Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Operation BlackWater

The campaign used trojanized documents attached to phishing emails to steal sensitive information from victims located in the Middle East. The malicious software triggered a PowerShell script after the victim enabled macros. A range of data from the infected host is collected including detailed system information, ip addresses, and usernames.
Name Modified Date Sources
Operation BlackWater 2019-05-28