Operation ALL 2026() 2025() 2024() 2023() 2022() OTHER() ALL | OPERATION (211)
|
DATE |
NAME |
INFO |
CATEGORY |
SUBCATE |
| 5.3.26 | Operation Epic Fury/Roaring Lion | Retaliatory Hacktivist DDoS Activity Following Operation Epic Fury/Roaring Lion | OPERATION | OPERATION |
| 24.2.26 | Operation MacroMaze | Operation MacroMaze: new APT28 campaign using basic tooling and legit infrastructure | OPERATION | OPERATION |
| 23.2.26 | Operation Olalampo | MuddyWater APT has launched a new cyber offensive operation, dubbed Operation Olalampo, deploying new malware variants and leveraging Telegram bots for command-and-control. | OPERATION | OPERATION |
| 3.2.26 | Operation Neusploit | APT28 Leverages CVE-2026-21509 in Operation Neusploit | OPERATION | OPERATION |
| 24.1.26 | Operation DupeHike | Contents Introduction Key Targets. Industries Affected. Geographical Focus. Infection Chain. Initial Findings. Looking into the decoy-document Technical Analysis Stage 1 – Malicious LNK Script Stage 2 – DUPERUNNER Implant Stage 3 – AdaptixC2 Beacon. Infrastructural Artefacts. Conclusion SEQRITE Protection.... | OPERATION | OPERATION |
| 24.1.26 | Operation Covert Access | Table of Contents: Introduction: Infection Chain: Targeted sectors: Initial Findings about Campaign: Analysis of Decoy: Technical Analysis: Stage-1: Analysis of Windows Shortcut file (.LNK). Stage-2: Analysis of Batch file. Stage-3: Details analysis of Covert RAT. Conclusion: Seqrite Coverage: IOCs... | OPERATION | OPERATION |
| 24.1.26 | Operation Nomad Leopard | Contents Introduction Key Targets Industries Affected Geographical focus Infection Chain. Initial Findings Looking into the decoy-document Technical Analysis Stage 1 – Malicious ISO File Stage 2 – Malicious LNK File Stage 3 – Final Payload: FALSECUB Infrastructure & Attribution... | OPERATION | OPERATION |
|
17.12.25 |
Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports |
OPERATION | OPERATION | |
|
13.12.25 |
Table of Contents: Introduction: Targeted sectors: Initial Findings about Campaign: Analysis of Phishing Mail: Infection Chain: Technical Analysis: Stage-1: Analysis of Malicious ISO file. Stage-2: |
OPERATION | OPERATION | |
|
13.12.25 |
Operation FrostBeacon: Multi-Cluster Cobalt Strike Campaign Targets Russia Contents Introduction Key Targets Geographical Focus Industries Affected LNK Cluster Initial Access: |
OPERATION | OPERATION | |
|
6.12.25 |
Contents Introduction Key Targets. Industries Affected. Geographical Focus. Infection Chain. Initial Findings. Looking into the decoy-document Technical Analysis Stage 1 – Malicious LNK Script Stage 2 – |
OPERATION | OPERATION | |
|
26.11.25 |
Russian RomCom Utilizing SocGholish to Deliver Mythic Agent to U.S. Companies Supporting Ukraine |
OPERATION | OPERATION | |
|
19.11.25 |
Operation WrtHug, The Global Espionage Campaign Hiding in Your Home Router |
OPERATION | OPERATION | |
|
8.11.25 |
Initial Findings. Technical Analysis. Campaign – I The LNK Way. Malicious SILENT LOADER Malicious LAPLAS Implant – TCP & TLS. Malicious .NET Implant – SilentSweeper Campaign –... |
OPERATION | OPERATION | |
|
1.11.25 |
Authors: Sathwik Ram Prakki and Kartikkumar Jivani Contents Introduction Key Targets Industries Geographical Focus Infection and Decoys Technical Analysis PowerShell Stage Persistence C.. |
OPERATION | OPERATION | |
|
1.11.25 |
From Scripts to Systems: A Comprehensive Look at Tangerine Turkey Operations |
OPERATION | OPERATION | |
|
18.10.25 |
Malicious .NET Implant Hunting and Infrastructure. Conclusion Seqrite Protection. IOCs MITRE ATT&CK.... |
OPERATION | OPERATION | |
|
18.10.25 |
Introduction: Seqrite Lab has been actively monitoring global cyber threat... |
OPERATION | OPERATION | |
|
27.9.25 |
Operation Rewrite: Chinese-Speaking Threat Actors Deploy BadIIS in a Wide Scale SEO Poisoning Campaign |
OPERATION | OPERATION | |
|
23.9.25 |
Operation Rewrite: Chinese-Speaking Threat Actors Deploy BadIIS in a Wide Scale SEO Poisoning Campaign |
OPERATION | OPERATION | |
