• 3 minutes War for Taiwan?
  • 7 minutes How China Is Racing To Expand Its Global Energy Influence
  • 10 minutes Is it time to talk about Hydrogen?
  • 11 mins U.S. Presidential Elections Status - Electoral Votes
  • 15 mins “Cushing Oil Inventories Are Soaring Again” By Tsvetana Paraskova
  • 2 days Supreme Court rules against Cuomo's coronavirus limits
  • 3 hours “Did Authorities Do Enough To Find Out Why Oil Prices Went Negative?” By Irina Slav – Nov 26th
  • 2 hours WTI / ​​​​​​​Price Forecasting 
  • 1 day Biden's Green New Deal- Short Term - How Will He Start to Transition Out Of Crude?
  • 1 day America Could Go Fully Electric Right Now
  • 2 days Saudi Arabia Seeks to Become Top Hydrogen Exporter
  • 1 day Mail IN Ballot Fraud

Breaking News:

Volkswagen Readies Compact EV For 2023

Operation ‘Sharpshooter’ Targets Energy, Defense Firms

A new global cyber threat campaign has recently infiltrated dozens of energy, defense, nuclear, and financial companies around the world, using malware to extract and exploit data from these organizations in a campaign McAfee has dubbed ‘Operation Sharpshooter’.

The McAfee Advanced Threat Research team and McAfee Labs Malware Operations Group say that they have discovered that this new global campaign uses an in-memory implant to download and retrieve a second-stage implant—which McAfee calls Rising Sun—for further exploitation.

This campaign appeared in 87 organizations—mostly in the United States—in October and November this year. The malware links were posing as industry job recruitment activity, gathering information to monitor for possible future exploitation, according to McAfee.

“This actor has used recruiting as a lure to collect information about targeted individuals of interest or organizations that manage data related to the industries of interest,” the McAfee report says.

The new malware campaign uses source code from a 2015 backdoor Trojan Duuzer malware campaign by Lazarus Group in a new framework to infiltrate these key industries.

Notorious cyber crime group Lazarus Group has been linked to last year’s WannaCry ransomware attacks and to cyber attacks at Sony Pictures and Bangladesh Bank.

“Operation Sharpshooter’s numerous technical links to the Lazarus Group seem too obvious to immediately draw the conclusion that they are responsible for the attacks, and instead indicate a potential for false flags,” said McAfee about the global cyber spy campaign it had discovered.

“We have not previously observed this implant. Based on our telemetry, we discovered that multiple victims from different industry sectors around the world have reported these indicators,” McAfee said.

“Was this attack just a first-stage reconnaissance operation, or will there be more? We will continue to monitor this campaign and will report further when we or others in the security industry receive more information.”

By Tsvetana Paraskova for Oilprice.com

More Top Reads From Oilprice.com:



Join the discussion | Back to homepage



Leave a comment

Leave a comment

Oilprice - The No. 1 Source for Oil & Energy News