Access Restricted for EU Residents
You are attempting to access a website operated by an entity not regulated in the EU. Products and services on this website do not comply with EU laws or ESMA investor-protection standards.
As an EU resident, you cannot proceed to the offshore website.
Please continue on the EU-regulated website to ensure full regulatory protection.
Monday Dec 1 2025 03:30
3 min
North Korean state-sponsored hackers, the Lazarus Group, primarily utilized spear phishing attacks to steal funds over the past year, garnering the most mentions in post-hack analyses during that period, according to South Korean cybersecurity firm AhnLab. Spear phishing, a favored tactic among malicious actors like Lazarus, involves crafting deceptive emails, often disguised as “lecture invitations or interview requests,” AhnLab analysts noted in their November 26, 2025, Cyber Threat Trends & 2026 Security Outlook report.
The Lazarus Group is considered the prime suspect behind numerous attacks spanning various sectors, including the cryptocurrency realm. The group is believed to be behind the $1.4 billion Bybit hack on February 21st and the more recent $30 million exploit targeting the South Korean crypto exchange Upbit on Thursday.
Spear phishing attacks represent a highly targeted form of phishing, where hackers meticulously research their intended target to gather intelligence and impersonate a trusted sender. This allows them to steal credentials, install malware, or gain unauthorized access to sensitive systems.
Cybersecurity firm Kaspersky recommends several preventative measures: employing a VPN to encrypt all online activity, minimizing the sharing of personal information online, verifying the authenticity of emails or communications through alternative channels, and enabling multi-factor or biometric authentication whenever possible.
AhnLab indicates that the Lazarus Group has set its sights on the crypto, finance, IT, and defense sectors. It was also the most frequently cited group in post-incident analyses between October 2024 and September 2025, appearing in 31 disclosures. Kimsuky, another North Korean-linked hacking group, followed with 27 disclosures, and TA-RedAnt accounted for 17.
AhnLab emphasizes that a “multi-layered defense system is essential” for organizations seeking to mitigate these attacks. This includes conducting regular security audits, ensuring software is updated with the latest security patches, and providing comprehensive security awareness training to employees on various attack vectors.
Furthermore, the cybersecurity company advises individuals to adopt multi-factor authentication, keep all security software current, exercise caution with unverified URLs and attachments, and only download content from verified, official sources.
Looking ahead to 2026, AhnLab cautions that emerging technologies, particularly artificial intelligence, will significantly enhance the efficiency and sophistication of malicious actors. Attackers are already leveraging AI to create highly convincing phishing websites and emails that are virtually indistinguishable from legitimate communications. Moreover, AI can “generate diverse, modified code to evade detection” and refine spear phishing campaigns through the use of deepfakes.
“With the escalating adoption of AI models, deepfake attacks, including those designed to steal prompt data, are poised to evolve to a level where victim identification becomes exceedingly challenging. Heightened vigilance will be paramount to prevent data leaks and ensure robust data security measures.”
Risk Warning: this article represents only the author’s views and is for reference only. It does not constitute investment advice or financial guidance, nor does it represent the stance of the Markets.com platform.When considering shares, indices, forex (foreign exchange) and commodities for trading and price predictions, remember that trading CFDs involves a significant degree of risk and could result in capital loss.Past performance is not indicative of any future results. This information is provided for informative purposes only and should not be construed to be investment advice. Trading cryptocurrency CFDs and spread bets is restricted for all UK retail clients.