“Cloud Hopper” Example Of Upstream Attack

There’s news today of a BAE/PWC report detailing a Chinese-based hacking group campaign dubbed “Operation Cloud Hopper”.

This operation is what’s known as an upstream attack, a method of compromise that we detailed in our State of Cyber Security 2017 report.

A stand-alone version of the (very informative) upstream attack article is now also available: The Weakest Link.

Source: https://labsblog.f-secure.com

Leave a Reply