APT & Cybercriminals Campaign Collection
This is collections of APT and cybercriminals campaign. Please fire issue to me if any lost APT/Malware events/campaigns.
URL to PDF Tool
Reference Resources
2022
- Dec 07 - [Google] Internet Explorer 0-day exploited by North Korean actor APT37 |
๐ - Dec 06 - [BlackBerry] Mustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets |
๐ - Dec 05 - [Recorded Future] Exposing TAG-53โs Credential Harvesting Infrastructure Used for Russia-Aligned Espionage Operations |
๐ - Dec 02 - [Palo Alto Networks] Blowing Cobalt Strike Out of the Water With Memory Analysis |
๐ - Nov 02 - [BlackBerry] RomCom Threat Actor Abuses KeePass and SolarWinds to Target Ukraine and Potentially the United Kingdom |
๐ - Oct 06 - [BlackBerry] Mustang Panda Abuses Legitimate Apps to Target Myanmar Based Victims |
๐ - Oct 04 - [Trend Micro] The Rise of Earth Aughisky |
๐ - Sep 28 - [NSOGroup] Exploit-archaeology-a-forensic-history-of-in-the-wild |
๐ - Sep 28 - [Recorded Future] The Chinese Communist Partyโs Strategy for Targeted Propaganda |
๐ - Sep 08 - [Secureworks] BRONZE PRESIDENT Targets Government Officials |
๐ - Aug 12 - [SEKOIA.IO] LuckyMouse uses a backdoored Electron app to target MacOS |
๐ - Aug 12 - [Trend Micro] Iron Tiger Compromises Chat Application Mimi, Targets Windows, Mac, and Linux Users |
๐ - Jul 26 - [PWC] Old cat, new tricks, bad habits An analysis of Charming Kittenโs new tools and OPSEC errors |
๐ - Jul 25 - [Kaspersky] CosmicStrand: the discovery of a sophisticated UEFI firmware rootkit |
๐ - Jun 27 - [Kaspersky] Attacks on industrial control systems using ShadowPad |
๐ - Jun 21 - [Kaspersky] APT ToddyCat |
๐ - Jun 02 - [Kaspersky] WinDealer malware shows extremely sophisticated network abilities |
๐ - May 19 - [CheckPoint] Twisted Panda: Chinese APT espionage operation against Russianโs state-owned defense institutes |
๐ - May 12 - [BlackBerry] Threat Thursday: Malware Rebooted - How Industroyer2 Takes Aim at Ukraine Infrastructure |
๐ - May 11 - [CISCO] Bitter APT adds Bangladesh to their targets |
๐ - May 05 - [CISCO] Mustang Panda deploys a new wave of malware targeting Europe |
๐ - May 02 - [Mandiant] UNC3524: Eye Spy on Your Email |
๐ - Apr 06 - [Recorded Future] Continued Targeting of Indian Power Grid Assets by Chinese State-Sponsored Activity Group |
๐ - Mar 30 - [Fortinet] New Milestones for Deep Panda: Log4Shell and Digitally Signed Fire Chili Rootkits |
๐ - Mar 23 - [Dr.Web] Study of an APT attack on a telecommunications company in Kazakhstan |
๐ - Mar 23 - [ESET] Mustang Pandaโs Hodur: Old tricks, new Korplug variant |
๐ - Mar 17 - [Trend Micro] Cyclops Blink Sets Sights on Asus Routers |
๐ - Mar 08 - [Trend Micro] New RURansom Wiper Targets Russia |
๐ - Mar 07 - [proofpoint] The Good, the Bad, and the Web Bug: TA416 Increases Operational Tempo Against European Governments as Conflict in Ukraine Escalates |
๐ - Mar 01 - [proofpoint] Asylum Ambuscade: State Actor Uses Compromised Private Ukrainian Military Emails to Target European Governments and Refugee Movement |
๐ - Feb 23 - [Pangulab] Bvp47:Top-tier Backdoor of US NSA Equation Group |
๐ - Feb 23 - [Mandiant] (Ex)Change of Pace: UNC2596 Observed Leveraging Vulnerabilities to Deploy Cuba Ransomware |
๐ - Feb 15 - [Dell] ShadowPad Malware Analysis |
๐ - Feb 03 - [Symantec] Antlion: Chinese APT Uses Custom Backdoor to Target Financial Institutions in Taiwan |
๐ - Feb 01 - [Cybereason] PowerLess Trojan: Iranian APT Phosphorus Adds New PowerShell Backdoor for Espionage |
๐ - Jan 31 - [CISCO] Iranian APT MuddyWater targets Turkish users via malicious PDFs, executables |
๐ - Jan 31 - [Symantec] Shuckworm Continues Cyber-Espionage Attacks Against Ukraine |
๐ - Jan 27 - [MalwareBytes] North Koreaโs Lazarus APT leverages Windows Update client, GitHub in latest campaign |
๐ - Jan 27 - [CrowdStrike] Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign |
๐ - Jan 25 - [Trellix] Prime Ministerโs Office Compromised: Details of Recent Espionage Campaign |
๐ - Jan 20 - [Kaspersky] MoonBounce: the dark side of UEFI firmware |
๐ - Jan 17 - [Trend Micro] Earth Lusca Employs Sophisticated Infrastructure, Varied Tools and Techniques |
๐ - Jan 07 - [MalwareBytes] Patchwork APT caught in its own web
|
๐ - Jan 05 - [Sygnia] ELEPHANT BEETLE: UNCOVERING AN ORGANIZED FINANCIAL-THEFT OPERATION |
๐ - Jan 03 - [Cluster25] North Korean Group โKONNIโ Targets The Russian Diplomatic Sector With New Versions Of Malware Implants |
๐
2021
- Dec 29 - [NTT] Report on APT Attacks by BlackTech |
๐ - Dec 16 - [Zscaler] New DarkHotel APT attack chain identified |
๐ - Dec 11 - [ESET] Jumping the air gap: 15 years of nation-state effort |
๐ - Dec 07 - [Mandiant] FIN13: A Cybercriminal Threat Actor Focused on Mexico |
๐ - Dec 03 - [Pwc] Conti cyber attack on the HSE |
