{"id":9475,"date":"2015-06-19T06:00:37","date_gmt":"2015-06-19T13:00:37","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9475"},"modified":"2015-06-18T12:55:58","modified_gmt":"2015-06-18T19:55:58","slug":"watch-details-from-unit-42-on-operation-lotus-blossom","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/06\/watch-details-from-unit-42-on-operation-lotus-blossom\/","title":{"rendered":"Watch: Details from Unit 42 on Operation Lotus Blossom"},"content":{"rendered":"<p class=\"p1\">Scott Simkin, Senior Manager of Palo Alto Networks Threat Intelligence, discusses details from Unit 42\u2019s latest discovery, Operation Lotus Blossom.<\/p>\n<p class=\"p1\">Relying heavily on the use of spearphishing emails, this cyber espionage campaign targeted government and military organizations in Southeast Asia, and involved more than 50 different attacks over the past three years. Watch to find out more about the Lotus Blossom attacks and how Unit 42 discovered the campaign.<!--more--><\/p>\n<p><div class=\"styleIt\" style=\"width:500px;height:281px;\"><lite-youtube videoid=\"cqpYdxdR4BU\" ><\/lite-youtube><\/div><\/p>\n<p>More info:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/06\/operation-lotus-blossom\/\" target=\"_blank\">Read the Unit 42 research blog post<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/research\/unit42-operation-lotus-blossom.html\" target=\"_blank\">Download the full report<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/06\/infographic-operation-lotus-blossom-in-action\/\" target=\"_blank\">Check out the infographic to see the basic characteristics of the attacks<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/threat-research.html\" target=\"_blank\">Subscribe to Unit 42 alerts so you never miss new research<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Scott Simkin, Senior Manager of Palo Alto Networks Threat Intelligence, discusses details from Unit 42\u2019s latest discovery, Operation Lotus Blossom. Relying heavily on the use of spearphishing emails, this cyber espionage campaign &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[131,108],"tags":[1132,120,1241,69],"coauthors":[709],"class_list":["post-9475","post","type-post","status-publish","format-standard","hentry","category-malware-2","category-threat-prevention-2","tag-autofocus","tag-cybersecurity","tag-lotus-blossom","tag-wildfire"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9475"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9475\/revisions"}],"predecessor-version":[{"id":9478,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9475\/revisions\/9478"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9475"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}