|
21.9.25 |
Cloudflare participates in global operation to disrupt RaccoonO365 |
OPERATION | OPERATION | |
|
16.9.25 |
SlopAds |
Satori Threat Intelligence Alert: SlopAds Covers Fraud with Layers of Obfuscation |
OPERATION | OPERATION |
|
7.9.25 |
NoisyBear targets entities linked to Kazakhstan’s Oil & Gas Sector. |
OPERATION | OPERATION | |
|
4.9.25 |
Private Industry Takes Action Against Global Cyber Threats |
OPERATION | OPERATION | |
|
30.8.25 |
Table of Contents: Introduction Threat Profile Infection Chain Campaign-1 Analysis of Decoy: Technical Analysis Fingerprint of ROKRAT’s Malware Campaign-2 |
OPERATION | OPERATION | |
|
17.8.25 |
UNG0901 Targets Russian Aerospace & Defense Sector using EAGLET implant. |
OPERATION | OPERATION | |
|
25.7.25 |
In June 2025, threat actors carried out a strategic web compromise by replacing the legitimate link, tibetfund.org/90thbirthday, on a compromised webpage with a malicious link. |
OPERATION | OPERATION | |
|
25.7.25 |
In June 2025, a new subdomain, hhthedalailama90.niccenter[.]net was used by the threat actor to distribute a malicious application masquerading as a "special prayer check-in" software. |
OPERATION | OPERATION | |
|
8.6.25 |
A malicious campaign discovered by Positive Technologies specialists is primarily targeting residents of Brazil. Attacks have been detected since the beginning of 2025. |
OPERATION | OPERATION | |
|
23.5.25 |
Overview Seqrite Labs, India’s largest Malware Analysis lab, has identified multiple cyber events linked to Operation Sindoor, involving state- sponsored APT activity and coordinated hacktivist operations. |
OPERATION | OPERATION | |
| 25.4.25 | ELUSIVE COMET | Mitigating ELUSIVE COMET Zoom remote control attacks | OPERATION | OPERATION |
| 25.4.25 | Scallywag | Scallywag Extensions Monetize Piracy | OPERATION | OPERATION |
| 24.4.25 | Operation SyncHole | Operation SyncHole: Lazarus APT goes back to the well | OPERATION | OPERATION |
| 22.4.25 | SuperCard X | SuperCard X: exposing a Chinese-speaker MaaS for NFC Relay fraud operation | OPERATION | OPERATION |
| 21.4.25 | Operation BlackEcho | Voice Phishing using Fake Financial and Vaccine Apps | OPERATION | OPERATION |
|
25.3.25 |
Operational Relay Box (ORB) | An Introduction to Operational Relay Box (ORB) Networks - Unpatched, Forgotten, and Obscured | OPERATION | OPERATION |
|
21.3.25 |
Operation FishMedley | ESET researchers detail a global espionage operation by FishMonger, the APT group run by I‑SOON | OPERATION | OPERATION |
|
19.3.25 |
Operation AkaiRyū | Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor | OPERATION | OPERATION |
| 22.2.25 | Harvest | Operation ‘Harvest’: A Deep Dive into a Long-term Campaign | OPERATION | OPERATION |
| 15.2.25 | Operation Marstech Mayhen | Lazarus Group’s Open-Source Trap: North Korea’s New Malware Tactic Targeting Developers and Crypto Wallets | OPERATION | OPERATION |
| 28.1.25 | Operation Phantom Circuit | North Korea’s Global Data Exfiltration Campaign | OPERATION | OPERATION |
|
16.1.25 |
Operation 99 | Operation 99: North Korea’s Cyber Assault on Software Developers | OPERATION | OPERATION |
| 10.12.24 | Operation Digital Eye | Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels | OPERATION | OPERATION |
| 10.12.24 | Operation Soft Cell | Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers | OPERATION | OPERATION |
| 10.12.24 | Operation Tainted Love | Operation Tainted Love | Chinese APTs Target Telcos in New Attacks | OPERATION | OPERATION |
|
29.11.24 |
"Operation Undercut"Shows Multifaceted Nature of SDA’s Influence Operations |
OPERATION | OPERATION | |
|
29.10.24 |
Operation Magnus | On the 28th of October 2024 the Dutch National Police, working in close cooperation with the FBI and other partners of the international law enforcement task force Operation Magnus, .. | OPERATION | OPERATION |
|
27.10.24 |
OperationCodeonToast | AhnLab and NCSC Release Joint Report on Microsoft Zero-Day Browser Vulnerability (CVE-2024-38178) | OPERATION | OPERATION |
