Threat Alert: OPM Tools
ByCheck Point Threat Intelligence & Research Team
EXECUTIVE SUMMARY -The breach in the U.S. Office of Personnel Management (OPM) had compromised the personal information of millions of Americans. -There were two attacks by suspected Chinese hackers on personnel data and applications for security clearances. -The massive data breach is now believed to have affected well over 10 million separate users. -This alert lists the tools used in these attacks as well as Check Point coverage for these tools. DESCRIPTION FBI Alert Summary
- The FBI has obtained information regarding cyber actors who have compromised and stolen sensitive business information and Personally Identifiable Information (PII).
- Information obtained from victims indicates that PII was a priority target. The FBI notes that stolen PII has been used in other instances to target or otherwise facilitate various malicious activities such as financial fraud though the FBI is not aware of such activity by these groups.
- Any activity related to these groups detected on a network should be considered an indication of a compromise requiring extensive mitigation.
Technical Details
- Groups responsible for these activities have been observed across a variety of intrusions leveraging a diverse selection of tools and techniques to attempt to gain initial access to a victim, including using credentials acquired during previous intrusions. These groups have also been observed compromising using the technique of DNS hijacking facilitated through the compromise of DNS registrars.
- The Remote Access Tools (RAT) used in those attacks include: Sakula, FF RAT, Trojan.IsSpace and Trojan.BLT.
CHECK POINT COVERAGE Check Point protects its customers from these tools with the Anti Bot and Anti-Virus blades, which include relevant signatures and indicators, among them:
- Trojan.Win32.Sakula.*
- Trojan.Win32.BLT.*
REFERENCES
You may also like
Global Cyber Attacks Increase in November 2025 Driven by Ransomware Surge and GenAI Risks
In November 2025, global cyber activity continued its upward trend, ...
40,000 Phishing Emails Disguised as SharePoint and and e-Signing Services: A New Wave of Finance-Themed Scams
The hyperconnected world has made it easier than ever for ...
Cyber Threats to the U.S.: What Policymakers Need to Know for 2026
Cyber attacks against the United States are no longer isolated ...
Shai-Hulud 2.0: Inside The Second Coming, the Most Aggressive NPM Supply Chain Attack of 2025
How attackers infiltrated the npm ecosystem, what Check Point researchers ...



