An investigation by cybersecurity agency AhnLab reveals that the Lazarus Group, primarily based in North Korea, relied on spear-phishing all through the previous yr to steal digital belongings.
Lazarus Group is linked to main crypto-related thefts, together with the $1.4 billion Bybit
$2.84B
hack on February 21 and a latest $30 million breach at South Korea’s Upbit
$1.97B
on November 27.
The assaults employed emails crafted to look as lecture invitations or interview requests, a tactic AhnLab highlights in its November 26 report titled Cyber Risk Traits & 2026 Safety Outlook.
Do you know?
Subscribe – We publish new crypto explainer movies each week!
What’s Terra Luna? Historical past & Crash Defined (ANIMATED)
These focused messages enabled hackers to assemble credentials, set up malware, or achieve unauthorized entry by impersonating trusted communicators.
Kaspersky suggested sensible steps to protect in opposition to such threats. Advisable measures embrace utilizing a VPN to encrypt connections, avoiding extreme sharing of non-public info on-line, verifying message sources by alternate channels, and enabling multifactor or biometric authentication at any time when doable.
For organizations, AhnLab careworn {that a} multi-layered safety technique is important. Key actions embrace conducting routine safety audits, preserving programs totally patched, and educating employees on potential assault vectors.
AhnLab additionally warned that synthetic intelligence (AI) will make spear phishing stronger in 2026. Attackers might use AI to craft misleading emails and web sites which can be more durable to acknowledge, and to generate modified code that may evade detection.
Faux MON token transfers appeared on Monad’s blockchain explorers two days after launch. What did CTO and co-founder, James Hunsaker, say? Learn the complete story.







_id_3967d452-751f-4e3e-bb6c-6ecfe6efa6b8_size900.jpg)