๐ - Nov 29 - [Trend Micro] Campaign Abusing Legitimate Remote Administrator Tools Uses Fake Cryptocurrency Websites |
๐ - Nov 16 - [Mandiant] UNC1151 Assessed with High Confidence to have Links to Belarus, Ghostwriter Campaign Aligned with Belarusian Government Interests |
๐ - Nov 16 - [ESET] Strategic web compromises in the Middle East with a pinch of Candiru |
๐ - Nov 11 - [Google] Analyzing a watering hole campaign using macOS exploits |
๐ - Nov 10 - [Trend Micro] Void Balaur: Tracking a Cybermercenaryโs Activities |
๐ - Nov 08 - [NCCGroup] TA505 exploits SolarWinds Serv-U vulnerability (CVE-2021-35211) for initial access |
๐ - Nov 04 - [SSU] Gamaredon Armageddon Group |
๐ - Oct 19 - [CrowdStrike] LightBasin: A Roaming Threat to Telecommunications Companies |
๐ - Oct 26 - [JPCERT] Malware WinDealer used by LuoYu Attack Group |
๐ - Oct 19 - [Proofpoint] Whatta TA: TA505 Ramps Up Activity, Delivers New FlawedGrace Variant |
๐ - Oct 19 - [Trend Micro] PurpleFox Adds New Backdoor That Uses WebSockets |
๐ - Oct 18 - [Symantec] Harvester: Nation-state-backed group uses new toolset to target victims in South Asia |
๐ - Oct 14 - [Trend Micro] Analyzing Email Services Abused for Business Email Compromise |
๐ - Oct 12 - [Kaspersky] MysterySnail attacks with Windows zero-day |
๐ - Oct 06 - [Cybereason] Operation GhostShell: Novel RAT Targets Global Aerospace and Telecoms Firms |
๐ - Oct 05 - [ESET] UEFI threats moving to the ESP: Introducing ESPecter bootkit |
๐ - Oct 04 - [JP-CERT] Malware Gh0stTimes Used by BlackTech |
๐ - Sep 30 - [Kaspersky] GhostEmperor: From ProxyLogon to kernel mode |
๐ - Sep 27 - [Microsoft] FoggyWeb: Targeted NOBELIUM malware leads to persistent backdoor |
๐ - Sep 23 - [ESET] FamousSparrow: A suspicious hotel guest |
๐ - Sep 14 - [McAfee] Operation โHarvestโ: A Deep Dive into a Long-term Campaign |
๐ - Sep 13 - [Trend Micro] APT-C-36 Updates Its Spam Campaign Against South American Entities With Commodity RATs |
๐ - Sep 09 - [Recorded Future] Dark Covenant: Connections Between the Russian State and Criminal Actors |
๐ - Sep 08 - [Fireeye] Pro-PRC Influence Campaign Expands to Dozens of Social Media Platforms, Websites, and Forums in at Least Seven Languages, Attempted to Physically Mobilize Protesters in the U.S. |
๐ - Aug 25 - [Bitdefender] FIN8 Threat Actor Spotted Once Again with New "Sardonic" Backdoor |
๐ - Aug 24 - [Trend Micro] Earth Baku Returns |
๐ - Aug 19 - [Sentinel] ShadowPad | A Masterpiece of Privately Sold Malware in Chinese Espionage |
๐ - Aug 17 - [Trend Micro] Confucius Uses Pegasus Spyware-related Lures to Target Pakistani Military |
๐ - Aug 17 - [ClearSky] New Iranian Espionaje Campaign by "SiameseKitten" - Lyceum |
๐ - Aug 17 - [Volexity] North Korean APT InkySquid Infects Victims Using Browser Exploits |
๐ - Aug 14 - [Checkpoint] Indra โ Hackers Behind Recent Attacks on Iran |
๐ - Aug 12 - [imp0rtp3] Uncovering Tetris โ a Full Surveillance Kit Running in your Browser |
๐ - Aug 10 - [Fireeye] UNC215: Spotlight on a Chinese Espionage Campaign in Israel |
๐ - Aug 09 - [Trend Micro] Cinobi Banking Trojan Targets Cryptocurrency Exchange Users via Malvertising |
๐ - Aug 03 - [CyberGeeks] A STEP-BY-STEP ANALYSIS OF THE NEW MALWARE USED BY APT28/SOFACY CALLED SKINNYBOY |
๐ - Aug 03 - [GROUP-IB] The Art of Cyberwarfare Chinese APTs attack Russia |
๐ - Aug 03 - [Cybereason] DeadRinger: Exposing Chinese Threat Actors Targeting Major Telcos |
๐ - Aug 03 - [Positive] APT31 new dropper. Target destinations: Mongolia, Russia, the U.S., and elsewhere |
๐ - Aug 02 - [Sygnia] TG1021: โPraying Mantisโ DISSECTING AN ADVANCED MEMORY-RESIDENT ATTACK |
๐ - Jul 28 - [Proofpoint] I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona |
๐ - Jul 27 - [Palo Alto Networks] THOR: Previously Unseen PlugX Variant Deployed During Microsoft Exchange Server Attacks by PKPLUG Group |
๐ - Jul 20 - [Trend Micro] Tracking the Activities of TeamTNT: A Closer Look at a Cloud-Focused Malicious Actor Group |
๐ - Jul 19 - [US-CERT] Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with Chinaโs MSS Hainan State Security Department |
๐ - Jul 14 - [Google] How we protect users from 0-day attacks |
๐ - Jul 12 - [Trend Micro] #NoFilter: Exposing the Tactics of Instagram Account Hackers |
๐ - Jul 09 - [Trend Micro] BIOPASS RAT: New Malware Sniffs Victims via Live Streaming |
๐ - Jul 06 - [AT&T] Lazarus campaign TTPs and evolution |
๐ - Jul 05 - [Trend Micro] Tracking Cobalt Strike: A Trend Micro Vision One Investigation |
๐ - Jul 01 - [CheckPoint] IndigoZebra APT continues to attack Central Asia with evolving tools |
๐ - Jun 24 - [Securifera] Operation Eagle Eye |
๐ - Jun 16 - [Recorded Future] Threat Activity Group RedFoxtrot Linked to Chinaโs PLA Unit 69010; Targets Bordering Asian Countries |
๐ - Jun 16 - [Kaspersky] Ferocious Kitten: 6 years of covert surveillance in Iran |
๐ - Jun 10 - [Group-IB] Big airline heist |
