IRVINE, Calif., Feb. 23, 2016 /PRNewswire/ -- Cylance SPEAR™ team, the security research arm of Cylance, today released a report titled "Operation Dust Storm," which reveals a multi-year, multi-attack campaign against Japanese commercial interests and critical infrastructure. The research uncovers how a well-organized and well-funded threat group, likely associated with a nation/state, has used a variety of attack vectors and techniques to infiltrate and gather sensitive information from companies in electric utilities, oil and gas, finance, transportation and construction.
"Since 2010, a threat group with considerable resources has been using various exploits to attack commercial interests around the globe, with a specific focus on Japan," said Jon Miller, vice president of strategy, Cylance. "Whereas early activity by the group showed less sophistication and a broader set of targets, SPEAR's current research indicates the group's present focus has shifted specifically and exclusively to Japanese companies or Japanese subdivisions of larger foreign organizations. The group has also shown an ability to exploit Android-based mobile devices, illustrating that these types of attacks are more prevalent in the mobile-centric business cultures in Asia. The campaign continues to this day."
Specific findings of Operation Dust Storm include:
The full Operation Dust Storm report can be downloaded here and includes more detail on the types of attacks, targets and a complete timeline of attacks between 2010 and 2015. Future Cylance SPEAR research focused specifically on the mobile-based attacks covered in Operation Dust Storm will be released later this year. Through Cylance research and analysis work, previously undocumented attacks indicate that this activity is directed by one threat actor or entity, and there is undoubtedly more to discover. Cylance analysis is ongoing and there will be more updates as new aspects and new attacks are uncovered.
About Cylance Inc.
Cylance is the only company to offer a preventive cybersecurity solution that stops advanced threats and malware at the most vulnerable point: the endpoint. Applying a revolutionary artificial intelligence approach, the Cylance endpoint security solution, CylancePROTECT®, analyzes the DNA of code prior to its execution on the endpoint to find and prevent threats others can't, while using a fraction of the system resources associated with endpoint anti-virus and detect and respond solutions that are deployed in enterprises today. For more information visit www.cylance.com.
For More Information
Cylance press releases and news
Cylance events and Unbelievable Tour dates
Social Networks:
Website: www.cylance.com
Blog: blog.cylance.com
Twitter: www.twitter.com/cylanceinc
LinkedIn: http://www.linkedin.com/company/cylanceinc
YouTube: www.youtube.com/cylanceinc
Press and Media Contacts
Cylance Inc.
Cynthia Siemens
Director, PR and Communications
+1(949) 242-9221
csiemens@cylance.com
United States
Jill Gerig
InkHouse PR
+1(916) 215-3286
cylance@inkhouse.com
International
Hannah Whitrow
Zonic Group
+44 (0)1672 550126
Logo - http://photos.prnasia.com/prnh/20160223/8521601158LOGO