Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Operation DNSpionage

The campaign targets government and private companies in the Middle East. The threat actors behind the operation use malicious Microsoft Office documents with embedded macros hosted on fake websites to infected users with malware intended to steal a range of sensitive information. The actors are also known to compromise DNS nameservers to redirect traffic to IP addresses under their control.
Name Modified Date Sources
Operation DNSpionage 2018-12-03