Operation Sharpshooter was a global cyber espionage campaign that targeted nuclear, defense, government, energy, and financial companies, with many located in Germany, Turkey, the United Kingdom, and the United States. Security researchers noted the campaign shared many similarities with previous Lazarus Group operations, including fake job recruitment lures and shared malware code.[1][2][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1090 | 代理 |
For Operation Sharpshooter, the threat actors used the ExpressVPN service to hide their location.[2] |
|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
During Operation Sharpshooter, threat actors installed Rising Sun in the Startup folder and disguised it as |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
During Operation Sharpshooter, a first-stage downloader installed Rising Sun to |
| Enterprise | T1059 | .005 | 命令与脚本解释器: Visual Basic |
During Operation Sharpshooter, the threat actors used a VBA macro to execute a simple downloader that installed Rising Sun.[1] |
| Enterprise | T1584 | .004 | 基础设施妥协: Server |
For Operation Sharpshooter, the threat actors compromised a server they used as part of the campaign's infrastructure.[2] |
| Enterprise | T1587 | .001 | 开发能力: Malware |
For Operation Sharpshooter, the threat actors used the Rising Sun modular backdoor.[1] |
| Enterprise | T1608 | .001 | 暂存能力: Upload Malware |
For Operation Sharpshooter, the threat actors staged malicious files on Dropbox and other websites.[1] |
| Enterprise | T1106 | 本机API |
During Operation Sharpshooter, the first stage downloader resolved various Windows libraries and APIs, including |
|
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
During Operation Sharpshooter, the threat actors relied on victims executing malicious Microsoft Word or PDF files.[1] |
| Enterprise | T1583 | .006 | 获取基础设施: Web Services |
For Operation Sharpshooter, the threat actors used Dropbox to host lure documents and their first-stage downloader.[1] |
| Enterprise | T1105 | 输入工具传输 |
During Operation Sharpshooter, additional payloads were downloaded after a target was infected with a first-stage downloader.[1] |
|
| Enterprise | T1055 | 进程注入 |
During Operation Sharpshooter, threat actors leveraged embedded shellcode to inject a downloader into the memory of Word.[3] |
|
| Enterprise | T1559 | .002 | 进程间通信: Dynamic Data Exchange |
During Operation Sharpshooter, threat actors sent malicious Word OLE documents to victims.[1] |
| ID | Name | Description |
|---|---|---|
| S0448 | Rising Sun |
During the investigation of Operation Sharpshooter, security researchers identified Rising Sun in 87 organizations across the globe and subsequently discovered three variants.[1][2] |