Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Campaigns
  3. Operation Sharpshooter

Operation Sharpshooter

Operation Sharpshooter was a global cyber espionage campaign that targeted nuclear, defense, government, energy, and financial companies, with many located in Germany, Turkey, the United Kingdom, and the United States. Security researchers noted the campaign shared many similarities with previousLazarus Group operations, including fake job recruitment lures and shared malware code.[1][2][3]

ID: C0013
First Seen: September 2017[3]
Last Seen: March 2019[3]
Version: 1.0
Created: 26 September 2022
Last Modified: 16 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1583.006Acquire Infrastructure:Web Services

ForOperation Sharpshooter, the threat actors used Dropbox to host lure documents and their first-stage downloader.[1]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

DuringOperation Sharpshooter, a first-stage downloader installedRising Sun to%Startup%\mssync.exe on a compromised host.[1]

EnterpriseT1059.005Command and Scripting Interpreter:Visual Basic

DuringOperation Sharpshooter, the threat actors used a VBA macro to execute a simple downloader that installedRising Sun.[1]

EnterpriseT1584.004Compromise Infrastructure:Server

ForOperation Sharpshooter, the threat actors compromised a server they used as part of the campaign's infrastructure.[2]

EnterpriseT1587.001Develop Capabilities:Malware

ForOperation Sharpshooter, the threat actors used theRising Sun modular backdoor.[1]

EnterpriseT1105Ingress Tool Transfer

DuringOperation Sharpshooter, additional payloads were downloaded after a target was infected with a first-stage downloader.[1]

EnterpriseT1559.002Inter-Process Communication:Dynamic Data Exchange

DuringOperation Sharpshooter, threat actors sent malicious Word OLE documents to victims.[1]

EnterpriseT1036.005Masquerading:Match Legitimate Resource Name or Location

DuringOperation Sharpshooter, threat actors installedRising Sun in the Startup folder and disguised it asmssync.exe.[1]

EnterpriseT1106Native API

DuringOperation Sharpshooter, the first stage downloader resolved various Windows libraries and APIs, includingLoadLibraryA(),GetProcAddress(), andCreateProcessA().[1]

EnterpriseT1055Process Injection

DuringOperation Sharpshooter, threat actors leveraged embedded shellcode to inject a downloader into the memory of Word.[3]

EnterpriseT1090Proxy

ForOperation Sharpshooter, the threat actors used the ExpressVPN service to hide their location.[2]

EnterpriseT1608.001Stage Capabilities:Upload Malware

ForOperation Sharpshooter, the threat actors staged malicious files on Dropbox and other websites.[1]

EnterpriseT1204.002User Execution:Malicious File

DuringOperation Sharpshooter, the threat actors relied on victims executing malicious Microsoft Word or PDF files.[1]

Software

IDNameDescription
S0448 Rising Sun

During the investigation ofOperation Sharpshooter, security researchers identifiedRising Sun in 87 organizations across the globe and subsequently discovered three variants.[1][2]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp