LevelBlue - Open Threat Exchange By jackl3-3 Archived: 2026-04-05 13:52:05 UTC https://otx.alienvault.com/browse/pulses?q=tag:GSecDump Page 1 of 4 83 Subscribers https://otx.alienvault.com/browse/pulses?q=tag:GSecDump Page 2 of 4 Threat Research | FireEye Inc Find out more about FireEye.com, the world's leading cyber security company, which provides security services to more than 1.5 million customers across the globe, and offers a wide range of products and services. https://otx.alienvault.com/browse/pulses?q=tag:GSecDump Page 3 of 4 17 Subscribers Operation Iron Tiger CVE: 1 | FileHash-SHA1: 26 | FileHash-SHA256: 7 | URL: 1 | YARA: 25 | Domain: 1 | Hostname: 4 Key individuals, who are believed to be part of a China-based attack group, have been stealing years of valuable government and corporate information from defense and high technology organizations in the US since 2013 and political and government-related entities in China, Hong Kong, and the Philippines since 2010. This shift in targets is highly notable for the active cyber espionage operation we dubbed as “Operation Iron Tiger.” We believe that the threat actors have simply moved up in the food chain and were assigned new, high-level targets to spy on– all as part of a bigger espionage campaign. US defense contractors were only fairly recent targets based on the operation’s history, which we traced to spear-phishing in 2010. “Foreign policy,” “future of the US Army Officer Corps,” and “economic development” are only a few of the keywords that threat actors have been using in spear-phishing attacks against directors and project managers of technology-inclined US government contractors. 373,911 Subscribers Source: https://otx.alienvault.com/browse/pulses?q=tag:GSecDump https://otx.alienvault.com/browse/pulses?q=tag:GSecDump Page 4 of 4