, 9:23 p.m. | Pierluigi Paganini

Security Affairs securityaffairs.co

North Korea-linked APT group Lazarus employed new Linux malware in attacks that are part of Operation Dream Job. North Korea-linked APT group Lazarus is behind a new campaign tracked as Operation DreamJob (aka DeathNote or NukeSped) that employed Linux malware. The threat actors were observed using social engineering techniques to compromise its targets, with fake job offers […]


The post Lazarus APT group employed Linux Malware in recent attacks and was linked to 3CX supply chain attack appeared first on …

3cx apt attack attacks breaking news campaign compromise cyber warfare deathnote dream engineering fake fake job hacking information security news it information security job job offers korea lazarus lazarus apt linux linux malware malware north north korea operation dream job pierluigi paganini security social social engineering supply supply chain supply chain attack techniques threat threat actors

More from securityaffairs.co / Security Affairs

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Associate Principal Security Engineer

@ Activision Blizzard | Work from Home - CA

Security Engineer- Systems Integration

@ Meta | Bellevue, WA | Menlo Park, CA | New York City

Lead Security Engineer (Digital Forensic and IR Analyst)

@ Blue Yonder | Hyderabad

Senior Principal IAM Engineering Program Manager Cybersecurity

@ Providence | Redmond, WA, United States

Information Security Analyst II or III

@ Entergy | The Woodlands, Texas, United States