![Operation "TooHash": how targeted attacks work](https://www.gdatasoftware.com/typo3conf/ext/gd_sites/Resources/Public/Images/content-elements/blog-background-free.jpg)
Operation "TooHash": how targeted attacks work
The experts of G DATA’s SecurityLabs discovered a cyber-espionage campaign that perfectly exemplifies the way how targeted attacks work. The purpose of this campaign was to steal valuable documents from the targeted entity. We entitle this operation “TooHash”.