Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Operation Nodersok

The attack campaign used various legitimate tools including PowerShell, Node.exe, WinDivert, and MSHTA to attack a range of sectors across the United States and Europe. The threat group behind the operation intended to stay under the radar of security tools by never writing their malicious software to disk and only encrypting, decrypting, and running the malware in memory.
Name Modified Date Sources
Operation Nodersok 2019-10-16