Anonymous ID: 5782f9 June 24, 2020, 11:03 p.m. No.9739798   🗄️.is 🔗kun   >>9862 >>0013 >>0109 >>0205 >>0266 >>0297

Operation Dragonfly Analysis Suggests Links to Earlier Attacks

 

By Christiaan Beek and Raj Samani on Dec 17, 2017

On September 6, Symantec published details of the Dragonfly campaign, which targeted dozens of energy companies throughout 2017. This attack was effectively Dragonfly 2.0, an update to a campaign that began in 2014.

 

Moving beyond our 2014 analysis of Dragonfly, our current focus looks at the attack’s indicators to determine whether we can glean any further information regarding the source and possible motivations of those behind the campaign. The campaign targets energy companies around the world by leveraging spear-phishing emails that, once successful, allow the attackers to download Trojan software. The Trojans provide access to the victims’ systems and networks

 

https://www.mcafee.com/blogs/other-blogs/mcafee-labs/operation-dragonfly-analysis-suggests-links-to-earlier-attacks/