Hackers posing as LinkedIn recruiters to scam military, aerospace firms

Hackers posing as LinkedIn recruiters to scam military, aerospace firms

The prime target of this campaign is officials from military and aerospace organizations.


A new, highly sophisticated espionage campaign targeting military and aerospace organizations across Europe and the Middle East has been discovered by cybersecurity firm ESET’s researchers. The campaigners attempt to lure company employees to extract money and/or sensitive documents.


Dubbed Operation In(ter)caption; the campaign was active from September to December 2019, and espionage is declared the primary objective behind this campaign.



How the attack works (Image: ESET)



However, it was observed in at least one of the incidents that the attackers tried to access the email account of the victim using a business email compromise (BEC) attack in the final stages of Operation In(ter)caption.


See: LinkedIn Phishing Scam Steals Gmail Credentials Through Google Docs


The financial motivation of attackers and the way this campaign has been designed forced ESET researchers to believe that the notorious hacking group from North Korea know as Lazarus is involved. For instance, some of the malicious tools used by the hackers in this campaign are the same that Lazarus hackers had used in the past, for example, the NukeSped backdoor.

Moreover, researchers suspect that the Lazarus Group is backed by the No ..

Support the originator by clicking the read the rest link below.