The Mirage campaign
Jump to navigation
Jump to search
(Publication) Google search: [1]
The Mirage campaign | |
---|---|
![]() | |
Botnet | Mirage |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-09-18 |
Editor/Conference | DELL SecureWorks |
Link | http://www.secureworks.com/cyber-threat-intelligence/threats/the-mirage-campaign/ (Archive copy) |
Author | Silas Cutler |
Type | Blogpost |
Abstract
“ Since April 2012, the Dell SecureWorks Counter Threat Unit™ (CTU) research team has been tracking a cyber espionage campaign that uses a remote access trojan (RAT) named Mirage (also known as MirageFox). This ongoing attack has targeted a high-profile oil company in the Phillipines, a military organization in Taiwan, an energy company in Canada, and several as yet unidentified entities in Brazil, Israel, Egypt and Nigeria.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1305, editor = {DELL SecureWorks}, author = {Silas Cutler}, title = {The Mirage campaign}, date = {18}, month = Sep, year = {2012}, howpublished = {\url{http://www.secureworks.com/cyber-threat-intelligence/threats/the-mirage-campaign/}}, }