Analysis of the server revealed links to North Korea’s Lazarus Group

Analysis of the server revealed links to North Korea’s Lazarus Group

Analysis of a command-and-control (C2) server awarded to researchers by law enforcement after seizure has provided valuable information on the threat actors behind a global hacking campaign.

Dubbed “Operation Sharpshooter” by McAfee cybersecurity researchers, the campaign was first uncovered in December 2018.

Operation Sharpshooter targets government departments, telecoms, energy, defense, and other organizations worldwide. The attack wave predominantly focuses on targets in the United States, but victims in areas including Russia, the UK, Australia, and other English-speaking countries have also been traced.

By  Charlie Osborne

To read the full article click here.

Facebooktwittergoogle_plusredditlinkedinmail