• 4 minutes Ten Years of Plunging Solar Prices
  • 7 minutes Hydrogen Capable Natural Gas Turbines
  • 10 minutes World looks on in horror as Trump flails over pandemic despite claims US leads way
  • 13 minutes Large gas belt discovered in China
  • 2 hours Yale University Epidemiologist Publishes Paper on Major Benefits of Hydroxchloroquine for High-risk Outpatients. Quacksalvers like Fauci should put lives ahead of Politics
  • 8 mins Would bashing China solve all the problems of the United States
  • 18 mins Model 3 cheaper to buy than BMW 3 series.
  • 5 hours China to Impose Dictatorship on Hong Kong
  • 12 mins COVID 19 May Be Less Deadly Than Flu Study Finds
  • 1 hour Incompetent "Journalists"
  • 9 mins Can I Sue This Site for If People Post Inaccurate Information?
  • 26 mins Pompeo's Hong Kong
  • 5 hours Thugs in Trumpistan
  • 20 hours Iran's first oil tanker has arrived near Venezuela
  • 20 hours Let’s Try This....
  • 23 hours Chicago Threatens To Condemn - Possibly Demolish - Churches Defying Lockdown
  • 12 hours 60 mph electric mopeds
  • 1 day HVDC Cheaper Than Low-carbon Natural Gas
  • 1 day Oil and Gas After COVID-19
Driving Season Won’t Save Gas Demand

Driving Season Won’t Save Gas Demand

Memorial day weekend usually marks…

Is Lebanon’s Natural Gas Boom Dead In The Water?

Is Lebanon’s Natural Gas Boom Dead In The Water?

Absent any discovery thus far,…

Operation ‘Sharpshooter’ Targets Energy, Defense Firms

A new global cyber threat campaign has recently infiltrated dozens of energy, defense, nuclear, and financial companies around the world, using malware to extract and exploit data from these organizations in a campaign McAfee has dubbed ‘Operation Sharpshooter’.

The McAfee Advanced Threat Research team and McAfee Labs Malware Operations Group say that they have discovered that this new global campaign uses an in-memory implant to download and retrieve a second-stage implant—which McAfee calls Rising Sun—for further exploitation.

This campaign appeared in 87 organizations—mostly in the United States—in October and November this year. The malware links were posing as industry job recruitment activity, gathering information to monitor for possible future exploitation, according to McAfee.

“This actor has used recruiting as a lure to collect information about targeted individuals of interest or organizations that manage data related to the industries of interest,” the McAfee report says.

The new malware campaign uses source code from a 2015 backdoor Trojan Duuzer malware campaign by Lazarus Group in a new framework to infiltrate these key industries.

Notorious cyber crime group Lazarus Group has been linked to last year’s WannaCry ransomware attacks and to cyber attacks at Sony Pictures and Bangladesh Bank.

“Operation Sharpshooter’s numerous technical links to the Lazarus Group seem too obvious to immediately draw the conclusion that they are responsible for the attacks, and instead indicate a potential for false flags,” said McAfee about the global cyber spy campaign it had discovered.

“We have not previously observed this implant. Based on our telemetry, we discovered that multiple victims from different industry sectors around the world have reported these indicators,” McAfee said.

“Was this attack just a first-stage reconnaissance operation, or will there be more? We will continue to monitor this campaign and will report further when we or others in the security industry receive more information.”

By Tsvetana Paraskova for Oilprice.com

More Top Reads From Oilprice.com:



Join the discussion | Back to homepage



Leave a comment

Leave a comment

Oilprice - The No. 1 Source for Oil & Energy News