An investigation by cybersecurity agency AhnLab reveals that the Lazarus Group, primarily based in North Korea, relied on spear-phishing all through the previous 12 months to steal digital belongings.
Lazarus Group is linked to main crypto-related thefts, together with the $1.4 billion Bybit
$2.89B
hack on February 21 and a current $30 million breach at South Korea’s Upbit
$1.98B
on November 27.
The assaults employed emails crafted to look as lecture invitations or interview requests, a tactic AhnLab highlights in its November 26 report titled Cyber Risk Traits & 2026 Safety Outlook.
Do you know?
Subscribe – We publish new crypto explainer movies each week!
Proof of Work vs Proof of Stake: Which is Higher? (ANIMATED)
These focused messages enabled hackers to collect credentials, set up malware, or achieve unauthorized entry by impersonating trusted communicators.
Kaspersky suggested sensible steps to protect towards such threats. Really helpful measures embrace utilizing a VPN to encrypt connections, avoiding extreme sharing of non-public info on-line, verifying message sources by alternate channels, and enabling multifactor or biometric authentication every time attainable.
For organizations, AhnLab harassed {that a} multi-layered safety technique is significant. Key actions embrace conducting routine safety audits, holding programs absolutely patched, and educating workers on potential assault vectors.
AhnLab additionally warned that synthetic intelligence (AI) will make spear phishing stronger in 2026. Attackers could use AI to craft misleading emails and web sites which can be tougher to acknowledge, and to generate modified code that may evade detection.
Pretend MON token transfers appeared on Monad’s blockchain explorers two days after launch. What did CTO and co-founder, James Hunsaker, say? Learn the total story.









