A targeted attack is one of the worst things that can happen to an organization. To have a dedicated group putting all their time and resources into breaking into a specific network—it’s a threat that could potentially cost the organization millions of dollars in damages, along with the perils that come with having operations-critical data being stolen or published online. Add to this the potential disasters that could result from public-facing systems being hacked into and controlled remotely through these same targeted attacks, and you’ve got a worst-case scenario that needs to be addressed.
Trend Micro and its engineers have been keeping track of targeted attacks—specifically, the groups that perform them—in order to provide not only clearer and more detailed information to potential victims, but also for protection. This latest paper, titled “The Spy Kittens are Back: Rocket Kitten 2” details the findings made so far about Rocket Kitten, a threat actor group famous for their activities with GHOLE Malware and Operation Woolen-Goldfish (as reported by Trend Micro last March). In the research paper, Trend Micro along with ClearSky, seeks to answer the following questions:
Get the full details and in-depth analysis in “The Spy Kittens are Back: Rocket Kitten 2”.
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.