| 17.6.24 | Velvet Ant | China-Nexus Threat Group ‘Velvet Ant’ Abuses F5 Load Balancers for Persistence | OPERATION | OPERATION |
| 17.6.24 | Unfading Sea Haze | Unfading Sea Haze: New Espionage Campaign in the South China Sea | OPERATION | OPERATION |
| 14.6.24 | Celestial Force | Operation Celestial Force employs mobile and desktop malware to target Indian entities | OPERATION | OPERATION |
| 12.6.24 | DNS PROBING OPERATION | WHAT A SHOW! AN AMPLIFIED INTERNET SCALE DNS PROBING OPERATION | OPERATION | OPERATION |
5.6.24 |
Operation Crimson Palace: Sophos threat hunting unveils multiple clusters of Chinese state-sponsored activity targeting Southeast Asian government |
OPERATION | OPERATION | |
5.6.24 |
Hellhounds: operation Lahat |
OPERATION | OPERATION | |
5.6.24 |
Hellhounds: operation Lahat |
OPERATION | OPERATION | |
31.5.24 | BlueDelta | GRU's BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns | OPERATION | OPERATION |
31.5.24 | Doppelganger | This page is designed to gather a timeline of the Doppelganger operation with a few elements collected from different reports. | OPERATION | OPERATION |
23.5.24 | Operation Diplomatic Specter: An Active Chinese Cyberespionage Campaign Leverages Rare Tool Set to Target Governmental Entities in the Middle East, Africa and Asia |
OPERATION | OPERATION | |
23.5.24 |
GHOSTENGINE | Elastic Security Labs has identified REF4578, an intrusion set incorporating several malicious modules and leveraging vulnerable drivers to disable known security solutions (EDRs) for crypto mining. |
OPERATION | OPERATION |
16.5.24 |
Operation Windigo | The vivisection of a large Linux server-side credential stealing malware campaign | OPERATION | OPERATION |
|
15.5.24 |
ESET researchers uncover a Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities |
|||
| 30.4.24 | MUDDLING MEERKAT | A CUNNING OPERATOR: MUDDLING MEERKAT AND CHINA’S GREAT FIREWALL | OPERATION | OPERATION |
| 15.4.24 | Operation MidnightEclipse | A critical command injection vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. | OPERATION | OPERATION |
| 2.4.24 | Cuckoobees | Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation | OPERATION | OPERATION |
20.3.24 | A malware campaign employs new TTPs and behaviors to evade detection and deploy NetSupport RAT. |
OPERATION | OPERATION | |
20.3.24 | Securonix Threat Research Security Advisory: Analysis of New DEEP#GOSU Attack Campaign Likely Associated with North Korean Kimsuky Targeting Victims with Stealthy Malware |
OPERATION | OPERATION | |
| 21.2.24 | Operation Texonto | Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war | OPERATION | OPERATION |
1.2.24 | Scammers Paradise | “Scammers Paradise” —Exploring Telegram’s Dark Markets, Breeding Ground for Modern Phishing Operations | OPERATION | OPERATION |
10.1.24 |
Securonix Threat Research Security Advisory: New RE#TURGENCE Attack Campaign: Turkish Hackers Target MSSQL Servers to Deliver Domain-Wide MIMIC Ransomware |
OPERATION | OPERATION | |
27.12.23 |
Operation Triangulation: The last (hardware) mystery |
|||
24.12.23 |
Operation RusticWeb targets Indian Govt: From Rust-based malware to Web-service exfiltration |
|||
19.12.23 |
Operation Blacksmith: Lazarus targets organizations worldwide using novel Telegram-based malware written in DLang |
|||
14.12.23 |
Operation Bearded Barbie: APT-C-23 Campaign Targeting Israeli Officials |
|||
14.12.23 |
The Big Bang attack campaign: Gaza hackers suspected of targeting Middle Eastern victims |
|||
14.12.23 |
The objective of the attacks is clearly espionage – they involve gaining access to top legislative, executive and judicial bodies around the world. |
|||
25.11.23 |
Telekopye: Chamber of Neanderthals’ secrets |
|||
|
22.10.23 |
ESET researchers reveal a growing sophistication in threats affecting the LATAM region by employing evasion techniques and high-value targeting |
|||
19.10.23 |
Government entities in the Asia-Pacific (APAC) region are the target of a long-running cyber espionage campaign dubbed TetrisPhantom. |
