According to a report from South Korean security firm AhnLab, state-linked hacking organizations like the North Korea-backed Lazarus Group relied heavily on spear phishing to steal funds and gather intelligence over the last 12 months. The group often posed as conference organizers, job contacts or colleagues to trick people into opening files or running commands. […]According to a report from South Korean security firm AhnLab, state-linked hacking organizations like the North Korea-backed Lazarus Group relied heavily on spear phishing to steal funds and gather intelligence over the last 12 months. The group often posed as conference organizers, job contacts or colleagues to trick people into opening files or running commands. […]

Lazarus Group Tops Global Hack Mentions As Spear Phishing Attacks Surge

2025/12/01 20:00
3 min read
For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

According to a report from South Korean security firm AhnLab, state-linked hacking organizations like the North Korea-backed Lazarus Group relied heavily on spear phishing to steal funds and gather intelligence over the last 12 months. The group often posed as conference organizers, job contacts or colleagues to trick people into opening files or running commands.

Lazarus Group: Spear Phishing Turns More Realistic With AI Lures

Reports have disclosed that one unit known as Kimsuky used artificial intelligence to forge military ID images and lodge them inside a ZIP file to make messages look legitimate.

Security researchers say the fake IDs were convincing enough that recipients opened the attachments, which then ran hidden code. The incident has been traced to mid-July 2025 and appears to mark a step up in how attackers craft their lures.

The aim is simple. Get a user to trust a message, open a file, and the attacker gets a way in. That access can lead to stolen credentials, seeded malware or drained crypto wallets. The groups linked to Pyongyang have been tied to attacks on finance and defense targets, among others.

Lazarus Group Victims Asked To Execute Commands

Some campaigns did not rely only on hidden exploits. In several cases, targets were tricked into typing PowerShell commands themselves, sometimes while believing they were following official instructions.

That step lets attackers run scripts with high privileges without needing a zero-day. Security outlets have warned that this social trick is spreading and can be hard to spot.

Lazarus Group: Old File Types, New Tricks

Attackers also abused Windows shortcut files and similar formats to hide commands that run silently when a file is opened. Researchers have documented nearly 1,000 malicious .lnk samples tied to broader campaigns, showing that familiar file types remain a favorite delivery method. Those shortcuts can execute hidden arguments and pull down further payloads.

Why This Matters Now

This makes the attacks harder to stop: tailored messages, AI-forged visuals, and tricks that ask users to run code. Multi-factor authentication and software patches help, but training people to treat unusual requests with suspicion remains key. Security teams advocate basic safety nets: update, verify, and when in doubt, check with a known contact.

According to reports, Lazarus Group and Kimsuky continue to be active. Lazarus, based on AhnLab’s findings, received the most mentions in post-cybercrime analyses over the last 12 months. The group has been singled out for financially motivated hacks, while Kimsuky seems more focused on intelligence gathering and tailored deception.

Featured image from Anadolu, chart from TradingView

Market Opportunity
SURGE Logo
SURGE Price(SURGE)
$0.01856
$0.01856$0.01856
-2.52%
USD
SURGE (SURGE) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

DeFi Platform Operating on BNB Chain Attacked by Hackers! How Much Lost? Here Are the Details

DeFi Platform Operating on BNB Chain Attacked by Hackers! How Much Lost? Here Are the Details

The post DeFi Platform Operating on BNB Chain Attacked by Hackers! How Much Lost? Here Are the Details appeared on BitcoinEthereumNews.com. New Gold Protocol (NGP), a decentralized finance (DeFi) platform operating on BNB Chain, was hit with a $2 million attack on Wednesday. The attack targeted the protocol’s liquidity pool, resulting in significant losses. NGP Protocol on BNB Chain Loses $2 Million Web3 security firm Blockaid explained that the attack was based on price oracle manipulation. The attacker targeted the getPrice function in the NGP smart contract. This function calculates the token price by directly referencing Uniswap V2 pool reserves. However, according to Blockaid, “the instant price from a single DEX pool is not secure because attackers can easily manipulate reserves with a flash loan.” The attacker executed a large swap using a flash loan for a large amount of tokens. This increased the pool’s USDT reserves, decreased the NGP reserves, and caused the price oracle to report an artificially low value. This manipulation allowed the contract’s transaction limit to be exceeded, allowing the attacker to acquire a large amount of NGP tokens at a low price. On-chain security firm PeckShield reported that the stolen funds were transferred through Tornado Cash. The NGP token price also plummeted by 88% following the attack. This incident is the latest in a series of attacks targeting DeFi protocols. Last week, the Sui-based Nemo Protocol suffered a similar $2.6 million loss. According to Chainalysis data, more than $2 billion was stolen from crypto services in the first half of 2025 alone. This figure is higher than the same period in previous years, indicating increasing security risks in the sector. *This is not investment advice. Follow our Telegram and Twitter account now for exclusive news, analytics and on-chain data! Source: https://en.bitcoinsistemi.com/defi-platform-operating-on-bnb-chain-attacked-by-hackers-how-much-lost-here-are-the-details/
Share
BitcoinEthereumNews2025/09/19 01:36
Solana Price Prediction Stuck at $85 While Pepeto Presale Delivers What Solana Holders Have Been Waiting For

Solana Price Prediction Stuck at $85 While Pepeto Presale Delivers What Solana Holders Have Been Waiting For

The solana price prediction for March 2026 hinges on whether the $80 support holds or breaks, and the data suggests that solana is compressing into the tightest
Share
Techbullion2026/03/08 10:39
Apple (AAPL) Stock Gets $350 Price Target From Wedbush While One Pre-IPO Asset Targets 267x Returns

Apple (AAPL) Stock Gets $350 Price Target From Wedbush While One Pre-IPO Asset Targets 267x Returns

Key Takeaways: In this article, we highlight essential information about Apple (AAPL) Stock. – Wedbush raised Apple (AAPL) stock to a Street high $350 target with
Share
Techbullion2026/03/08 10:03