An investigation by cybersecurity agency AhnLab exhibits that the Lazarus Group, primarily based in North Korea, relied on spear-phishing all through the previous yr to steal digital property.
Lazarus Group is linked to main crypto-related thefts, together with the $1.4 billion Bybit
$2.89B
hack on February 21 and a latest $30 million breach at South Korea’s Upbit
$1.98B
on November 27.
The assaults employed emails crafted to seem as lecture invitations or interview requests, a tactic AhnLab highlights in its November 26 report titled Cyber Menace Traits & 2026 Safety Outlook.
Do you know?
Subscribe – We publish new crypto explainer movies each week!
Greatest Crypto Evaluation Indicators Defined (Newbie-Pleasant Animation)
These focused messages enabled hackers to collect credentials, set up malware, or acquire unauthorized entry by impersonating trusted communicators.
Kaspersky suggested sensible steps to protect towards such threats. Beneficial measures embrace utilizing a VPN to encrypt connections, avoiding extreme sharing of non-public data on-line, verifying message sources by means of alternate channels, and enabling multifactor or biometric authentication every time attainable.
For organizations, AhnLab confused {that a} multi-layered safety technique is important. Key actions embrace conducting routine safety audits, preserving methods absolutely patched, and educating workers on potential assault vectors.
AhnLab additionally warned that synthetic intelligence (AI) will make spear phishing stronger in 2026. Attackers could use AI to craft misleading emails and web sites which can be more durable to acknowledge, and to generate modified code that may evade detection.
Pretend MON token transfers appeared on Monad’s blockchain explorers two days after launch. What did CTO and co-founder, James Hunsaker, say? Learn the total story.








