An investigation by cybersecurity firm AhnLab shows that the Lazarus Group, based in North Korea, relied on spear-phishing throughout the past year to steal digital assets.
Lazarus Group is linked to major crypto-related thefts, including the $1.4 billion Bybit
$2.84B
The attacks employed emails crafted to appear as lecture invites or interview requests, a tactic AhnLab highlights in its November 26 report titled Cyber Threat Trends & 2026 Security Outlook.

Did you know?
Subscribe – We publish new crypto explainer videos every week!
How to Use Crypto? 5 Rewarding Strategies Explained (Animated)

These targeted messages enabled hackers to gather credentials, install malware, or gain unauthorized access by impersonating trusted communicators.
For organizations, AhnLab stressed that a multi-layered security strategy is vital. Key actions include conducting routine security audits, keeping systems fully patched, and educating staff on potential attack vectors.
AhnLab also warned that artificial intelligence (AI) will make spear phishing more potent in 2026. Attackers may use AI to craft deceptive emails and websites that are harder to recognize, and to generate modified code that can evade detection.
Fake MON token transfers appeared on Monad’s blockchain explorers two days after launch. What did CTO and co-founder, James Hunsaker, say? Read the full story.
Discover more from Earlybirds Invest
Subscribe to get the latest posts sent to your email.