|||
16.10.23 |
“EtherHiding” — Hiding Web2 Malicious Code in Web3 Smart Contracts |
|||
5.10.23 |
ESET researchers discovered a cyberespionage campaign against a governmental entity in Guyana |
|||
19.9.23 |
Operation Rusty Flag – A Malicious Campaign Against Azerbaijanian Targets |
|||
19.9.23 |
The Sysdig Threat Research Team (TRT) has uncovered a novel cloud-native cryptojacking operation which they’ve named AMBERSQUID. |
|||
6.9.23 | "Smishing Triad" Targeted USPS And US Citizens For Data Theft |
|||
|
19.8.23 |
LABRAT: Stealthy Cryptojacking and Proxyjacking Campaign Targeting GitLab |
|||
22.6.23 |
Over the years, there have been multiple cases when iOS devices were infected with targeted spyware such as Pegasus. |
|||
|
12.6.23 |
One of the changes between the two campaigns is their name: The group previously known as Mexals (see their web page in Figure 1) now call themselves Diicot, and one of their tools bears the same name. |
|||
|
8.6.23 |
Outing Aggah’s Sophisticated Tactics, Techniques and Procedures (TTPs) Targeting Israel |
|||
7.6.23 |
Financially Motivated Campaign Leverages CMD-Based Scripts and LOLBaS for Online Banking Theft in Portugal, Peru, and Mexico |
|||
|
3.6.23 |
While monitoring the network traffic of our own corporate Wi-Fi network dedicated for mobile devices using the Kaspersky Unified Monitoring and Analysis Platform (KUMA). |
|||
|
25.5.23 |
In addition to the armed conflict in eastern Ukraine, in recent years the country has been facing a significantly higher number of targeted cyberattacks, or so-called advanced persistent threats (APTs). |
|||
14.5.23 |
The Snake implant is considered the most sophisticated cyber espionage tool designed and used by Center 16 of Russia’s Federal Security Service (FSB) for long-term intelligence collection on sensitive targets. |
|||
14.5.23 |
Deep Dive Into DownEx Espionage Operation in Central Asia |
|||
17.3.23 |
A sophisticated attack campaign dubbed SCARLETEEL is targeting containerized environments to perpetrate theft of proprietary data and software. |
|||
17.3.23 |
Morphisec has recently identified a highly evasive malware campaign delivering ProxyShellMiner to Windows endpoints. |
|||
15.3.23 |
We found cyberespionage group TICK targeting critical systems and enterprises to steal information. In this research brief, we show the group's activities and technical analyses of the .. |
|||
15.3.23 |
CrowdStrike has discovered the first-ever Dero cryptojacking operation targeting Kubernetes infrastructure. |
|||
11.3.23 |
Hackers associated with the North Korean government have been distributing a trojanized version of the DeFi Wallet for storing cryptocurrency assets to gain access to the systems of cryptocurrency users and investors. |
|||
2.3.23 |
Operation leveraging Terraform, Kubernetes, and AWS for data theft |
|||
18.2.23 |
Amid rising tensions between Azerbaijan and Armenia over the Lachin corridor in late 2022, Check Point Research identified a malicious campaign against entities in Armenia. |
|||
5.2.23 |
During Q4 2022, WithSecure™ detected and responded to a cyber attack conducted by a threat actor that WithSecure™ have attributed with high confidence to an intrusion set referred to as Lazarus Group. |
|||
4.2.23 |
In September of last year, our Incident Response team was called to an incident that was identified as an attempt of social engineering an online customer service platform. |
|||
3.2.23 |
Beginning in 2022, UNC2565 began incorporating notable changes to the tactics, techniques, and procedures (TTPs) used in its operations. |
|||
|
23.6.22 |
Molerats and APT-C-23. Both groups are Arabic-speaking and politically-motivated that operate on behalf of Hamas, the Palestinian Islamic-fundamentalist movement and a terrorist organization ... |
|||
23.6.22 |
The activity cluster, attributed to a hacking group dubbed Bronze Starlight by Secureworks, involves the deployment of post-intrusion ransomware such as LockFile,
