Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Operation Business As Usual

Multiple cyber espionage campaigns attributed to the MuddyWater threat actor were discovered in 2019 and early 2020. The operation used spear-phishing emails with malicious attachments or links and targeted government agencies in multiple countries including Turkey, Jordan, Iraq, Georgia, and Azerbaijan. For persistence and defense evasion the threat actor used various techniques including obfuscation, scripting, registry modifications, and PowerShell.
Name Modified Date Sources
Operation Business As Usual 2020-03-18