Operation BugDrop
Description
(CyberX) CyberX has discovered a new, large-scale cyber-reconnaissance operation targeting a broad range of targets in the Ukraine. Because it eavesdrops on sensitive conversations by remotely controlling PC microphones – in order to surreptitiously “bug” its targets – and uses Dropbox to store exfiltrated data, CyberX has named it “Operation BugDrop.”
CyberX has confirmed at least 70 victims successfully targeted by the operation in a range of sectors including critical infrastructure, media, and scientific research. The operation seeks to capture a range of sensitive information from its targets including audio recordings of conversations, screen shots, documents and passwords. Unlike video recordings, which are often blocked by users simply placing tape over the camera lens, it is virtually impossible to block your computer’s microphone without physically accessing and disabling the PC hardware.
Names
Name | Name-Giver |
---|---|
Operation BugDrop | CyberX |
Country
Motivation
- Information theft and espionage
First Seen
2016
Observed Sectors
Observed Countries
Tools
Information
Other Information
Uuid
8b35e530-5e59-422e-a002-dda41046f5aa
Last Card Change
2020-04-14