• 4 minutes England Running Out of Water?
  • 7 minutes Trump to Make Allies Pay More to Host US Bases
  • 10 minutes U.S. Shale Output may Start Dropping Next Year
  • 14 minutes Washington Eyes Crackdown On OPEC
  • 6 hours One Last Warning For The U.S. Shale Patch
  • 1 day Modular Nuclear Reactors
  • 1 day Once Upon A Time... North Korea Abruptly Withdraws Staff From Liaison Office
  • 11 hours Oil Slips Further From 2019 Highs On Trade Worries
  • 2 days Chile Tests Floating Solar Farm
  • 9 hours Climate change's fingerprints are on U.S. Midwest floods
  • 2 hours Dutch Populists Shock the EU with Election Victory
  • 1 day Poll: Will Renewables Save the World?
  • 9 hours Telsa Sales in Europe
  • 28 mins 3 Pipes: EPIC 900K, CACTUS II 670K, GREY OAKS 800K
  • 10 hours Read: OPEC THREATENED TO KILL US SHALE
  • 6 hours The Political Debacle: Brexit delayed
  • 2 days US-backed coup in Venezuela not so smooth
A Paradigm Shift In The Permian

A Paradigm Shift In The Permian

As Wall Street sours on…

After Libya And Venezuela, Is This The Next OPEC Wildcard?

After Libya And Venezuela, Is This The Next OPEC Wildcard?

Anti-government protests in the North…

Operation ‘Sharpshooter’ Targets Energy, Defense Firms

Cybercrime

A new global cyber threat campaign has recently infiltrated dozens of energy, defense, nuclear, and financial companies around the world, using malware to extract and exploit data from these organizations in a campaign McAfee has dubbed ‘Operation Sharpshooter’.

The McAfee Advanced Threat Research team and McAfee Labs Malware Operations Group say that they have discovered that this new global campaign uses an in-memory implant to download and retrieve a second-stage implant—which McAfee calls Rising Sun—for further exploitation.

This campaign appeared in 87 organizations—mostly in the United States—in October and November this year. The malware links were posing as industry job recruitment activity, gathering information to monitor for possible future exploitation, according to McAfee.

“This actor has used recruiting as a lure to collect information about targeted individuals of interest or organizations that manage data related to the industries of interest,” the McAfee report says.

The new malware campaign uses source code from a 2015 backdoor Trojan Duuzer malware campaign by Lazarus Group in a new framework to infiltrate these key industries.

Notorious cyber crime group Lazarus Group has been linked to last year’s WannaCry ransomware attacks and to cyber attacks at Sony Pictures and Bangladesh Bank.

“Operation Sharpshooter’s numerous technical links to the Lazarus Group seem too obvious to immediately draw the conclusion that they are responsible for the attacks, and instead indicate a potential for false flags,” said McAfee about the global cyber spy campaign it had discovered.

“We have not previously observed this implant. Based on our telemetry, we discovered that multiple victims from different industry sectors around the world have reported these indicators,” McAfee said.

“Was this attack just a first-stage reconnaissance operation, or will there be more? We will continue to monitor this campaign and will report further when we or others in the security industry receive more information.”

By Tsvetana Paraskova for Oilprice.com

More Top Reads From Oilprice.com:



Join the discussion | Back to homepage

Leave a comment

Leave a comment

Oilprice - The No. 1 Source for Oil & Energy News