Firewall Daily

Operation Dream Job Continues, Uses Trojanized PuTTY SSH Client

North Korean hackers have been installing backdoors on targets’ computers using trojanized versions of the PuTTY SSH client. Mandiant, a cyber threat defense solution company, released a technical analysis report “UNC4034” as the threat cluster behind this campaign (aka “Temp.Hermit” or “Labyrinth Chollima”).

Operation Dream Job continues its operation

The hackers seem to continue the “Operation Dream Job,” which was first observed earlier this June. In July 2022, Mandiant Managed Defense discovered a new spear phishing technique used by the threat cluster tracked as UNC4034 during proactive threat hunting actions at a media organization. The campaign now targets media companies using a trojanized version of the PuTTY SSH client.

According to reports, the attackers allegedly contacted targets using a phishing email containing a job offer from Amazon. Once the victim clicked on the phishing page, the threat actor would pursue the victim to a WhatsApp conversion where an ISO file called “amazon assessment.iso” was shared.

The ISO file contained a trojanized version of PuTTY with an executable file, IP address, and login information. The hackers instructed the users to open the ISO file, use the SSH tool and inside credentials to connect to the server and do a skills evaluation.

According to Mandiant, the evaluated sample could check for active RDP sessions and employ a proxy server; these features are, by default, deactivated.

AIR DRY.V2 supports the following nine commands:

  • Upload basic system information
  • Update the beacon interval based
  • Deactivate until the new start date and time
  • Upload the current configuration
  • Update the configuration
  • Keep-alive
  • Update the AES key
  • Configuration data
  • Download and execute a plugin in memory
  • The new variant of AIR DRY, as compared with the previous version, supports fewer commands.

The previous AIRDRY supported more variant commands than the new one. Moreover, the new variant’s plugin execution in memory and AES key for C2 communications are new capabilities. As per the report, the backdoor’s adaptability is unaffected by fewer allowed commands because fetching plugins from the C2 creates additional opportunities for more precise attacks.

thecyberexpress

Recent Posts

ATM Jackpotting Losses Cross $20M as Malware Targets U.S. Cash Machines

These cases reinforce that ATM jackpotting is no longer a niche cybercrime tactic but part of organized financial crime networks.

4 hours ago

X vs EU: Platform Appeals Against €120M Digital Services Act Penalty

This signals that DSA enforcement is moving beyond content moderation into deeper operational transparency.

4 hours ago

UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

Campaign involving network infiltration, ransomware deployment and phishing operations designed to destabilize essential services in UAE, blocked.

7 hours ago

The Cyber Express Weekly Roundup: AI Disruption, Regulatory Pressure, and the Evolving Cyber Threat Landscape

AI fraud, deepfake probes, SME cyber warnings, and ransomware cases highlight rising global risks in this week’s Cyber Express roundup.

3 days ago

French National Bank Authority Breach Exposed 1.2 Million Accounts

French national bank authority confirmed a major data breach affecting 1.2 million bank accounts after a malicious actor stole credentials…

3 days ago

What Big Tech Leaders Said On AI’s Future at India AI Impact Summit 2026

The real success of AI will not only depend on how powerful the technology becomes, but on how safely, fairly,…

3 days ago

This website uses cookies. By continuing to use this website you are giving consent to cookies being used.

Read More