๐ - Jun 08 - [Kaspersky] PuzzleMaker attacks with Chrome zero-day exploit chain |
๐ - Jun 03 - [CheckPoint] SharpPanda: Chinese APT Group Targets Southeast Asian Government With Previously Unknown Backdoor |
๐ - May 28 - [Microsoft] Breaking down NOBELIUMโs latest early-stage toolset |
๐ - May 27 - [Microsoft] New sophisticated email-based attack from NOBELIUM |
๐ - May 25 - [SentinelOne] FROM WIPER TO RANSOMWARE: THE EVOLUTION OF AGRIUS |
๐ - May 13 - [CISCO] Transparent Tribe APT expands its Windows malware arsenal |
๐ - May 07 - [NCSC] Further TTPs associated with SVR cyber actors |
๐ - May 07 - [Marco Ramilli] MuddyWater: Binder Project (Part 2) |
๐ - May 06 - [Kaspersky] Operation TunnelSnake |
๐ - May 01 - [ClearSky] Attributing Attacks Against Crypto Exchanges to LAZARUS โ North Korea |
๐ - May 01 - [Marco Ramilli] MuddyWater: Binder Project (Part 1) |
๐ - Apr 28 - [Trend Micro] Water Pamola Attacked Online Shops Via Malicious Orders |
๐ - Apr 28 - [Fireeye] Ghostwriter Update: Cyber Espionage Group UNC1151 Likely Conducts Ghostwriter Influence Activity |
๐ - Apr 27 - [Positive] Lazarus Group Recruitment: Threat Hunters vs Head Hunters |
๐ - Apr 23 - [Bitdefender] NAIKON โ Traces from a Military Cyber-Espionage Operation |
๐ - Apr 23 - [Darktrace] APT35 โCharming Kitten' discovered in a pre-infected environment |
๐ - Apr 20 - [FireEye] Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day |
๐ - Apr 19 - [SentinelOne] A Deep Dive into Zebrocyโs Dropper Docs |
๐ - Apr 19 - [MalwareBytes] Lazarus APT conceals malicious code within BMP image to drop its RAT |
๐ - Apr 13 - [Sentire] Hackers Flood the Web with 100,000 Malicious Pages, Promising Professionals Free Business Forms, But Delivering Malware, Reports eSentire |
๐ - Apr 13 - [Kaspersky] Zero-day vulnerability in Desktop Window Manager (CVE-2021-28310) used in the wild |
๐ - Apr 09 - [TrendMicro] Iron Tiger APT Updates Toolkit With Evolved SysUpdate Malware |
๐ - Apr 08 - [CheckPoint] Iranโs APT34 Returns with an Updated Arsenal |
๐ - Apr 08 - [ESET] (Are you) afreight of the dark? Watch out for Vyveva, new Lazarus backdoor |
๐ - Apr 07 - [CISCO] Sowing Discord: Reaping the benefits of collaboration app abuse |
๐ - Apr 06 - [Cado Security] Threat Group Uses Voice Changing Software in Espionage Attempt|
๐ - Mar XX - [CSET] Academics, AI, and APTs |
๐ - Mar 30 - [Kaspersky] APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign |
๐ - Mar 30 - [proofpoint] BadBlood: TA453 Targets US and Israeli Medical Research Personnel in Credential Phishing Campaigns |
๐ - Mar 23 - [Trend Micro] Websites Hosting Cracks Spread Malware, Adware |
๐ - Mar 18 - [Prodaft] SilverFish Group Threat Actor Report |
๐ - Mar 10 - [Bitdefender] FIN8 Returns with Improved BADHATCH Toolkit |
๐ - Mar 10 - [Intezer] New Linux Backdoor RedXOR Likely Operated by Chinese Nation-State Actor |
๐ - Mar 02 - [Volexity] Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day Microsoft Exchange Vulnerabilities |
๐ - Mar 02 - [Microsoft] HAFNIUM targeting Exchange Servers with 0-day exploits |
๐ - Feb 28 - [Recorded Future] China-linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions |
๐ - Feb 25 - [Proofpoint] TA413 Leverages New FriarFox Browser Extension to Target the Gmail Accounts of Global Tibetan Organizations |
๐ - Feb 25 - [Kaspersky] Lazarus targets defense industry with ThreatNeedle |
๐ - Feb 25 - [TeamT5] APT10: Tracking down the stealth activity of the A41APT campaign |
๐ - Feb 24 - [MalwareBytes] LazyScripter: From Empire to double RAT |
๐ - Feb 24 - [Amnesty] Click and Bait: Vietnamese Human Rights Defenders Targeted with Spyware Attacks |
๐ - Feb 22 - [CheckPoint] The Story of Jian โ How APT31 Stole and Used an Unknown Equation Group 0-Day |
๐ - Feb 17 - [Cybleinc] Confucius APT Android Spyware Targets Pakistani and Other South Asian Regions |
๐ - Feb 10 - [Lookout] Lookout Discovers Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict |
๐ - Feb 09 - [Palo Alto Networks] BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech |
๐ - Feb 08 - [CheckPoint] Domestic Kitten โ An Inside Look at the Iranian Surveillance Operations |
๐ - Feb 03 - [Palo Alto Networks] Hildegard: New TeamTNT Malware Targeting Kubernetes |
๐ - Feb 02 - [ESET] Kobalos โ A complex Linux threat to high performance computing infrastructure |
๐ - Feb 01 - [VinCSS] ElephantRAT (Kunming version): our latest discovered RAT of Panda and the similarities with recently Smanager RAT|
๐ - Feb 01 - [ESET] Operation NightScout: Supplyโchain attack targets online gaming in Asia |
๐ - Jan 31 - [JPCERT] A41APT case ~ Analysis of the Stealth APT Campaign Threatening Japan |
๐ - Jan 28 - [ClearSky] โLebanese Cedarโ APT: Global Lebanese Espionage Campaign Leveraging Web Servers |
๐ - Jan 25 - [cybergeeks] A DETAILED ANALYSIS OF ELMER BACKDOOR USED BY APT16 |
