Operation Dream Job was a cyber espionage operation likely conducted by Lazarus Group that targeted the defense, aerospace, government, and other sectors in the United States, Israel, Australia, Russia, and India. In at least one case, the cyber actors tried to monetize their network access to conduct a business email compromise (BEC) operation. In 2020, security researchers noted overlapping TTPs, to include fake job lures and code similarities, between Operation Dream Job, Operation North Star, and Operation Interception; by 2022 security researchers described Operation Dream Job as an umbrella term covering both Operation Interception and Operation North Star.[1][2][3][4]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
During Operation Dream Job, Lazarus Group used WMIC to executed a remote XSL script.[3] |
|
| Enterprise | T1220 | XSL脚本处理 |
During Operation Dream Job, Lazarus Group used a remote XSL script to download a Base64-encoded DLL custom downloader.[3] |
|
| Enterprise | T1005 | 从本地系统获取数据 |
During Operation Dream Job, Lazarus Group used malicious Trojans and DLL files to exfiltrate data from an infected host.[1][2] |
|
| Enterprise | T1036 | .008 | 伪装: Masquerade File Type |
During Operation Dream Job, Lazarus Group disguised malicious template files as JPEG files to avoid detection.[2][3] |
| Enterprise | T1656 | 伪装 |
During Operation Dream Job, Lazarus Group impersonated HR hiring personnel through LinkedIn messages and conducted interviews with victims in order to deceive them into downloading malware.[1][3][4] |
|
| Enterprise | T1534 | 内部鱼叉式钓鱼 |
During Operation Dream Job, Lazarus Group conducted internal spearphishing from within a compromised organization.[1] |
|
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
During Operation Dream Job, Lazarus Group used an AES key to communicate with their C2 server.[2] |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
During Operation Dream Job, Lazarus Group placed LNK files into the victims' startup folder for persistence.[2] |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
During Operation Dream Job, Lazarus Group used PowerShell commands to explore the environment of compromised victims.[3] |
| .003 | 命令与脚本解释器: Windows Command Shell |
During Operation Dream Job, Lazarus Group launched malicious DLL files, created new folders, and renamed folders with the use of the Windows command shell.[3][2] |
||
| .005 | 命令与脚本解释器: Visual Basic |
During Operation Dream Job, Lazarus Group executed a VBA written malicious macro after victims download malicious DOTM files; Lazarus Group also used Visual Basic macro code to extract a double Base64 encoded DLL implant.[1][2] |
||
| Enterprise | T1584 | .001 | 基础设施妥协: Domains |
For Operation Dream Job, Lazarus Group compromised domains in Italy and other countries for their C2 infrastructure.[2][5] |
| .004 | 基础设施妥协: Server |
For Operation Dream Job, Lazarus Group compromised servers to host their malicious tools.[1][3][2] |
||
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
During Operation Dream Job, Lazarus Group uses HTTP and HTTPS to contact actor-controlled C2 servers.[2] |
| Enterprise | T1585 | .001 | 建立账户: Social Media Accounts |
For Operation Dream Job, Lazarus Group created fake LinkedIn accounts for their targeting efforts.[1][3] |
| .002 | 建立账户: Email Accounts |
During Operation Dream Job, Lazarus Group created fake email accounts to correspond with fake LinkedIn personas; Lazarus Group also established email accounts to match those of the victim as part of their BEC attempt.[3] |
||
| Enterprise | T1587 | .001 | 开发能力: Malware |
For Operation Dream Job, Lazarus Group developed custom tools such as Sumarta, DBLL Dropper, Torisma, and DRATzarus for their operations.[1][3][2][5] |
| .002 | 开发能力: Code Signing Certificates |
During Operation Dream Job, Lazarus Group digitally signed their malware and the dbxcli utility.[3] |
||
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
During Operation Dream Job, Lazarus Group archived victim's data into a RAR file.[3] |
| Enterprise | T1593 | .001 | 搜索开放网站/域: Social Media |
For Operation Dream Job, Lazarus Group used LinkedIn to identify and target employees within a chosen organization.[3] |
| Enterprise | T1591 | 收集受害者组织信息 |
For Operation Dream Job, Lazarus Group gathered victim organization information to identify specific targets.[1] |
|
| .004 | Identify Roles |
During Operation Dream Job, Lazarus Group targeted specific individuals within an organization with tailored job vacancy announcements.[1][3] |
||
| Enterprise | T1589 | 收集受害者身份信息 |
For Operation Dream Job, Lazarus Group conducted extensive reconnaissance research on potential targets.[1] |
|
| Enterprise | T1083 | 文件和目录发现 |
During Operation Dream Job, Lazarus Group conducted word searches within documents on a compromised host in search of security and financial matters.[1] |
|
| Enterprise | T1608 | .001 | 暂存能力: Upload Malware |
For Operation Dream Job, Lazarus Group used compromised servers to host malware.[1][3][2][5] |
| .002 | 暂存能力: Upload Tool |
For Operation Dream Job, Lazarus Group used multiple servers to host malicious tools.[3] |
||
| Enterprise | T1110 | 暴力破解 |
