Wednesday, December 10, 2025


North Korean state-backed hackers, the Lazarus Group, primarily employed spear phishing assaults to steal funds over the past yr, with the group receiving essentially the most mentions in post-hack analyses over the past 12 months, in response to South Korean cybersecurity firm AhnLab.

Spear phishing is likely one of the hottest strategies of assault by dangerous actors like Lazarus, utilizing faux emails, “disguised as lecture invites or interview requests,” AhnLab analysts mentioned within the Nov. 26, 2025, Cyber ​​Risk Tendencies & 2026 Safety Outlook report.

Spear phishing assaults are a extra refined model of phishing that usually requires analysis and planning from the attacker. Supply: Kaspersky 

The Lazarus Group is the principle suspect behind many assaults throughout many sectors, together with crypto, with the hackers suspected to be answerable for the $1.4 billion Bybit hack on Feb. 21 and the more moderen $30 million exploit of the South Korean crypto alternate Upbit on Thursday. 

The way to shield your self from spear phishing

Spear phishing assaults are a focused type of phishing the place hackers analysis their meant goal to assemble info and masquerade as a trusted sender, thereby stealing a sufferer’s credentials, putting in malware, or having access to delicate methods.

Cybersecurity agency Kaspersky recommends the next strategies to guard in opposition to spear phishing: utilizing a VPN to encrypt all on-line exercise, avoiding the sharing of extreme private particulars on-line, verifying the supply of an electronic mail or communication by way of an alternate channel, and, the place potential, enabling multifactor or biometric authentication.

‘Multi-layered protection’ wanted to fight dangerous actors

The Lazarus Group has focused the crypto area, finance, IT and protection, in response to AhnLab, and was additionally essentially the most continuously talked about group in after-hack evaluation between October 2024 and September 2025 this yr, with 31 disclosures.

Fellow North Korean-linked hacker outfit Kimsuky was subsequent with 27 disclosures, adopted by TA-RedAnt with 17.

AhnLab mentioned a “multi-layered protection system is crucial” for firms hoping to curb assaults, comparable to common safety audits, protecting software program updated with the newest patches and schooling for workers members on numerous assault vectors.

Associated: CZ’s Google account focused by ‘government-backed’ hackers

In the meantime, the cybersecurity firm recommends people undertake multifactor authentication, maintain all safety software program updated, keep away from operating unverified URLs and attachments, and solely obtain content material from verified official channels.

AI will make dangerous actors more practical

Going into 2026, AhnLab warned that new applied sciences, comparable to synthetic intelligence, will solely make dangerous actors extra environment friendly and their assaults extra refined.