الرئيس التنفيذي
أشرف الحادي

رئيس التحرير
فاطمة مهران

Kaspersky discovers Lazarus APT targets nuclear organizations with new CookiePlus malware

Lazarus’ key operation – “Operation DreamJob” – continues to evolve with new sophisticated tactics that have persisted for more than five years, according to Kaspersky’s Global Research and Analysis Team (GReAT). The latest targets include employees from a nuclear-related organization, who were infected via three compromised archive files appearing to be skill assessment tests for IT professionals. This ongoing campaign leverages a range of advanced malware, including a newly discovered modular backdoor, CookiePlus, that was disguised as open-source plugin.
Kaspersky’s GReAT discovered a new campaign linked to the infamous Operation DreamJob, also known as DeathNote, a cluster associated with the notorious Lazarus group. Over the years, this campaign has evolved significantly, initially emerging in 2019, with attacks targeting worldwide cryptocurrency-related businesses. During 2024, it has expanded to target IT and defense companies across Europe, Latin America, South Korea, and Africa. Kaspersky’s latest report provides new insights into a recent phase of their activity, revealing campaign targeting employees working at the same nuclear-related organization in Brazil as well employees of an unidentified sector in Vietnam.
Over the span of one month, at least two employees from the same organization were targeted by Lazarus, receiving multiple archive files disguised as skill assessments for IT positions at prominent aerospace and defense companies. Lazarus initially delivered the first archive to Hosts A and B within the same organization, and after a month, attempted more aggressive attacks on the first target. They likely used job search platforms like LinkedIn to deliver the initial instructions and gain access to the targets.
Lazarus has evolved its delivery methods and improved persistence through a complex infection chain involving various types of malware, such as a downloader, loader, and backdoor. They launched a multi-stage attack using trojanized VNC software, a remote desktop viewer for Windows, and another legitimate VNC tool to deliver malware. The first stage involved a trojanized AmazonVNC.exe, which decrypted and executed a downloader called Ranid Downloader to extract internal resources of the VNC executable. A second archive contained a malicious vnclang.dll that loaded MISTPEN malware, which then fetched additional payloads, including RollMid and a new variant of LPEClient.

Route of malicious files created on victims host
Additionally, they deployed an unseen plugin-based backdoor which GReAT experts dubbed CookiePlus. It was disguised as ComparePlus, an open-source Notepad++ plugin. Once established, the malware collects system data, including the computer name, process ID, and file paths, and makes its main module “sleep” for a set amount of time. It also adjusts its execution schedule by modifying a configuration file.
“There are substantial risks including data theft, as Operation DreamJob gathers sensitive system information that could be used for identity theft or espionage. The malware’s ability to delay its actions allows it to evade detection at the moment of penetration and persist longer on the system. By setting specific execution times, it can operate at intervals that might avoid being noticed. Additionally, the malware could manipulate system processes, making it harder to detect and potentially leading to further harm or exploitation of the system,” comments Sojun Ryu, security expert at Kaspersky’s Global Research and Analysis Team.
Learn more about new Lazarus campaign at Securelist.com.

Related Posts:

“EFG Hermes Tops Extel 2025 with EMEA Conference”

Tashkeel Reopens Nad Al Sheba 1 Gallery with Of Liminal Threads by Ranim AlHalaky

Valu and MobileMasr Launch Egypt’s First Peer-to-Peer BNPL Service for Pre-OwnedSmartphones

Visa Offers Priority Ticket Pre-Sale for the TotalEnergies CAF AFCON, Morocco 2025 for Cardholders

Rasha Khalifa Al Mubarak Participates in Congress of Arabic and Creative Industries Alongside Hend Sabry, Mariam Naoum, and Nadine Labaki

Mastercard collaborates with HyperPay to transform the region’s business payments landscape

Talaat Mostafa Group collaborate

Governor of the Central Bank of Egypt Attends the 49th Annual Meeting of the Council of Arab Central Banks and Monetary Authorities’ Governors in Tunisia

آخر الأخبار
"ديفز هوت تشيكن" يفتتح أول فروعه في أبوظبي "إي إف چي هيرميس تتصدر تصنيف Extel 2025 في أوروبا الناشئة والشرق الأوسط وإفريقيا" "EFG Hermes Tops Extel 2025 with EMEA Conference" جارتنر: 50% من الإنفاق على أمن المعلومات سيكون لتقنيات الأمن السيبراني الاستباقية بحلول 2030 الشارقة السينمائي الدولي 12".. احتفاء بالإبداع والتجارب الإنسانية الكشف عن شواهد أثرية تؤكد وجود ميناء قديم مغمور بالمياه في منطقة معبد تابوزيريس ماجنا بالإسكندرية بشراكة إقليمية تمكين 250 ألف شاب وشابة خلال ثلاث سنوات في 9 دول   "التخصصي" يشارك في قمة C3 دافوس للرعاية الصحية في اليابان Tashkeel Reopens Nad Al Sheba 1 Gallery with Of Liminal Threads by Ranim AlHalaky مركز تشكيل يعيد افتتاح مبنى تشكيل في ند الشبا 1 بمعرض "نسيج من الارتحال" للفنانة المبدعة رنيم الحلقي وزير قطاع الأعمال يجتمع بمجلس إدارة "النصر للإسكان والتعمير" ويوجه بتسريع المشروعات مجموعة روشن تطلق مبيعات المرحلة الخامسة من مجتمع سدرة "مشروع لإدارة المياه المستدامة في مطروح بين يونيليفر مصر وبنك الطعام" بوبا العربية تعزز حضورها الرياضي برعاية نقل الدوري السعودي للمحترفين عبر "ثمانية" جولد بيليون: الذهب يواصل خسائره مع ارتفاع الدولار مجموعة موانئ أبوظبي تمنح عقداً لشركة باكو لأحواض السفن لبناء سفينتي حاويات ذاتَ غاطسٍ ضحل ملك إسبانيا يترأس لقاء خاص مع عدد من رجال الأعمال لتعزيز دور القطاع الخاص بحضور وزير الاستثمار والتج...  تقرير Sovereign يسلّط الضوء على العوامل الرئيسية وراء النمو الإقليمي اختتام ناجح لفعاليات ملتقى السياحة الطبية والعلاجية في دبي فينفاست تعلن عن شراكة استراتيجية مع الجمعية العربية للسيارات بهدف تعزيز خدمات ما بعد البيع