According to sources, the victim faced cyber intrusions starting in 2009, with the deployment of the Hydraq (Aurora) Trojan horse being a prominent method. Over the subsequent years, the attackers systematically exploited several zero-day vulnerabilities, notably on Adobe and Microsoft products (CVE-2012-0779, CVE-2012-1875, CVE-2012-1889 and CVE-2012-1535). The Tactics, Techniques, and Procedures (TTPs) of the attacks seem to correspond with activities reputed of a group associated with the "Elderwood Platform." Furthermore, there was a noticeable shift in their methods, with an increase in "watering hole" techniques, compromising specific websites expected to be visited by targets.
The repercussions of these incidents for the victim could be multifaceted. Operational disturbances might have arisen due to the deployment of the mentioned zero-day vulnerabilities, potentially jeopardizing sensitive intellectual property. These intrusions might have also facilitated unauthorized access to top-tier defense contractors by using the victim as an intermediary. Given the escalated use of "watering hole" attacks, a vast amount of data may have been at risk, though the specifics on the type and extent of data remain uncertain.