Operation Lotus Blossom

Persistent Cyber Espionage Campaign Targets Southeast Asian Government and Military Networks

It appears that your browser does not support viewing PDF's inline, please click the download button to view it.

Get Updates

Sign up to receive the latest news, research, and reports from Unit 42.



Recommended Resources

Application Usage and Threat Report

The AUTR provides visibility into the real-world threat and application landscape, helping security teams to understand how adversaries are attempting to attack organizations around the world and build proactive, actionable controls. Built by the Unit 42 threat research team, the report correlates data from more than 7,000 enterprise organizations, providing broad visibility into critical trends.

Santa Clara
  • 29
  • 7416

Unit 42 Report - Ransomware: Unlocking the Lucrative Criminal Business Model

Download the report to learn about the rise of ransomware, how adversaries are refining and improving their tactics, and what you can do to better defend your organization against them.

Santa Clara, CA, USA
  • 1
  • 8050

BackStab: Mobile Backup Data Under Attack From Malware

Unit 42 has recently identified malware exploiting an attack technique we have named “BackStab,” in which attackers can capture private information from backup files stored on a Windows PC or Macintosh. Under default conditions, iOS devices plugged into a computer running iTunes may create an unencrypted backup file that contains many types of private information. Forensics experts have known about these backups for years and have used them to capture phone data without requiring direct access to the phone. We have found that malicious attackers are now using malware to steal data using this same technique.

Santa Clara, CA
  • 27
  • 1410

SILVERTERRIER: The Next Evolution in Nigerian Cybercrime

Unit 42 tracks Nigerian Threat Actors and finds they’ve evolved into capable and formidable adversaries successfully attacking major companies and governments.

  • 0
  • 595

How To (Effectively) Prevent Ransomware Infections

Today’s security deployments are quickly becoming unmanageable. Multiple user interfaces, too many security policies, and mountains of data from many different sources create the complexity of today’s cyber security environment. Combined with the global shortage of security personnel this situation calls for streamlined management solutions that empower network security administrators to do more with less.

  • 2
  • 1008