Invitation to Computer Science 8th Edition

Published by Cengage Learning
ISBN 10: 1337561916
ISBN 13: 978-1-33756-191-4

Chapter 8 - Exercises - Page 428: 9e

Answer

Yes, the tools and techniques used within this operation fit the category of cyber malware.

Work Step by Step

Operation Cleaver is an elaborate cyber espionage campaign uncovered in 2014 and reportedly orchestrated by Iranian state-sponsored actors. The attackers targeted organizations in the military, oil and gas, energy, transportation, and aerospace industries in over 50 entities across 16 countries. They used spear-phishing emails with malicious attachments to gain unauthorized access to systems and exploit software vulnerabilities to steal sensitive information. The specific tools and methods employed are types of cyber malware.
Update this answer!

You can help us out by revising, improving and updating this answer.

Update this answer

After you claim an answer you’ll have 24 hours to send in a draft. An editor will review the submission and either publish your submission or provide feedback.