Operation Cleaver, as labelled in a report by American firm Cylance Inc. in late 2014, was a cyberwarfarecovert operation targeting critical infrastructure organizations worldwide, allegedly planned and executed by Iran.
Cylance's report was later tacitly acknowledged in a confidential report by Federal Bureau of Investigation (FBI), though Iranian officials denied involvement in the operation.[1]
Cylance report
In December 2014, California-based cyber security firm Cylance Inc. published results of a 2-year investigation,[2] an 86-page technical report, indicating that an operation, called "Operation Cleaver", has targeted the military, oil and gas, energy and utilities, transportation, airlines, airports, hospitals and aerospace industries organizations worldwide.[3]
The title "Operation Cleaver" alludes to frequent uses of the word "cleaver" in the malware's coding.[4]
According to Reuters, the Federal Bureau of Investigation has filed a confidential "Flash" report, providing technical details about malicious software and techniques used in the attacks. The technical document said the hackers typically launch their attacks from two IP addresses that are in Iran, but does not attribute the attacks to the Iranian government.[5] FBI warned businesses to stay vigilant and to report any suspicious activity spotted on the companies' computer systems.[3]
This article uses material from the Wikipedia article Operation_Cleaver, and is written by contributors.
Text is available under a CC BY-SA 4.0 International License; additional terms may apply. Images, videos and audio are available under their respective licenses.