Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Operation Outlook Backdoor

The campaign was discovered in 2018 and does not use command and control servers to interact with the remote access Trojan installed on the victim but instead uses malicious PDF documents which are transmitted via email. The threat actors have used the backdoor since at least 2013 to stay under the radar in an attempt to steal sensitive information. The attacks are able to go unnoticed by interacting with Microsoft Outlook using the Messaging Application Programming Interface (MAPI).
Name Modified Date Sources
Operation Outlook Backdoor 2018-09-26