Day 294 – Drone-espionage, NuGet Supply Chain, Data Sprawl & Iranian Espionage

Intro Snapshot

Today’s content spans multiple layers of threat — from strategic intelligence collection (drone manufacturing theft), to supply-chain sneaks (NuGet package hijack), to operational risk (credential sprawl), to renewed espionage campaigns in the Middle East. The underlying theme: attackers are leveraging every axis—physical systems, developer ecosystems, identity/credential chaos, and state-level campaigns.

1) Lazarus Group hunts European drone manufacturing data

Full URL: https://www.darkreading.com/cyberattacks-data-breaches/lazarus-group-hunts-european-drone-manufacturing-data

North Korea’s Lazarus Group is targeting drone manufacturers in Central and Southeast Europe to steal intellectual property related to unmanned aerial vehicle (UAV) manufacturing. The campaign uses job-themed decoy documents to lure victims. 

2) Fake NuGet “Nethereum” package used to steal crypto wallet keys

Full URL: https://thehackernews.com/2025/10/fake-nethereum-nuget-package-used.html

Researchers discovered a malicious NuGet package impersonating “Nethereum” that included code to steal cryptocurrency wallet seeds and keys. This supply-chain compromise shows how developer ecosystems are leveraged for direct financial theft.

3) Too many secrets: attackers exploit data sprawl of sensitive credentials

Full URL: https://www.darkreading.com/cyber-risk/too-many-secrets-attackers-sensitive-data-sprawl

An article highlighting how credential sprawl — hardcoded tokens, API keys, rarely-used service accounts — gives threat actors a rich field for exploitation. Visibility into secrets is still a major gap for many orgs.

4) MuddyWater (Iran-linked) targets 100+ organisations with Phoenix backdoor

Full URL: https://thehackernews.com/2025/10/iran-linked-muddywater-targets-100.html

MuddyWater, tied to Iran’s Ministry of Intelligence and Security, deployed its Phoenix backdoor via phishing emails to more than 100 government and diplomatic organisations in the Middle East and North Africa (MENA) region. 

Key Takeaways

Intellectual property theft is still a state-level priority (Lazarus targeting drone manufacturing). Supply-chain attacks move beyond just code: developer dependencies (NuGet) are live vectors. Secrets governance remains a foundational risk: credential sprawl = attack surface. Espionage campaigns remain global and active: MuddyWater’s outreach shows scale and targeting breadth.