Campaign Spotlight
- Pages:
- 1
- 2
- This research paper looks at the mining industry as a target for a broad set of threat actors, its role in regional and global supply chains, and its vulnerabilities.This latest paper details the latest activities of Rocket Kitten, a threat actor group involved in Operation Woolen-Goldfish last March, and how they've been found to be attacking multiple targets in the Middle East.This research paper offers a look into "Operation Tropic Trooper", an ongoing targeted attack campaign that uses old infiltration tactics to steal state and industry secrets since 2012.This research paper offers a look into the activities and methods used by Rocket Kitten, a group behind cyber attacks on Israeli and European organizationsThis Trend Micro paper unearths two separate but linked malware campaigns—Operation Arid Viper and Advtravel. Operation Arid Viper targets specific Israeli organizations using infrastructure in Germany with ties to Gaza in Palestine.This Trend Micro paper unravels a series of attacks that targets military officials and defense contractors. Dubbed as “Operation Pawn Storm,” the group of threat actors use two known attack vectors: spear phishing emails and a network of phishing websites.Online advertisements are increasingly being used by cybercriminals as a way to harvest info or install malicous code. Find out how malicious ads work and how you can avoid being a victim of such threats.The PLEAD campaign is the second attack to target entities in Taiwan in the first half of 2014. Taiwanese agencies were also targeted in May using a Microsoft Word zero-day vulnerability.The targeted attack campaign Esile was found in the second half of 2013 trying to spread backdoor malware inside the networks of East Asian governments, electronic manufacturers, and telecommunications firms.
- Pages:
- 1
- 2