OPERATION CLEAVER

16 COUNTRIES TARGETED

Since as early as 2012, Iranian malicious actors have directly attacked, established persistence in, and extracted highly sensitive materials from the networks of government agencies and major critical infrastructure companies in Canada, China, England, France, Germany, India, Israel, Kuwait, Mexico, Pakistan, Qatar, Saudi Arabia, South Korea, Turkey, United Arab Emirates, and the United States. As authorities begin to react to attacks in these countries, there is no doubt the list of companies, industries and nations coming under attack will continue to grow.

Read The Report

FUTURE-PROOF SECURITY

Operation Cleaver was first discovered by the Cylance® Professional Services team using Cylance products. If you’re interested in how your organization can be protected against Advanced Persistent Threat (APT) campaigns like those featured in our Operation Cleaver report, talk to a Cylance expert. With deep expertise in critical infrastructure security, we help Fortune 500’s and governments around the world protect themselves against tomorrow’s threats, today!

If you would like to contact us via encrypted email instead, please download our public PGP key and contact opcleaver@cylance.com for assistance.

  • ADDITIONAL RESOURCES

    If you'd like to contact the Cylance® team via encrypted email, download our public PGP key and send a message to opcleaver@cylance.com.
  • Type

    Key

  • PGP Key

    MD5:0fd37e7c9fe77ef66e72d4a93fb6823f

    Download Now
  • YARA Rules

    MD5:504833baaaccd32533c40d9798af463e

    Download Now
  • Press & Media Kit

    MD5:6a43cae4c1e6543888f8fe108950b960

    Download Now
  • Operation Cleaver Report

    MD5:daf635d46d23c41cc15ad67ed62e96c7 As of April 5, 2016

    Download Now