๐ - Jan 20 - [JPCERT] Commonly Known Tools Used by Lazarus |
๐ - Jan 20 - [Cybie] A Deep Dive Into Patchwork APT Group |
๐ - Jan 14 - [Positive] Higaisa or Winnti? APT41 backdoors, old and new |
๐ - Jab 12 - [ESET] Operation Spalax: Targeted malware attacks in Colombia |
๐ - Jan 12 - [Yoroi] Opening โSTEELCORGIโ: A Sophisticated APT Swiss Army Knife |
๐ - Jan 12 - [NCCgroup] Abusing cloud services to fly under the radar |
๐ - Jan 11 - [Palo Alto Networks] xHunt Campaign: New BumbleBee Webshell and SSH Tunnels Used for Lateral Movement |
๐ - Jan 11 - [CrowdStrike] SUNSPOT: An Implant in the Build Process |
๐ - Jan 11 - [Kaspersky] Sunburst backdoor โ code overlaps with Kazuar |
๐ - Jan 08 - [Certfa] Charming Kittenโs Christmas Gift |
๐ - Jan 07 - [Prodaft] Brunhilda DaaS Malware Analysis Report |
๐ - Jan 06 - [CISCO] A Deep Dive into Lokibot Infection Chain |
๐ - Jan 06 - [Malwarebytes] Retrohunting APT37: North Korean APT used VBA self decode technique to inject RokRat |
๐ - Jan 05 - [QuoIntelligence] ReconHellcat Uses NIST Theme as Lure To Deliver New BlackSoul Malware |
๐ - Jan 05 - [Trend Micro] Earth Wendigo Injects JavaScript Backdoor to Service Worker for Mailbox Exfiltration |
๐ - Jan 04 - [CheckPoint] Stopping Serial Killer: Catching the Next Strike: Dridex |
๐ - Jan 04 - [Medium] APT27 Turns to Ransomware |
๐ - Jan 04 - [Nao-Sec] Royal Road! Re:Dive |
๐
2020
- Dec 30 - [Recorded Future] SolarWinds Attribution: Are We Getting Ahead of Ourselves? |
๐ - Dec 29 - [Uptycs] Revenge RAT targeting users in South America |
๐ - Dec 23 - [Kaspersky] Lazarus covets COVID-19-related intelligence |
๐ - Dec 22 - [Truesec] Collaboration between FIN7 and the RYUK group, a Truesec Investigation |
๐ - Dec 19 - [VinCSS] Analyzing new malware of China Panda hacker group used to attack supply chain against Vietnam Government Certification Authority |
๐ - Dec 17 - [ClearSky] Pay2Kitten |
๐ - Dec 17 - [ESET] Operation SignSight: Supplyโchain attack against a certification authority in Southeast Asia |
๐ - Dec 16 - [Team Cymru] Mapping out AridViper Infrastructure Using Auguryโs Malware Module |
๐ - Dec 15 - [WeiXin] APT-C-47 ClickOnce Operation |
๐ - Dec 15 - [hvs consulting] Greetings from Lazarus Anatomy of a cyber espionage campaign |
๐ - Dec 13 - [Fireeye] Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor |
๐ - Dec 09 - [Intezer] A Zebra in Gopher's Clothing: Russian APT Uses COVID-19 Lures to Deliver Zebrocy |
๐ - Dec 09 - [Trend Micro] SideWinder Uses South Asian Issues for Spear Phishing, Mobile Attacks |
๐ - Dec 07 - [Group-IB] The footprints of Raccoon: a story about operators of JS-sniffer FakeSecurity distributing Raccoon stealer |
๐ - Dec 02 - [ESET] Turla Crutch: Keeping the โback doorโ open |
๐ - Dec 03 - [Telsy] Adversary Tracking Report |
๐ - Dec 01 - [CISA] Advanced Persistent Threat Actors Targeting U.S. Think Tanks |
๐ - Dec 01 - [Prevasio] OPERATION RED KANGAROO: INDUSTRY'S FIRST DYNAMIC ANALYSIS OF 4M PUBLIC DOCKER CONTAINER IMAGES |
๐ - Nov 30 - [Yoroi] Shadows From the Past Threaten Italian Enterprises |
๐ - Nov 30 - [Microsoft] Threat actor leverages coin miner techniques to stay under the radar โ hereโs how to spot them |
๐ - Nov 27 - [PTSecurity] Investigation with a twist: an accidental APT attack and averted data destruction |
๐ - Nov 26 - [CheckPoint] Bandook: Signed & Delivered |
๐ - Nov 23 - [S2W Lab] Analysis of Clop Ransomware suspiciously related to the Recent Incident |
๐ - Nov 19 - [Cybereason] Cybereason vs. MedusaLocker Ransomware |
๐ - Nov 18 - [KR-CERT] Analysis of the Bookcodes RAT C2 framework starting with spear phishing |
๐ - Nov 17 - [Cybereason] CHAES: Novel Malware Targeting Latin American E-Commerce |
๐ - Nov 17 - [Symantec] Japan-Linked Organizations Targeted in Long-Running and Sophisticated Attack Campaign |
๐ - Nov 16 - [FoxIT] TA505: A Brief History Of Their Time |
๐ - Nov 16 - [Bitdefender] A Detailed Timeline of a Chinese APT Espionage Attack Targeting South Eastern Asian Government Institutions |
๐ - Nov 12 - [CISCO] CRAT wants to plunder your endpoints |
๐ - Nov 12 - [BlackBerry] The CostaRicto Campaign: Cyber-Espionage Outsourced |
๐ - Nov 12 - [ESET] Hungry for data, ModPipe backdoor hits POS software used in hospitality sector |
๐ - Nov 12 - [Morphisec] JUPYTER INFOSTEALER |
๐ - Nov 10 - [Record Future] New APT32 Malware Campaign Targets Cambodian Government |
๐ - Nov 06 - [Volexity] OceanLotus: Extending Cyber Espionage Operations Through Fake Websites |
๐ - Nov 04 - [Sophos] A new APT uses DLL side-loads to โKilllSomeOneโ |
๐ - Nov 02 - [FireEye] Live off the Land? How About Bringing Your Own Island? An Overview of UNC1945 |
๐ - Nov 01 - [Cyberstanc] A look into APT36's (Transparent Tribe) tradecraft |
๐ - Oct 27 - [US-CERT] North Korean Advanced Persistent Threat
Focus: Kimsuky |
๐ - Oct 26 - [DrWeb] Study of the ShadowPad APT backdoor and its relation to PlugX |