|
|||
8.5.22 |
MustangPanda, also known as "RedDelta" or "Bronze President," is a China-based threat actor that has targeted entities all over the world since at least 2012. |
|||
5.5.22 |
Researchers at Cybereason recently discovered such an attack, which was assessed to be the work of Chinese APT Winnti. |
|||
4.22 |
||||
4.22 |
||||
4.22 |
||||
4.22 |
||||
4.22 |
||||
4.22 |
||||
4.22 |
||||
|
4.22 |
||||
2021 |
In July 2021, the Cybereason Nocturnus and Incident Response Teams responded to Operation GhostShell, a highly-targeted cyber espionage campaign targeting
|
|||
19.3.21 |
In this attack, we discovered malware using similar tactics, techniques, and procedures (TTPs) to those observed in earlier campaigns publicly attributed to the
|
|||
26.2.21 |
During June-August of 2020, ClearSky’s team had investigated an offensive campaign attributed with high probability to North Korea, which we call “Dream Job”. |
|||
|
15.1.21 |
ESET researchers uncover attacks targeting Colombian government institutions and private companies, especially from the energy and metallurgical industries |
|||
|
18.12.20 |
Just a few weeks after the supply-chain attack on the Able Desktop software, another similar attack occurred on the website of the
|
|||
|
12.12.20 |
LuckyMouse, TA428, HyperBro, Tmanger and ShadowPad linked in Mongolian supply-chain attack |
|||
|
30.11.20 |
As the modern threat landscape has evolved, so have the actors. The barrier to entry for cyber-warfare has continued to decrease, which means new nation states |
|||
|
30.11.20 |
This report covers a campaign of phishing and malware which we have named “Operation Manul” and which, based on the available evidence, we believe is likely to
|
|||
|
20.11.20 |
In May 2020, Kaspersky technologies prevented an attack on a South Korean company by a malicious script for Internet Explorer. |
|||
|
17.11.20 |
The Lazarus group was first identified in Novetta’s report Operation Blockbuster in February 2016 |
|||
7.11.20 |
We are in the midst of an economic slump, with more candidates than there are jobs, something that has been leveraged by malicious actors to lure unwitting
|
|||
7.11.20 |
It is rare to be provided an inside view on how major cyber espionage campaigns are conducted within the digital realm. |
|||
7.11.20 |
McAfee’s initial research into Operation North Star revealed a campaign that used social media sites, spearphishing and weaponized documents to target employees
|
|||
7.11.20 |
Recently, Check Point Research encountered a series of worldwide attacks relevant to VoIP, specifically to Session initiation Protocol (SIP) servers. |
|||
|
31.10.20 |
The DRBControl campaign attacks its targets using a variety of malware and techniques that coincide with those used in other known cyberespionage campaigns. |
|||
|
31.10.20 |
A watering hole campaign we dubbed as Operation Earth Kitsune is spying on users’ systems through compromised websites. |
|||
23.9.20 |
Today, a coalition of law enforcement agencies across the world announced the results of a coordinated operation known as DisrupTor which targeted vendors and
|
|||
|
24.8.20 |
In this installment of our blog series, we will focus on Mispadu, an ambitious Latin American banking trojan that utilizes McDonald’s malvertising and extends its
|
|||
|
24.8.20 |
In this installment of our series, we introduce Mekotio, a Latin American banking trojan targeting mainly Brazil, Chile, Mexico, Spain, Peru and Portugal. |
|||
|
24.8.20 |
Most reverse engineers would agree that quite often one can learn something new on the job. However, it is not every day you learn how to cook a delicious meal
|
|||
24.8.20 |
Although it’s been some weeks since the height of the income tax season in many countries around the globe, the year 2020 has been looking less than normal
|
|||
|
21.8.20 |
The APT group Transparent Tribe is mounting an ongoing cyberespionage campaign, researchers said, which is aimed at military and diplomatic targets around the world. |
