• 5 minutes Oil prices forecast
  • 8 minutes Nuclear Power Can Be Green – But At A Price
  • 11 minutes Projection Of Experts: Oil Prices Expected To Stay Anchored Around $65-70 Through 2023
  • 16 minutes Europe Slipping into Recession?
  • 9 hours *Happy Dance* ... U.S. Shale Oil Slowdown
  • 4 hours Socialists want to exorcise the O&G demon by 2030
  • 58 mins Emissions from wear of brakes and tyres likely to be higher in supposedly clean vehicles, experts warn
  • 2 hours UK, Stay in EU, Says Tusk
  • 1 day Germany: Russia Can Save INF If It Stops Violating The Treaty
  • 1 day Connection Between Climate Rules And German's No-Limit Autobahns? Strange, But It Exists
  • 2 days Conspiracy - Theory versus Reality
  • 3 hours How Is Greenland Dealing With Climate Change?
  • 2 days Chevron to Boost Spend on Quick-Return Projects
  • 1 day Maritime Act of 2020 and pending carbon tax effects
  • 2 days U.S. Treasury Secretary Mnuchin Weighs Lifting Tariffs On China
  • 2 days Regular Gas dropped to $2.21 per gallon today
How The Transport Industry Is Shaping Oil Demand

How The Transport Industry Is Shaping Oil Demand

The transport industry is evolving,…

Operation ‘Sharpshooter’ Targets Energy, Defense Firms

Cybercrime

A new global cyber threat campaign has recently infiltrated dozens of energy, defense, nuclear, and financial companies around the world, using malware to extract and exploit data from these organizations in a campaign McAfee has dubbed ‘Operation Sharpshooter’.

The McAfee Advanced Threat Research team and McAfee Labs Malware Operations Group say that they have discovered that this new global campaign uses an in-memory implant to download and retrieve a second-stage implant—which McAfee calls Rising Sun—for further exploitation.

This campaign appeared in 87 organizations—mostly in the United States—in October and November this year. The malware links were posing as industry job recruitment activity, gathering information to monitor for possible future exploitation, according to McAfee.

“This actor has used recruiting as a lure to collect information about targeted individuals of interest or organizations that manage data related to the industries of interest,” the McAfee report says.

The new malware campaign uses source code from a 2015 backdoor Trojan Duuzer malware campaign by Lazarus Group in a new framework to infiltrate these key industries.

Notorious cyber crime group Lazarus Group has been linked to last year’s WannaCry ransomware attacks and to cyber attacks at Sony Pictures and Bangladesh Bank.

“Operation Sharpshooter’s numerous technical links to the Lazarus Group seem too obvious to immediately draw the conclusion that they are responsible for the attacks, and instead indicate a potential for false flags,” said McAfee about the global cyber spy campaign it had discovered.

“We have not previously observed this implant. Based on our telemetry, we discovered that multiple victims from different industry sectors around the world have reported these indicators,” McAfee said.

“Was this attack just a first-stage reconnaissance operation, or will there be more? We will continue to monitor this campaign and will report further when we or others in the security industry receive more information.”

By Tsvetana Paraskova for Oilprice.com

More Top Reads From Oilprice.com:



Join the discussion | Back to homepage

Leave a comment

Leave a comment

Oilprice - The No. 1 Source for Oil & Energy News