An investigation by cybersecurity agency AhnLab reveals that the Lazarus Group, based mostly in North Korea, relied on spear-phishing all through the previous 12 months to steal digital property.
Lazarus Group is linked to main crypto-related thefts, together with the $1.4 billion Bybit
$2.89B
hack on February 21 and a current $30 million breach at South Korea’s Upbit
$1.98B
on November 27.
The assaults employed emails crafted to seem as lecture invitations or interview requests, a tactic AhnLab highlights in its November 26 report titled Cyber Risk Developments & 2026 Safety Outlook.
Do you know?
Subscribe – We publish new crypto explainer movies each week!
What’s an NFT? (Defined with Animations)
These focused messages enabled hackers to assemble credentials, set up malware, or acquire unauthorized entry by impersonating trusted communicators.
Kaspersky suggested sensible steps to protect in opposition to such threats. Really useful measures embrace utilizing a VPN to encrypt connections, avoiding extreme sharing of non-public data on-line, verifying message sources by alternate channels, and enabling multifactor or biometric authentication at any time when doable.
For organizations, AhnLab burdened {that a} multi-layered safety technique is significant. Key actions embrace conducting routine safety audits, retaining techniques absolutely patched, and educating employees on potential assault vectors.
AhnLab additionally warned that synthetic intelligence (AI) will make spear phishing stronger in 2026. Attackers might use AI to craft misleading emails and web sites which are more durable to acknowledge, and to generate modified code that may evade detection.
Faux MON token transfers appeared on Monad’s blockchain explorers two days after launch. What did CTO and co-founder, James Hunsaker, say? Learn the complete story.









