Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Operation Corporate IoT Strontium

A state-sponsored attack group was discovered compromising IoT devices including a VOIP phone, an office printer, and a video decoder at multiple companies. The threat actor used the IoT devices to gain an initial foothold into the company and then used various tools and techniques to move across the network and establish persistence.
Name Modified Date Sources
Operation Corporate IoT Strontium 2019-08-07