Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Operation AppleJeus Sequel

The Lazarus group targeted the financial sector in the United Kingdom, Poland, Russia, and China with malicious software to steal digital assets from their victims. The threat actor used both Windows and MacIntosh malware in their attacks and pushed the poisonous code through fake websites and Telegram messenger. To stay under the radar the group used multiple command and control channels, obfuscation, masquerading, and data encryption.
Name Modified Date Sources
Operation AppleJeus Sequel 2020-04-22