An investigation by cybersecurity agency AhnLab reveals that the Lazarus Group, based mostly in North Korea, relied on spear-phishing all through the previous yr to steal digital property.
Lazarus Group is linked to main crypto-related thefts, together with the $1.4 billion Bybit
$2.84B
hack on February 21 and a current $30 million breach at South Korea’s Upbit
$1.97B
on November 27.
The assaults employed emails crafted to seem as lecture invitations or interview requests, a tactic AhnLab highlights in its November 26 report titled Cyber Menace Tendencies & 2026 Safety Outlook.
Do you know?
Subscribe – We publish new crypto explainer movies each week!
What’s Solana in Crypto? (Newbie-Pleasant Animation)
These focused messages enabled hackers to assemble credentials, set up malware, or acquire unauthorized entry by impersonating trusted communicators.
Kaspersky suggested sensible steps to protect towards such threats. Really helpful measures embrace utilizing a VPN to encrypt connections, avoiding extreme sharing of private data on-line, verifying message sources via alternate channels, and enabling multifactor or biometric authentication at any time when potential.
For organizations, AhnLab burdened {that a} multi-layered safety technique is significant. Key actions embrace conducting routine safety audits, retaining methods absolutely patched, and educating workers on potential assault vectors.
AhnLab additionally warned that synthetic intelligence (AI) will make spear phishing stronger in 2026. Attackers might use AI to craft misleading emails and web sites which can be tougher to acknowledge, and to generate modified code that may evade detection.
Faux MON token transfers appeared on Monad’s blockchain explorers two days after launch. What did CTO and co-founder, James Hunsaker, say? Learn the total story.