|||
30.7.20 |
Unknown Actors Leverage Website Compromises and Fabricated Content to Push Narratives Aligned with Russian Security Interests |
|||
30.7.20 |
North Korea-linked hackers continue to be very active in this period, researchers reported a campaign aimed at the US defense and aerospace sectors. |
|||
17.7.20 |
At the end of last year, we discovered targeted attacks against aerospace and military companies in Europe and the Middle East, active from September to December 2019. |
|||
27.3.20 |
Experts observed a campaign aimed at infecting the iPhones of users in Hong Kong with an iOS backdoor that allows attackers to spy on them. |
|||
23.3.20 |
Operation Pangea is the name of a joint international operation lead by the Interpol that seized €13 million in counterfeit drugs for care. |
|||
17.2.20 |
Iranian hackers have been hacking VPN servers to plant backdoors in companies around the world Iran-linked attackers targeted Pulse Secure, Fortinet,
|
|||
28 .1.20 |
Group-IB helps take down a cybergang behind the infection of hundreds of websites all over the world |
|||
22.1.20 |
US military claims to have disrupted the online propaganda activity of the Islamic State (ISIS) in a hacking operation dating back at least to 2016. |
|||
2019 |
Glupteba was first spotted in 2011 as a malicious proxy generating spam and click-fraud traffic from a compromised machine. |
|||
19.10.19 |
ESET researchers describe recent activity of the infamous espionage group, the Dukes, including three new malware families |
|||
7.6.19 |
The campaign uses compromised routers and man-in-the-middle attacks to target legitimate ASUS WebStorage software to distribute the Plead malware. |
|||
11.6.19 |
The campaign targets a range of sectors with spear-phishing emails delivered from legitimate compromised accounts to drop a PowerShell-based backdoor labeled POWERSTATS v3. |
|||
11.6.19 |
The campaign targets the hotel and entertainment sectors with spear-phishing emails to infiltrate systems with the ShellTea backdoor. |
|||
11.6.19 |
The campaign targets the government sector in Central Asia with malicious documents that take advantage of vulnerabilities in Microsoft Office to drop the HAWKBALL backdoor. |
|||
10.6.19 |
The campaign used a range of open-source tools to carry out their attacks including Microsoft's MSbuild, the post-exploitation framework FruityC2, and PowerShell Empire. |
|||
27.6.19 |
The group behind the operation target users in South Korea, China, and Taiwan with new tactics, techniques, and procedures including Amadey to distribute EmailStealer, using V |
|||
27.6.19 |
The threat actor behind the operation launched a series of attacks in the last 18 months against multiple sectors including government, IT, communications, and education. |
|||
27.6.19 |
The campaign has been active since at least 2012 and targets telecommunications providers in multiple countries. T |
|||
28.5.19 |
The campaign targeted Microsoft SharePoint servers located at Middle Eastern government organizations to steal sensitive information. |
|||
28.5.19 |
The campaign used trojanized documents attached to phishing emails to steal sensitive information from victims located in the Middle East. |
|||
26.6.19 |
In May 2018, we discovered a campaign targeting dozens of mobile Android devices belonging to Israeli citizens. |
|||
14.5.19 |
Earlier this year, we deployed new technologies in Kaspersky Lab products to identify and block zero-day attacks. |
|||
23.4.19 |
In late March 2019, we briefly highlighted our research on ShadowHammer attacks, a sophisticated supply chain attack involving ASUS Live Update Utility, which was
|
|||
26.3.19 |
Today, members of the Joint Criminal Opioid and Darknet Enforcement (J-CODE) team announce the results of Operation SaboTor, a coordinated international effort
|
|||
26.3.19 |
Earlier today, Motherboard published a story by Kim Zetter on Operation ShadowHammer, a newly discovered supply chain attack that leveraged ASUS Live Update software. |
