The document summarizes a cyberespionage campaign called "Dragonfly" that targeted energy companies, mainly in Europe and the US, from 2011 onward. The attackers initially focused on defense and aviation firms before shifting to energy in 2013. They used spear phishing emails, watering hole attacks exploiting legitimate websites, and compromising software updates to install Backdoor.Oldrea and Trojan.Karagany malware. Analysis of the malware compilers suggests the attackers worked mostly Monday-Friday 9am-6pm in the UTC+4 time zone.