Cyber Campaigns Operation 2019 - 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008
Datum | Název | Description |
2019 | Glupteba Expands Operation | Glupteba was first spotted in 2011 as a malicious proxy generating spam and click-fraud traffic from a compromised machine. Since then, it has been distributed through several different methods and used in multiple attacks, including Operation Windigo until 2018. |
19.10.19 | OPERATION GHOST | ESET researchers describe recent activity of the infamous espionage group, the Dukes, including three new malware families |
7.6.19 | The campaign uses compromised routers and man-in-the-middle attacks to target legitimate ASUS WebStorage software to distribute the Plead malware. | |
11.6.19 | The campaign targets a range of sectors with spear-phishing emails delivered from legitimate compromised accounts to drop a PowerShell-based backdoor labeled POWERSTATS v3. | |
11.6.19 | The campaign targets the hotel and entertainment sectors with spear-phishing emails to infiltrate systems with the ShellTea backdoor. | |
11.6.19 | The campaign targets the government sector in Central Asia with malicious documents that take advantage of vulnerabilities in Microsoft Office to drop the HAWKBALL backdoor. | |
10.6.19 | The campaign used a range of open-source tools to carry out their attacks including Microsoft's MSbuild, the post-exploitation framework FruityC2, and PowerShell Empire. | |
27.6.19 | The group behind the operation target users in South Korea, China, and Taiwan with new tactics, techniques, and procedures including Amadey to distribute EmailStealer, using VBA macro and Excel 4.0 macro. | |
27.6.19 | The threat actor behind the operation launched a series of attacks in the last 18 months against multiple sectors including government, IT, communications, and education. | |
27.6.19 | The campaign has been active since at least 2012 and targets telecommunications providers in multiple countries. T | |
28.5.19 | The campaign targeted Microsoft SharePoint servers located at Middle Eastern government organizations to steal sensitive information. | |
28.5.19 | The campaign used trojanized documents attached to phishing emails to steal sensitive information from victims located in the Middle East. | |
26.6.19 | In May 2018, we discovered a campaign targeting dozens of mobile Android devices belonging to Israeli citizens. | |
14.5.19 | Earlier this year, we deployed new technologies in Kaspersky Lab products to identify and block zero-day attacks. | |
23.4.19 | In late March 2019, we briefly highlighted our research on ShadowHammer attacks, a sophisticated supply chain attack involving ASUS Live Update Utility, which was featured in a Kim Zetter article on Motherboard. | |
26.3.19 | Today, members of the Joint Criminal Opioid and Darknet Enforcement (J-CODE) team announce the results of Operation SaboTor, a coordinated international effort targeting drug trafficking organizations operating on the Darknet. | |
26.3.19 | Earlier today, Motherboard published a story by Kim Zetter on Operation ShadowHammer, a newly discovered supply chain attack that leveraged ASUS Live Update software. | |
5.3.19 | Over the weekend, hundreds of popular Israeli sites were targeted by an attack called #OpJerusalem whose goal was to infect Windows users with the JCry ransomware. |