|||
5.3.19 |
Over the weekend, hundreds of popular Israeli sites were targeted by an attack called #OpJerusalem whose goal was to infect Windows users with the JCry ransomware. |
|||
2018 |
In 2018, the Cybereason Nocturnus team identified an advanced, persistent attack targeting global telecommunications providers carried out by a threat actor using t |
|||
12.12.18 |
Operation Sharpshooter |
The McAfee Advanced Threat Research team and McAfee Labs Malware Operations Group have discovered a new global campaign targeting nuclear, defense, energy, |
||
17.11.18 |
A wall eight feet high with three strands of barbed wire is considered sufficient to deter a determined intruder, at least according to the advice offered by the
|
|||
14.11.18 |
We have dubbed the first campaignOperation Shaheen. It examines complex espionage effort directed military Pakistani the at |
|||
4.5.18 |
ZooPark is a cyberespionage operation that has been focusing on Middle Eastern targetssince at least June 2015. |
|||
4/5/18 |
OpIsrael is a yearly campaign created by Anonymous in 2012 with the stated goal of “erasing Israel from the internet” in protest against the Israeli government’s
|
|||
12/21/18 |
In October 2017, citizens of Catalonia – an autonomous community in Spain - held an independence referendum. |
|||
17.12.18 |
On September 6, Symantec published details of the Dragonfly campaign, which targeted dozens of energy companies throughout 2017. |
|||
12/14/17 |
With a new whale hunting season comes a new wave of attacks by environmental and animal rights hacktivist communities within the Anonymous collective. |
|||
12/12/17 |
In 1995, the United States Congress passed the Jerusalem Embassy Act, which was created for the purposes of initiating and funding the relocation of the
|
|||
10/31/17 |
At the beginning of October 2017, citizens of Catalonia – an autonomous community in Spain - held an independence referendum. |
|||
6/8/17 |
OpIcarus is a multiphase operation originally launched by Anonymous on February 8, 2016 and is now entering its fifth phase on June 11, 2017. Its |
|||
6/7/17 |
In the first week of June there has been a dramatic increase in activity from #OpSingleGateway, an Anonymous operation designed to combat the government of
|
|||
6/5/17 |
OpKillingBay is a yearly hacktivism operation by Anonymous, activists, and others organizations in response to the hunting of whales and dolphins in Japan. |
|||
3/28/17 |
With the stated goal of "erasing Israel from the Internet,” Anonymous will launch OpIsrael 2017, its yearly cyber operation against Israel on April 7, 2017. |
|||
1/17/17 |
In a move to combat the government of Thailand’s strategy to implement central control of the nation’s Internet, Anonymous has launched OpSingleGateway. |
|||
11/10/16 |
Online protests in the form of network and application attacks against countries and organizations involved in whale and dolphin hunting has become an integral part of hunting season. |
|||
9/19/16 |
The Dakota Access Pipeline Project (DAPL) is the construction of a 1,172-mile-long pipeline that will span across three states. |
|||
6/8/16 |
Anonymous has initiated the third and final phase of OpIcarus: “Project Mayhem” – a systematic cyber assault against worldwide stock exchanges. |
|||
5/18/16 |
Anonymous has launched OpLGBT, a DDoS campaign targeting the state of North Carolina and its governmental institutes in response to controversial legislation passed by
|
|||
5/6/16 |
The Hacktivist Group Anonymous announced its plans to relaunch its cyber assaults on leading financial services companies worldwide. |
|||
4/25/16 |
In an effort to fight for the rights of digital consumers throughout South America, the hacktivist group Anonymous has launched OpOperadoras,i coordinated cyber assault against
|
|||
4/5/16 |
With the stated goal of “erasing Israel from the internet” in protest against claimed crimes against the Palestinian people, Anonymous will launch its yearly operation against Israel. |
