Operation Lotus Blossom

Persistent Cyber Espionage Campaign Targets Southeast Asian Government and Military Networks

It appears that your browser does not support viewing PDF's inline, please click the download button to view it.

Get Updates

Sign up to receive the latest news, research, and reports from Unit 42.



Recommended Resources

Unit 42 Report - Ransomware: Unlocking the Lucrative Criminal Business Model

Ransomware, specifically cryptographic ransomware, has quickly become one of the greatest cyberthreats facing organizations around the world. This criminal business model has proven to be highly effective in generating revenue for cyber adversaries in addition to causing significant operational impact to affected organizations. It is largely victim agnostic, spanning the globe and affecting all major industry verticals. Small organizations, large enterprises, individual home users – all are potential targets.

Santa Clara, CA, USA
  • 0
  • 7464

Application Usage and Threat Report

The AUTR provides visibility into the real-world threat and application landscape, helping security teams to understand how adversaries are attempting to attack organizations around the world and build proactive, actionable controls. Built by the Unit 42 threat research team, the report correlates data from more than 7,000 enterprise organizations, providing broad visibility into critical trends.

Santa Clara
  • 29
  • 6591

SILVERTERRIER: The Next Evolution in Nigerian Cybercrime

Unit 42 tracks Nigerian Threat Actors and finds they’ve evolved into capable and formidable adversaries successfully attacking major companies and governments.

  • 0
  • 450

How To (Effectively) Prevent Ransomware Infections

Today’s security deployments are quickly becoming unmanageable. Multiple user interfaces, too many security policies, and mountains of data from many different sources create the complexity of today’s cyber security environment. Combined with the global shortage of security personnel this situation calls for streamlined management solutions that empower network security administrators to do more with less.

  • 1
  • 931

BackStab: Mobile Backup Data Under Attack From Malware

Unit 42 has recently identified malware exploiting an attack technique we have named “BackStab,” in which attackers can capture private information from backup files stored on a Windows PC or Macintosh. Under default conditions, iOS devices plugged into a computer running iTunes may create an unencrypted backup file that contains many types of private information. Forensics experts have known about these backups for years and have used them to capture phone data without requiring direct access to the phone. We have found that malicious attackers are now using malware to steal data using this same technique.

Santa Clara, CA
  • 27
  • 1143