Threat Landscape Dashboard - Campaigns

Assessing today's threats and the relationships between them

Top Campaigns

Campaign Description
Operation Luoxk The campaign performs a range of actions including performing DDOS attacks, the use of GHOST RAT for remote administration, crypto-mining using XMRig, and the use of malicious Android APKs. In 2018 the threat actors behind the operation started exploiting a flaw in the Oracle WebLogic Server component of Oracle Fusion Middleware to carry out the operation.
Operation FELIXROOT 2018 The campaign uses malicious Microsoft Word documents to take advantage of multiple flaws in Microsoft Office. The backdoor dropped on infected systems is capable of uploading/downloading files, stealing system information, and creating a remote shell. The current FELIXROOT backdoor uses documents that claim to contain information related to seminars and environmental protection.