๐ - Oct 23 - [360] APT-C-44 NAFox |
๐ - Oct 22 - [WeiXin] Bitter CHM |
๐ - Oct 19 - [Trend Micro] Operation Earth Kitsune: Tracking SLUBโs Current Operations |
๐ - Oct 15 - [ClearSky] Operation Quicksand โ MuddyWaterโs Offensive Attack Against Israeli Organizations |
๐ - Oct 14 - [MalwareByte] Silent Librarian APT right on schedule for 20/21 academic year |
๐ - Oct 13 - [WeiXin] Operation Rubia cordifolia |
๐ - Oct 07 - [BlackBerry] BlackBerry Uncovers Massive Hack-For-Hire Group Targeting Governments, Businesses, Human Rights Groups and Influential Individuals |
๐ - Oct 06 - [Malwarebytes] Release the Kraken: Fileless APT attack abuses Windows Error Reporting service |
๐ - Oct 05 - [Kaspersky] MosaicRegressor: Lurking in the Shadows of UEFI |
๐ - Sep 30 - [ESET] APTโCโ23 group evolves its Android spyware |
๐ - Sep 29 - [Symantec] Palmerworm: Espionage Gang Targets the Media, Finance, and Other Sectors |
๐ - Sep 29 - [PTSecurity] ShadowPad: new activity from the Winnti group |
๐ - Sep 25 - [Amnesty] German-made FinSpy spyware found in Egypt, and Mac and Linux versions revealed |
๐ - Sep 25 - [360] APT-C-43 steals Venezuelan military secrets to provide intelligence support for the reactionaries โ HpReact campaign |
๐ - Sep 24 - [Microsoft] detecting empires in the cloud |
๐ - Sep 23 - [Seqrite] Operation SideCopy |
๐ - Sep 22 - [Quointelligence] APT28 Delivers Zebrocy Malware Campaign using NATO Theme as Lure |
๐ - Sep 21 - [CISCO] The art and science of detecting Cobalt Strike |
๐ - Sep 17 - [Qianxin] Operation Tibbar |
๐ - Sep 16 - [Intel471] Partners in crime: North Koreans and elite Russian-speaking cybercriminals |
๐ - Sep 08 - [Microsoft] TeamTNT activity targets Weave Scope deployments |
๐ - Sep 03 - [Cybereason] NO REST FOR THE WICKED: EVILNUM UNLEASHES PYVIL RAT |
๐ - Sep 01 - [proofpoint] Chinese APT TA413 Resumes Targeting of Tibet Following COVID-19 Themed Economic Espionage Campaign Delivering Sepulcher Malware Targeting Europe |
๐ - Aug 27 - [ClearSky] The Kittens Are Back in Town 3 |
๐ - Aug 28 - [Kaspersky] Transparent Tribe: Evolution analysis, part 2 |
๐ - Aug 24 - [Kaspersky] Lifting the veil on DeathStalker, a mercenary triumvirate |
๐ - Aug 20 - [CertFR] DEVELOPMENT OF THE ACTIVITY OF THE TA505 CYBERCRIMINAL GROUP |
๐ - Aug 20 - [Bitdefender] More Evidence of APT Hackers-for-Hire Used for Industrial Espionage |
๐ - Aug 18 - [F-Secure] LAZARUS GROUP CAMPAIGN TARGETING THE CRYPTOCURRENCY VERTICAL |
๐ - Aug 13 - [Kaspersky] CactusPete APT groupโs updated Bisonal backdoor |
๐ - Aug 13 - [ClearSky] Operation โDream Jobโ Widespread North Korean Espionage Campaign |
๐ - Aug 13 - [CISA] Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware |
๐ - Aug 12 - [Kaspersky] Internet Explorer and Windows zero-day exploits used in Operation PowerFall |
๐ - Aug 10 - [Seqrite] Gorgon APT targeting MSME sector in India |
๐ - Aug 03 - [CISA] MAR-10292089-1.v2 โ Chinese Remote Access Trojan: TAIDOOR |
๐ - Jul 29 - [McAfee] Operation North Star: A Job Offer Thatโs Too Good to be True? |
๐ - Jul 28 - [Group-IB] JOLLY ROGERโS PATRONS |
๐ - Jul 28 - [Recorded Future] Chinese State-Sponsored Group โRedDeltaโ Targets the Vatican and Catholic Organizations |
๐ - Jul 22 - [Palo Alto Network] OilRig Targets Middle Eastern Telecommunications Organization and Adds Novel C2 Channel with Steganography to Its Inventory |
๐ - Jul 22 - [Kaspersky] MATA: Multi-platform targeted malware framework |
๐ - Jul 20 - [Dr.Web] Study of the APT attacks on state institutions in Kazakhstan and Kyrgyzstan |
๐ - Jul 17 - [CERT-FR] THE MALWARE DRIDEX: ORIGINS AND USES |
๐ - Jul 16 - [NCSC] Advisory: APT29 targets COVID-19 vaccine development |
๐ - Jul 15 - [F-Secure] THE FAKE CISCO: Hunting for backdoors in Counterfeit Cisco devices |
๐ - Jul 14 - [Tesly] TURLA / VENOMOUS BEAR UPDATES ITS ARSENAL: โNEWPASSโ APPEARS ON THE APT THREAT SCENE |
๐ - Jul 14 - [ESET] Welcome Chat as a secure messaging app? Nothing could be further from the truth |
๐ - Jul 12 - [WeiXin] SideWinder 2020 H1 |
๐ - Jul 09 - [AGARI] Cosmic Lynx: The Rise of Russian BEC |
๐ - Jul 09 - [ESET] More evil: A deep look at Evilnum and its toolset |
๐ - Jul 08 - [Sedbraven] Copy cat of APT Sidewinder ? |
๐ - Jul 08 - [proofpoint] TA410: The Group Behind LookBack Attacks Against U.S. Utilities Sector Returns with New Malware |
๐ - Jul 08 - [Seqrite] Operation โHoney Trapโ: APT36 Targets Defense Organizations in India |
๐ - Jul 06 - [Sansec] North Korean hackers are skimming US and European shoppers |
๐ - Jul 01 - [Lookout] Mobile APT Surveillance Campaigns Targeting Uyghurs |
๐ - Jun 30 - [Bitdefender] StrongPity APT โ Revealing Trojanized Tools, Working Hours and Infrastructure |
๐ - Jun 29 - [CISCO] PROMETHIUM extends global reach with StrongPity3 APT |
