A global phishing campaign called Operation Sharpshooter was discovered using fake job recruitment documents to infect defense, government and critical infrastructure organizations with a malicious backdoor implant, presumably for cyber espionage purposes.
The implant, nicknamed Rising Sun, was observed in least 87 impacted organizations over the course of October and November, McAfee Labs reported today in both a blog post and analysis report that detailed findings from its Advanced Threat Research team. Additional targeted sectors included finance, government, healthcare, telecommunications and more.
Described by McAfee as a "fully functional modular backdoor," Rising Sun communicates with its C2 server via HTTP POST requests. It possesses 14 distinct backdoor capabilities, including gathering, encrypting and exfiltrating host data; terminating processes; reading, writing and deleting files; connecting to an IP address and changing file attributes.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.