|||
4/4/16 |
Since our previous OpWhiteRose vs Donald Trump ERT alert outlining the potential cyber-attack against Donald Trump on April fool's day, the presidential candidate was eventually hit
|
|||
3/24/16 |
Donald Trump and his presidential campaign has gained a new round of attention from the Anonymous collective. |
|||
3/16/16 |
The hacktivist group Anonymous launched an operation against the city of Denver, CO and its officials. Entitled OpRight2Rest, the operation is a response to the
|
|||
3/14/16 |
The hacktivist group New World Hackers is currently targeting the capital and most populous city of Utah, Salt Lake City, as part of a new operation, OpAbdiMohamed. |
|||
3/10/16 |
The hacktivist group Anonymous has upped the ante in its cyber-assault against corporations and government that "enable and perpetuate corruption on the African continent." |
|||
2/26/16 |
With the stated goal of "erasing Israel from the internet" in protest against claimed crimes against the Palestinian people, Anonymous will launch its yearly operation against Israel. |
|||
2/24/16 |
Hacktivists have targeted the Cincinnati Police Department after last week’s police shooting of Paul Gaston. |
|||
2/16/16 |
The hacktivist group Anonymous is back, this time fighting corruption across the continent of Africa. |
|||
2/11/16 |
OpKillingBay is an annual campaign that was started in 2013 by Anonymous. It was created by Anonymous to bring attention to the hunting of whales and
|
|||
2/8/16 |
The hacktivist group Anonymous announced its plan to attack leading financial services companies on Monday, February 8, 2016, starting at 6AM UTC with the
|
|||
12/18/15 |
On December 11, 2015 Anonymous announced Operation Trump (#OpTrump), a three phase hacking campaign to "expose the real Donald Trump" and take down
|
|||
12/1/15 |
OpParis has faced a number of challenges since the launch of its operation. |
|||
11/16/15 |
OpKillingBay, the annual campaign created by Anonymous, has continued into November and predicted to remain until the end of dolphin hunting season. |
|||
11/10/15 |
Radware's ERT has been investigating OpParis, an Anonymous revenge campaign against ISIS for the Paris attacks on November 13, 2015. |
|||
10/26/15 |
OpKillingBay is an annual campaign created by Anonymous, activists and other organizations in response to whale and dolphin hunting in Japan and Denmark. |
|||
4/17/15 |
Islamic State in Iraq and Syria (ISIS), an Al-Qaeda splinter group, is infamously known for its malicious, physical attacks. Recently, however, ISIS has been credited
|
|||
3/30/15 |
OpIsrael 2015 is an organized set of attacks aimed at the Israeli government, public institutions and other high profile Web sites. |
|||
7/11/14 |
Due to the growing tension between Palestine and Israel that includes military actions in the sector of Gaza, several hacktivists groups have united in a cyber-attack campaign against Israel, named #OpSaveGaza. |
|||
15.7.14 |
This document details a large and sophisticated operation, code named “Windigo”, in which a malicious group has compromised thousands of Linux and Unix servers. |
|||
4/7/14 |
#OpIsrael is an organized set of attacks aimed at Israeli Web sites, which was officially first launched on 14 November, 2012 against the Israeli government, public
|
|||
7/26/13 |
In early September 2012, videos of about 14 minutes in length that claimed to be trailers of a longer film named “Innocence of Muslims” were uploaded to YouTube. |
|||
4/30/13 |
AnonGhost – A hacking group affiliated with Anonymous announced a new cyber-attack campaign against US websites named #OPUSA, scheduled for May 7th, 2013. |
|||
4/7/13 |
Various anti-Israeli hacking groups join hands to launch a massive cyber attack on Israeli cyber space with the aim to disconnect the country from the Internet. |
|||
2011 |
The Operation Potao Express whitepaper presents ESET’s latest findings based on research into the Win32/Potao malware family. |