During Operation Dream Job, Lazarus Group performed brute force attacks against administrator accounts.[3] |
|
| Enterprise | T1505 | .004 | 服务器软件组件: IIS Components |
During Operation Dream Job, Lazarus Group targeted Windows servers running Internet Information Systems (IIS) to install C2 components.[2] |
| Enterprise | T1106 | 本机API |
During Operation Dream Job, Lazarus Group used Windows API |
|
| Enterprise | T1221 | 模板注入 |
During Operation Dream Job, Lazarus Group used DOCX files to retrieve a malicious document template/DOTM file.[1][2] |
|
| Enterprise | T1027 | .002 | 混淆文件或信息: Software Packing |
During Operation Dream Job, Lazarus Group packed malicious .db files with Themida to evade detection.[1][2][5] |
| .013 | 混淆文件或信息: Encrypted/Encoded File |
During Operation Dream Job, Lazarus Group encrypted malware such as DRATzarus with XOR and DLL files with base64.[1][3][2][5] |
||
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
During Operation Dream Job, Lazarus Group lured users into executing a malicious link to disclose private account information or provide initial access.[1][3] |
| .002 | 用户执行: Malicious File |
During Operation Dream Job, Lazarus Group lured victims into executing malicious documents that contained "dream job" descriptions from defense, aerospace, and other sectors.[1][2] |
||
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
During Operation Dream Job, Lazarus Group removed all previously delivered files from a compromised computer.[3] |
| Enterprise | T1218 | .010 | 系统二进制代理执行: Regsvr32 |
During Operation Dream Job, Lazarus Group used |
| .011 | 系统二进制代理执行: Rundll32 |
During Operation Dream Job, Lazarus Group executed malware with |
||
| Enterprise | T1614 | .001 | 系统位置发现: System Language Discovery |
During Operation Dream Job, Lazarus Group deployed malware designed not to run on computers set to Korean, Japanese, or Chinese in Windows language preferences.[1] |
| Enterprise | T1583 | .001 | 获取基础设施: Domains |
During Operation Dream Job, Lazarus Group registered a domain name identical to that of a compromised company as part of their BEC effort.[3] |
| .004 | 获取基础设施: Server |
During Operation Dream Job, Lazarus Group acquired servers to host their malicious tools.[3] |
||
| .006 | 获取基础设施: Web Services |
During Operation Dream Job, Lazarus Group used file hosting services like DropBox and OneDrive.[1] |
||
| Enterprise | T1588 | .002 | 获取能力: Tool |
For Operation Dream Job, Lazarus Group obtained tools such as Wake-On-Lan, Responder, ChromePass, and dbxcli.[1][3] |
| .003 | 获取能力: Code Signing Certificates |
During Operation Dream Job, Lazarus Group used code signing certificates issued by Sectigo RSA for some of its malware and tools.[3] |
||
| Enterprise | T1497 | .001 | 虚拟化/沙盒规避: System Checks |
During Operation Dream Job, Lazarus Group used tools that conducted a variety of system checks to detect sandboxes or VMware services.[1] |
| .003 | 虚拟化/沙盒规避: Time Based Evasion |
During Operation Dream Job, Lazarus Group used tools that collected |
||
| Enterprise | T1622 | 调试器规避 |
During Operation Dream Job, Lazarus Group used tools that used the |
|
| Enterprise | T1087 | .002 | 账号发现: Domain Account |
During Operation Dream Job, Lazarus Group queried compromised victim's active directory servers to obtain the list of employees including administrator accounts.[3] |
| Enterprise | T1105 | 输入工具传输 |
During Operation Dream Job, Lazarus Group downloaded multistage malware and tools onto a compromised host.[1][3][2] |
|
| Enterprise | T1041 | 通过C2信道渗出 |
During Operation Dream Job, Lazarus Group exfiltrated data from a compromised host to actor-controlled C2 servers.[1] |
|
| Enterprise | T1567 | .002 | 通过网络服务渗出: Exfiltration to Cloud Storage |
During Operation Dream Job, Lazarus Group used a custom build of open-source command-line dbxcli to exfiltrate stolen data to Dropbox.[3][1] |
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
During Operation Dream Job, Lazarus Group sent emails with malicious attachments to gain unauthorized access to targets' computers.[1][2] |
| .002 | 钓鱼: Spearphishing Link |
During Operation Dream Job, Lazarus Group sent malicious OneDrive links with fictitious job offer advertisements via email.[1][3] |
||
| .003 | 钓鱼: Spearphishing via Service |
During Operation Dream Job, Lazarus Group sent victims spearphishing messages via LinkedIn concerning fictitious jobs.[1][3] |
||
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
During Operation Dream Job, Lazarus Group created scheduled tasks to set a periodic execution of a remote XSL script.[3] |
| Enterprise | T1553 | .002 | 颠覆信任控制: Code Signing |
During Operation Dream Job, Lazarus Group digitally signed their own malware to evade detection.[3] |
| ID | Name | Description |
|---|---|---|
| S0694 | DRATzarus |
During Operation Dream Job, Lazarus Group used DRATzarus to deploy open source software and partly commodity software such as Responder, Wake-On-Lan, and ChromePass to target infected hosts.[1] |
| S0174 | Responder | |
| S0678 | Torisma |
During Operation Dream Job, Lazarus Group used Torisma to actively monitor for new drives and remote desktop connections on an infected system.[2][5] |