Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Operation Luoxk

The campaign performs a range of actions including performing DDOS attacks, the use of GHOST RAT for remote administration, crypto-mining using XMRig, and the use of malicious Android APKs. In 2018 the threat actors behind the operation started exploiting a flaw in the Oracle WebLogic Server component of Oracle Fusion Middleware to carry out the operation.
Name Modified Date Sources
Operation Luoxk 2018-08-28