Cyber Campaigns Operation 2019 - 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008

Datum

Název

Description

2019Glupteba Expands OperationGlupteba was first spotted in 2011 as a malicious proxy generating spam and click-fraud traffic from a compromised machine. Since then, it has been distributed through several different methods and used in multiple attacks, including Operation Windigo until 2018.

19.10.19

OPERATION GHOSTESET researchers describe recent activity of the infamous espionage group, the Dukes, including three new malware families

7.6.19

Operation WebStorage

The campaign uses compromised routers and man-in-the-middle attacks to target legitimate ASUS WebStorage software to distribute the Plead malware.

11.6.19

Operation MuddyWater POWERSTATS V3

The campaign targets a range of sectors with spear-phishing emails delivered from legitimate compromised accounts to drop a PowerShell-based backdoor labeled POWERSTATS v3.

11.6.19

Operation ShellTea

The campaign targets the hotel and entertainment sectors with spear-phishing emails to infiltrate systems with the ShellTea backdoor.

11.6.19

Operation HAWKBALL

The campaign targets the government sector in Central Asia with malicious documents that take advantage of vulnerabilities in Microsoft Office to drop the HAWKBALL backdoor.

10.6.19

Operation Frankenstein

The campaign used a range of open-source tools to carry out their attacks including Microsoft's MSbuild, the post-exploitation framework FruityC2, and PowerShell Empire.

27.6.19

Operation TA505 Shifting Tactics

The group behind the operation target users in South Korea, China, and Taiwan with new tactics, techniques, and procedures including Amadey to distribute EmailStealer, using VBA macro and Excel 4.0 macro.

27.6.19

Operation Waterbug New Toolset

The threat actor behind the operation launched a series of attacks in the last 18 months against multiple sectors including government, IT, communications, and education.

27.6.19

Operation Soft Cell

The campaign has been active since at least 2012 and targets telecommunications providers in multiple countries. T

28.5.19

Operation SharePoint Middle East

The campaign targeted Microsoft SharePoint servers located at Middle Eastern government organizations to steal sensitive information.

28.5.19

Operation BlackWater

The campaign used trojanized documents attached to phishing emails to steal sensitive information from victims located in the Middle East.

26.6.19

ViceLeaker Operation

In May 2018, we discovered a campaign targeting dozens of mobile Android devices belonging to Israeli citizens.

14.5.19

Operation Daybreak

Earlier this year, we deployed new technologies in Kaspersky Lab products to identify and block zero-day attacks.

23.4.19

Operation ShadowHammer

In late March 2019, we briefly highlighted our research on ShadowHammer attacks, a sophisticated supply chain attack involving ASUS Live Update Utility, which was featured in a Kim Zetter article on Motherboard.

26.3.19

Operation SaboTor

Today, members of the Joint Criminal Opioid and Darknet Enforcement (J-CODE) team announce the results of Operation SaboTor, a coordinated international effort targeting drug trafficking organizations operating on the Darknet.

26.3.19

Operation ShadowHammer

Earlier today, Motherboard published a story by Kim Zetter on Operation ShadowHammer, a newly discovered supply chain attack that leveraged ASUS Live Update software.

5.3.19

#OpJerusalem

Over the weekend, hundreds of popular Israeli sites were targeted by an attack called #OpJerusalem whose goal was to infect Windows users with the JCry ransomware.