๐ - Jun 26 - [Symantec] WastedLocker: Symantec Identifies Wave of Attacks Against U.S. Organizations |
๐ - Jun 25 - [Elastic] A close look at the advanced techniques used in a Malaysian-focused APT campaign |
๐ - Jun 24 - [Dell] BRONZE VINEWOOD Targets Supply Chains |
๐ - Jun 23 - [NCCGroup] WastedLocker: A New Ransomware Variant Developed By The Evil Corp Group |
๐ - Jun 19 - [Zscaler] Targeted Attack Leverages India-China Border Dispute to Lure Victims |
๐ - Jun 18 - [ESET] Digging up InvisiMoleโs hidden arsenal |
๐ - Jun 17 - [ESET] Operation In(ter)ception: Aerospace and military companies in the crosshairs of cyberspies |
๐ - Jun 17 - [Palo Alto] AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations |
๐ - Jun 17 - [Malwarebytes] Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature |
๐ - Jun 16 - [PTSecurity] Cobalt: tactics and tools update |
๐ - Jun 15 - [Amnesty] India: Human Rights Defenders Targeted by a Coordinated Spyware Operation |
๐ - Jun 11 - [Trend Micro] New Android Spyware ActionSpy Revealed via Phishing Attacks from Earth Empusa |
๐ - Jul 11 - [ESET] Gamaredon group grows its game |
๐ - Jun 08 - [proofpoint] TA410: The Group Behind LookBack Attacks Against U.S. Utilities Sector Returns with New Malware |
๐ - Jun 08 - [CheckPoint] GuLoader? No, CloudEyE |
๐ - Jun 03 - [Malwarebyte] New LNK attack tied to Higaisa APT discovered |
๐ - Jun 03 - [Kaspersky] Cycldek: Bridging the (air) gap |
๐ - Jun 01 - [Lifars] Cryptocurrency Miners โ XMRig Based CoinMiner by Blue Mockingbird Group |
๐ - May 29 - [IronNet] Russian Cyber Attack Campaigns and Actors |
๐ - May 28 - [Kaspersky] The zero-day exploits of Operation WizardOpium |
๐ - May 26 - [ESET] From Agent.BTZ to ComRAT v4: A tenโyear journey |
๐ - May 21 - [Intezer] The Evolution of APT15โs Codebase 2020 |
๐ - May 21 - [Bitdefender] Iranian Chafer APT Targeted Air Transportation and Government in Kuwait and Saudi Arabia |
๐ - May 21 - [ESET] No โGame overโ for the Winnti Group |
๐ - May 19 - [Symantec] Sophisticated Espionage Group Turns Attention to Telecom Providers in South Asia |
๐ - May 18 - [360] APT-C-23 middle East |
๐ - May 14 - [Telekom] LOLSnif โ Tracking Another Ursnif-Based Targeted Campaign |
๐ - May 14 - [Sophos] RATicate: an attackerโs waves of information-stealing malware |
๐ - May 14 - [360] Vendetta-new threat actor from Europe |
๐ - May 14 - [ESET] Mikroceen: Spying backdoor leveraged in highโprofile networks in Central Asia |
๐ - May 14 - [Avast] APT Group Planted Backdoors Targeting High Profile Networks in Central Asia |
๐ - May 14 - [Kaspersky] COMpfun authors spoof visa application with HTTP status-based Trojan |
๐ - May 13 - [ESET] Ramsay: A cyberโespionage toolkit tailored for airโgapped networks |
๐ - May 12 - [Trend Micro] Tropic Trooperโs Back: USBferry Attack Targets Air-gapped Environments |
๐ - May 11 - [Zscaler] Targeted Attacks on Indian Government and Financial Institutions Using the JsOutProx RAT |
๐ - May 11 - [Palo Alto] Updated BackConfig Malware Targeting Government and Military Organizations in South Asia |
๐ - May 07 - [RedCanary] Introducing Blue Mockingbird |
๐ - May 07 - [CheckPoint] Naikon APT: Cyber Espionage Reloaded |
๐ - May 06 - [Prevailion] Phantom in the Command Shell
|
๐ - May 06 - [CyberStruggle] Leery Turtle Threat Report |
๐ - May 05 - [CheckPoint] Nazar: Spirits of the Past |
๐ - Apr 29 - [Recorded Future] Chinese Influence Operations Evolve in Campaigns Targeting Taiwanese Elections, Hong Kong Protests |
๐ - Apr 28 - [Yoroi] Outlaw is Back, a New Crypto-Botnet Targets European Organizations |
๐ - Apr 28 - [ESET] Grandoreiro: How engorged can an EXE get? |
๐ - Apr 24 - [LAC JP] PoshC2 |
๐ - Apr 21 - [Volexity] Evil Eye Threat Actor Resurfaces with iOS Exploit and Updated Implant |
๐ - Apr 20 - [QuoIntelligence] WINNTI GROUP: Insights From the Past |
๐ - Apr 17 - [Trend Micro] Gamaredon APT Group Use Covid-19 Lure in Campaigns |
๐ - Apr 16 - [Trend Micro] Exposing Modular Adware: How DealPly, IsErIk, and ManageX Persist in Systems |
๐ - Apr 16 - [White Ops] Giving Fraudsters the Cold Shoulder: Inside the Largest Connected TV Bot Attack |
๐ - Apr 15 - [Lookout] Nation-state Mobile Malware Targets Syrians with COVID-19 Lures |
๐ - Apr 15 - [Cycraft] Craft for Resilience: APT Group Chimera |
๐ - Apr 07 - [MalwareBytes] APTs and COVID-19: How advanced persistent threats use the coronavirus as a lure |
๐ - Apr 07 - [Zscaler] New Ursnif Campaign: A Shift from PowerShell to Mshta |
๐ - Apr 07 - [BlackBerry] Decade of the RATs: Novel APT Attacks Targeting Linux, Windows and Android |
๐ - Mar 30 - [Alyac] The 'Spy Cloud' Operation: Geumseong121 group carries out the APT attack disguising the evidence of North Korean defection |
๐ - Mar 26 - [Kaspersky] iOS exploit chain deploys LightSpy feature-rich malware |
๐ - Mar 25 - [FireEye] This Is Not a Test: APT41 Initiates Global Intrusion Campaign Using Multiple Exploits |
