Tuesday, May 6, 2025
HomeComputer SecurityOperation Sharpshooter - A New Global Campaign Targets Critical Infrastructure

Operation Sharpshooter – A New Global Campaign Targets Critical Infrastructure

Published on

SIEM as a Service

Follow Us on Google News

A new global campaign Operation Sharpshooter targeting critical infrastructure disguising as a job recruitment activity. 

Security researchers from McAfee uncovered the global campaign that targets nuclear, defense, energy, and financial companies.

Threat actors sends emails disguising as a job recruiter with a weaponized macro included Word document that runs a shellcode to inject Sharpshooter downloader into the memory of Word.

- Advertisement - Google News

The injected downloader will download two files Second-stage payload dubbed Rising Sun and Second OLE (Word) document. The payload downloaded to the startup folder to ensure persistance of the system.

Whereas the OLE document downloaded to %LOCALAPPDATA% and it is used to lure the malicious content.

Operation Sharpshooter

The Rising Sun implant is a fully functional modular backdoor that performs reconnaissance on the victim’s network. It collects the following information from the machine such as Network adapter Computer name, username, IP address information, Native system information and OS product name.

The configuration data encrypted with RC4 algorithm and the implact decodes it to establish connection with the control server.

After the initial reconnaissance the implant carries out Data encryption and exfiltration. Once it gathers the required data it encrypts with RC4 algorithm.

It also performs an additional layer of obfuscation by Base64-encoding the RC4 encrypted data.

The implant contains 14 backdoor capabilities

  • Execute commands
  • Get drive information
  • Launch process from Windows binary
  • Get processes information
  • Terminate process
  • Read file
  • Get file times
  • Clear process memory
  • Write file to disk
  • Delete file
  • Get additional file information for files in a directory
  • Connect to an IP address
  • Change file attributes
  • Variant of change file attributes

Between October and November 2018, the Rising Sun appeared in 87 organizations around the world and predominantly in the United States, according to McAfee telemetry analysis.

Operation Sharpshooter

Our discovery of this new, high-function implant is another example of how targeted attacks attempt to gain intelligence. The malware moves in several steps. We will continue to monitor this campaign to share their insights, attribution and who is responsible for Operation Sharpshooter.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Related Read

66 Million Users Personal Data Exposed From Unprotected MongoDB Database

Hackers Stolen 500 Million Guests Personal Information From Starwood Hotels Guest Reservation Database

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

BFDOOR Malware Targets Organizations to Establish Long-Term Persistence

The BPFDoor malware has emerged as a significant threat targeting domestic and international organizations,...

Uncovering the Security Risks of Data Exposure in AI-Powered Tools like Snowflake’s CORTEX

As artificial intelligence continues to reshape the technological landscape, tools like Snowflake’s CORTEX Search...

UNC3944 Hackers Shift from SIM Swapping to Ransomware and Data Extortion

UNC3944, a financially-motivated threat actor also linked to the group known as Scattered Spider,...

Over 2,800 Hacked Websites Targeting MacOS Users with AMOS Stealer Malware

Cybersecurity researcher has uncovered a massive malware campaign targeting MacOS users through approximately 2,800...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

BFDOOR Malware Targets Organizations to Establish Long-Term Persistence

The BPFDoor malware has emerged as a significant threat targeting domestic and international organizations,...

Uncovering the Security Risks of Data Exposure in AI-Powered Tools like Snowflake’s CORTEX

As artificial intelligence continues to reshape the technological landscape, tools like Snowflake’s CORTEX Search...

UNC3944 Hackers Shift from SIM Swapping to Ransomware and Data Extortion

UNC3944, a financially-motivated threat actor also linked to the group known as Scattered Spider,...