• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Operation Pawn Storm

Update on Pawn Storm: New Targets and Politically Motivated Campaigns

  • Posted on:January 12, 2018 at 5:00 am
  • Posted in:Targeted Attacks
  • Author:
    Feike Hacquebord (Senior Threat Researcher)
0

The active espionage actor group Pawn Storm didn’t shy away from continuing their brazen attacks in the second half of 2017. Pawn Storm’s attacks usually are not isolated incidents. We can often relate them to earlier attacks by carefully looking at the technical indicators and motives.

Read More
Tags: Operation Pawn StormPawn Storm

Operation Pawn Storm Ramps Up its Activities; Targets NATO, White House

  • Posted on:April 16, 2015 at 5:11 am
  • Posted in:Malware, Targeted Attacks
  • Author:
    Feike Hacquebord (Senior Threat Researcher)
3

Long-running APT campaign Operation Pawn Storm has begun the year with a bang, introducing new infrastructure and zeroing in on targets including North Atlantic Treaty Organization (NATO) members and even the White House. This is according to the latest intelligence gleaned from Trend Micro’s ongoing research into the attack group, and comes as a follow-up…

Read More
Tags: NATOOperation Pawn StormSEDNITWhite House

Pawn Storm Update: iOS Espionage App Found

  • Posted on:February 4, 2015 at 12:00 am
  • Posted in:Malware, Targeted Attacks
  • Author:
    Lambert Sun, Brooks Hong (Mobile Threat Analysts), Feike Hacquebord (Senior Threat Researcher)
13

In our continued research on Operation Pawn Storm, we found one interesting poisoned pawn—spyware specifically designed for espionage on iOS devices. While spyware targeting Apple users is highly notable by itself, this particular spyware is also involved in a targeted attack. Trend Micro™ Mobile Security detects and removes this threat. Download the app from the App…

Read More
Tags: AppleiOSMalwareOperation Pawn StormPawn Stormtargeted attacks

Operation Pawn Storm: Putting Outlook Web Access Users at Risk

  • Posted on:October 24, 2014 at 7:04 am
  • Posted in:Bad Sites, Targeted Attacks
  • Author:
    Feike Hacquebord (Senior Threat Researcher)
1

In our recently released report, Operation Pawn Storm, we talked about an operation that involved three attack scenarios. For this post, we will talk about the third scenario: phishing emails that redirect victims to fake Outlook Web Access login pages. What’s most notable about this is that it is simple, effective, and can be easily replicated. Through one…

Read More
Tags: APTMicrosoft Outlook Web AccessOperation Pawn StormOWAphishingTargeted Attack

Operation Pawn Storm: The Red in SEDNIT

  • Posted on:October 22, 2014 at 3:41 am
  • Posted in:Malware, Targeted Attacks
  • Author:
    Jim Gogolinski (Senior Threat Researcher)
0

Pawn Storm is an active economic and political cyber-espionage operation targeting a wide range of entities, mostly those related to the military, governments, and media. Specific targets include: Military agencies, embassies, and defense contractors in the US and its allies Opposition politicians and dissidents of the Russian government International media The national security department of a US…

Read More
Tags: APTOperation Pawn StormRussiaSEDNITTargeted AttackUS

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.