๐ - Mar 24 - [Kaspersky] WildPressure targets industrial-related entities in the Middle East |
๐ - Mar 24 - [Trend Micro] Operation Poisoned News: Hong Kong Users Targeted With Mobile Malware via Local News Links |
๐ - Mar 19 - [Trend Micro] Probing Pawn Storm : Cyberespionage Campaign Through Scanning, Credential Phishing and More |
๐ - Mar 15 - [MalwareBytes] APT36 jumps on the coronavirus bandwagon, delivers Crimson RAT |
๐ - Mar 12 - [Checkpoint] Vicious Panda: The COVID Campaign |
๐ - Mar 12 - [SecPulse] Two-tailed scorpion APT-C-23 |
๐ - Mar 12 - [ESET] Tracking Turla: New backdoor delivered via Armenian watering holes |
๐ - Mar 11 - [Trend Micro] Operation Overtrap Targets Japanese Online Banking Users Via Bottle Exploit Kit and Brand-New Cinobi Banking Trojan |
๐ - Mar 10 - [Cybereason] WHO'S HACKING THE HACKERS: NO HONOR AMONG THIEVES |
๐ - Mar 05 - [Trend Micro] Dissecting Geost: Exposing the Anatomy of the Android Trojan Targeting Russian Banks |
๐ - Mar 05 - [ESET] Guildma: The Devil drives electric |
๐ - Mar 03 - [F5] New Perl Botnet (Tuyul) Found with Possible Indonesian Attribution |
๐ - Mar 03 - [Yoroi] The North Korean Kimsuky APT keeps threatening South Korea evolving its TTPs |
๐ - Mar 02 - [Telsy] APT34 (AKA OILRIG, AKA HELIX KITTEN) ATTACKS LEBANON GOVERNMENT ENTITIES WITH MAILDROPPER IMPLANTS |
๐ - Feb 28 - [Qianxin] Nortrom_Lion_APT |
๐ - Feb 25 - [Sophos] โCloud Snooperโ Attack Bypasses Firewall Security Measures |
๐ - Feb 22 - [Objective-See] Weaponizing a Lazarus Group Implant |
๐ - Feb 21 - [AhnLab] MyKings Botnet |
๐ - Feb 19 - [lexfo] The Lazarus Constellation |
๐ - Feb 18 - [Trend Micro] Operation DRBControl |
๐ - Feb 17 - [Yoroi] Cyberwarfare: A deep dive into the latest Gamaredon Espionage Campaign |
๐ - Feb 17 - [Talent-Jump] CLAMBLING - A New Backdoor Base On Dropbox (EN) |
๐ - Feb 17 - [ClearSky] Fox Kitten Campaign |
๐ - Feb 13 - [Cybereason] NEW CYBER ESPIONAGE CAMPAIGNS TARGETING PALESTINIANS - PART 2: THE DISCOVERY OF THE NEW, MYSTERIOUS PIEROGI BACKDOOR |
๐ - Feb 10 - [Trend Micro] Outlaw Updates Kit to Kill Older Miner Versions, Targets More Systems |
๐ - Feb 03 - [PaloAlto Networks] Actors Still Exploiting SharePoint Vulnerability to Attack Middle East Government Organizations |
๐ - Jan XX - [IBM] New Destructive Wiper โZeroCleareโ Targets Energy Sector in the Middle East |
๐ - Jan 31 - [ESET] Winnti Group targeting universities in Hong Kong |
๐ - Jan 16 - [CISCO] JhoneRAT: Cloud based python RAT targeting Middle Eastern countries |
๐ - Jan 13 - [ShellsSystems] Reviving MuddyC3 Used by MuddyWater (IRAN) APT |
๐ - Jan 13 - [Lab52] APT27 ZxShell RootKit module updates |
๐ - Jan 09 - [Dragos] The State of Threats to Electric Entities in North America |
๐ - Jan 08 - [Kaspersky] Operation AppleJeus Sequel |
๐ - Jan 07 - [Recorded Future] Iranian Cyber Response to Death of IRGC Head Would Likely Use Reported TTPs and Previous Access |
๐ - Jan 07 - [NCA] Destructive Attack: DUSTMAN |
๐ - Jan 06 - [Trend Micro] First Active Attack Exploiting CVE-2019-2215 Found on Google Play, Linked to SideWinder APT Group |
๐ - Jan 01 - [WeiXin] Pakistan Sidewinder APT Attack |
๐
2019
- Dec 29 - [Dell] BRONZE PRESIDENT Targets NGOs |
๐ - Dec 26 - [Pedro Tavares] Targeting Portugal: A new trojan โLampionโ has spread using template emails from the Portuguese Government Finance & Tax |
๐ - Dec 19 - [FoxIT] Operation Wocao |
๐ - Dec 17 - [PaloAlto] Rancor: Cyber Espionage Group Uses New Custom Malware to Attack Southeast Asia |
๐ - Dec 17 - [360] Dacls, the Dual platform RAT |
๐ - Dec 16 - [Sophos] MyKings: The Slow But Steady Growth of a Relentless Botnet |
๐ - Dec 12 - [Trend Micro] Drilling Deep: A Look at Cyberattacks on the Oil and Gas Industry |
๐ - Dec 12 - [Microsoft] GALLIUM: Targeting global telecom |
๐ - Dec 12 - [Recorded Future] Operation Gamework: Infrastructure Overlaps Found Between BlueAlpha and Iranian APTs |
๐ - Dec 11 - [Trend Micro] Waterbear is Back, Uses API Hooking to Evade Security Product Detection |
๐ - Dec 11 - [Cyberason] DROPPING ANCHOR: FROM A TRICKBOT INFECTION TO THE DISCOVERY OF THE ANCHOR MALWARE |
๐ - Dec 10 - [Sentinel] Anchor Project: The Deadly Planeswalker: How The TrickBot Group United High-Tech Crimeware & APT |
๐ - Dec 06 - [SCILabs] Cosmic Banker campaign is still active revealing link with Banload malware |
๐ - Dec 04 - [IBM] New Destructive Wiper โZeroCleareโ Targets Energy Sector in the Middle East |
๐ - Dec 04 - [Trend Micro] Obfuscation Tools Found in the Capesand Exploit Kit Possibly Used in โKurdishCoderโ Campaign |
๐ - Dec 03 - [NSHC] Threat Actor Targeting Hong Kong Pro-Democracy Figures |
๐ - Nov 29 - [Trend Micro] Operation ENDTRADE: Finding Multi-Stage Backdoors that TICK |
๐ - Nov 28 - [Kaspersky] RevengeHotels: cybercrime targeting hotel front desks worldwide |
