1
The campaign likely has support from a country with interests in Southeast Asia. THE ATTACK USES A UNIQUE TROJAN, DEVELOPED BY LOTUS BLOSSOM, CALLED ELISE. MORE THAN 50 INDIVIDUAL ATTACKS OVER THREE YEARS This unique characteristic suggests a high degree of sophistication, resources, and time spent to develop a custom toolkit. OPERATION LOTUS BLOSSOM: A NEW NATION STATE CYBERTHREAT? VIEW THE FULL REPORT Unit 42 discovered this attack using the Palo Alto Networks AutoFocus service. Palo Alto Networks customers are protected from the malware used in Operation Lotus Blossom via WildFire and Threat Prevention tools (IPS signature 14358). VIETNAM HONG KONG INDONESIA PHILIPPINES TAIWAN THE ACTOR IS LIKELY STATE-SPONSORED AND MAY BE SEEKING A POLITICAL AND MILITARY ADVANTAGE.

Lotus blossom infographic

Embed Size (px)

Citation preview

The campaign likely has support from a country with interests in Southeast Asia.

THE ATTACK USES A UNIQUE TROJAN, DEVELOPED BY LOTUS BLOSSOM, CALLED ELISE.

MORE THAN 50 INDIVIDUAL ATTACKS OVER THREE YEARS

This unique characteristic suggests a high degree of sophistication, resources, and time spent to develop a custom toolkit.

OPERATION LOTUS BLOSSOM: A NEW NATION STATE CYBERTHREAT?

VIEW THE FULL REPORT

Unit 42 discovered this attack using the Palo Alto Networks AutoFocus service. Palo Alto Networks customers are protected from the malware used in Operation Lotus Blossom via WildFire and Threat Prevention tools (IPS signature 14358).

VIETNAM

HONG KONG

INDONESIA

PHILIPPINES

TAIWAN

THE ACTOR IS LIKELY STATE-SPONSORED AND MAY BE SEEKING A POLITICAL AND MILITARY ADVANTAGE.