Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Operation TRITON 2019

The attackers behind the campaign updated their custom tools and tactics to attack a critical infrastructure company in an attempt to steal credentials, install backdoors, escalate privileges, and move laterally across the IT and OT networks. The threat actors used custom tools including SecHack, NetExec, Cryptcat, and PLINK to carry out their operation.
Name Modified Date Sources
Operation TRITON 2019 2019-04-25