Threat Landscape Dashboard - Campaigns

Assessing today's threats and the relationships between them

Top 10 Campaigns

8.12

Operation Oilrig

Targeted attacks primarily focused on financial institutions and technology organizations within Saudi Arabia. Artifacts identified with ...

8.05

Operation BRONZE BUTLER

The campaign targets a wide range of verticals in Japan with the intent to steal confidential data. The group behind the operation is su ...

10.00

Operation FALLCHILL

The campaign infects systems with the FALLCHILL malware and uses multiple proxies to obfuscate network traffic. The goal of the attacks ...

10.00

Operation MuddyWater

The attacks targeted victims in the United States and the Middle East in an attempt to steal sensitive information. The group behind the ...

8.50

Operation Volgmer

The campaign uses the Volgmer malware to perform various task including stealing information about the compromised host as well as termi ...

7.75

Operation TRITON

The campaign targeted Triconex Safety Instrumented System (SIS) controllers at a critical infrastructure organization in the Middle East ...

10.00

Operation Dark Caracal

The campaign targets a wide range of sectors across the globe in an attempt to steal sensitive information. The operation uses trojanize ...

7.67

Operation HaoBao

The Bitcoin-stealing phishing campaign targets Bitcoin users and global financial organizations with malicious documents that pretend to ...

7.75

Operation Olympic Destroyer

The campaign was aimed at computer systems used in the 2018 Winter Olympics in an attempt to disrupt the games by destroying data. The o ...

7.56

Operation Gold Dragon

The campaign targets organizations involved with the 2018 Pyeongchang Olympics with malicious Microsoft Word documents. The operation us ...