Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Operation LightNeuron

The campaign targets Microsoft Exchange servers to install a custom backdoor labeled "LightNeuron." The malware can perform several tasks including spying, modifying, and deleting incoming and outgoing email. The commands used in the attack are hidden in PDF or JPG attachments using steganography. The malicious software can also be used as a backdoor to add, delete, and copy files and execute process’s and executable's.
Name Modified Date Sources
Operation LightNeuron 2019-05-20