๐ - Nov 26 - [Microsoft] Insights from one year of tracking a polymorphic threat: Dexphot |
๐ - Nov 25 - [Positive] Studying Donot Team |
๐ - Nov 21 - [ESET] Registers as โDefault Print Monitorโ, but is a malicious downloader. Meet DePriMon |
๐ - Nov 20 - [360] Golden Eagle (APT-C-34) |
๐ - Nov 20 - [Trend Micro] Mac Backdoor Linked to Lazarus Targets Korean Users |
๐ - Nov 13 - [Trend Micro] More than a Dozen Obfuscated APT33 Botnets Used for Extreme Narrow Targeting |
๐ - Nov 12 - [Marco Ramilli] TA-505 Cybercrime on System Integrator Companies |
๐ - Nov 08 - [Group-IB] Massive malicious campaign by FakeSecurity JS-sniffer |
๐ - Nov 08 - [Kapsersky] Titanium: the Platinum group strikes again |
๐ - Nov 05 - [Telsy] THE LAZARUSโ GAZE TO THE WORLD: WHAT IS BEHIND THE FIRST STONE ? |
๐ - Nov 04 - [Tencent] Higaisa APT |
๐ - Nov 04 - [Marcoramilli] Is Lazarus/APT38 Targeting Critical Infrastructures |
๐ - Nov 01 - [Kaspersky] Chrome 0-day exploit CVE-2019-13720 used in Operation WizardOpium |
๐ - Oct 31 - [PTsecurity] Calypso APT: new group attacking state institutions |
๐ - Oct 31 - [Fireeye] MESSAGETAP: Whoโs Reading Your Text Messages? |
๐ - Oct 28 - [Marco Ramilli] SWEED Targeting Precision Engineering Companies in Italy |
๐ - Oct 21 - [ESET] Winnti Groupโs skipโ2.0: A Microsoft SQL Server backdoor |
๐ - Oct 21 - [VB] Geost botnet. The story of the discovery of a new Android banking trojan from an OpSec error |
๐ - Oct 17 - [ESET] Operation Ghost: The Dukes arenโt back โ they never left |
๐ - Oct 15 - [Fireeye] LOWKEY: Hunting for the Missing Volume Serial ID |
๐ - Oct 14 - [Marco Ramilli] Is Emotet gang targeting companies with external SOC? |
๐ - Oct 14 - [Exatrack] From tweet to rootkit |
๐ - Oct 14 - [Crowdstrike] HUGE FAN OF YOUR WORK: TURBINE PANDA |
๐ - Oct 10 - [Fireeye] Mahalo FIN7: Responding to the Criminal Operatorsโ New Tools and Techniques |
๐ - Oct 10 - [ESET] CONNECTING THE DOTS Exposing the arsenal and methods of the Winnti Group |
๐ - Oct 10 - [ESET] Attor, a spy platform with curious GSM fingerprinting |
๐ - Oct 09 - [Trend Micro] FIN6 Compromised E-commerce Platform via Magecart to Inject Credit Card Skimmers Into Thousands of Online Shops |
๐ - Oct 07 - [CERT-FR] Supply chain attacks: threats targeting service providers and design offices |
๐ - Oct 07 - [Clearsky] The Kittens Are Back in Town 2 โ Charming Kitten Campaign Keeps Going on, Using New Impersonation Methods |
๐ - Oct 07 - [Anomali] China-Based APT Mustang Panda Targets Minority Groups, Public and Private Sector Organizations |
๐ - Oct 04 - [Avest] GEOST BOTNET. THE STORY OF THE DISCOVERY OF A NEW ANDROID BANKING TROJAN FROM AN OPSEC ERROR |
๐ - Oct 03 - [Palo Alto Networks] PKPLUG: Chinese Cyber Espionage Group Attacking Asia |
๐ - Oct 01 - [Netskope] New Adwind Campaign targets US Petroleum Industry |
๐ - Oct 01 - [Trend Micro] New Fileless Botnet Novter Distributed by KovCoreG Malvertising Campaign |
๐ - Sep 30 - [Lastline] HELO Winnti: Attack or Scan? |
๐ - Sep 26 - [GBHackers] Chinese APT Hackers Attack Windows Users via FakeNarrator Malware to Implant PcShare Backdoor |
๐ - Sep 24 - [Telsy] DeadlyKiss APT |
๐ - Sep 24 - [CISCO] How Tortoiseshell created a fake veteran hiring website to host malware |
๐ - Sep 24 - [CheckPoint] Mapping the connections inside Russiaโs APT Ecosystem |
๐ - Sep 18 - [Symantec] Tortoiseshell Group Targets IT Providers in Saudi Arabia in Probable Supply Chain Attacks |
๐ - Sep 18 - [Trend Micro] Magecart Skimming Attack Targets Mobile Users of Hotel Chain Booking Websites |
๐ - Sep 15 - [Clearsky] The Kittens Are Back in Town Charming Kitten Campaign Against Academic
Researchers |
๐ - Sep 11 - [MeltX0R Security] RANCOR APT: Suspected targeted attacks against South East Asia |
๐ - Sep 09 - [Symantec] Thrip: Ambitious Attacks Against High Level Targets Continue |
๐ - Sep 06 - [MeltX0R Security] BITTER APT: Not So Sweet |
๐ - Sep 05 - [CheckPoint] UPSynergy: Chinese-American Spy vs. Spy Story |
๐ - Sep 04 - [Trend Micro] Glupteba Campaign Hits Network Routers and Updates C&C Servers with Data from Bitcoin Transactions |
๐ - Aug 31 - [StrangerealIntel] Malware analysis on Bitter APT campaign |
๐ - Aug 29 - [AhnLab] Tick Tock - Activities of the Tick Cyber Espionage Group in East Asia Over the Last 10 Years |
๐ - Aug 29 - [Trend Micro] โHeatstrokeโ Campaign Uses Multistage Phishing Attack to Steal PayPal and Credit Card Information |
๐ - Aug 29 - [IBM] More_eggs, Anyone? Threat Actor ITG08 Strikes Again |
๐ - Aug 29 - [NSHC] SectorJ04 Groupโs Increased Activity in 2019 |
๐ - Aug 27 - [StrangerealIntel] Malware analysis about sample of APT Patchwork |
๐ - Aug 27 - [Dell] LYCEUM Takes Center Stage in Middle East Campaign |
๐ - Aug 27 - [CISCO] China Chopper still active 9 years later |
๐ - Aug 27 - [Trend Micro] TA505 At It Again: Variety is the Spice of ServHelper and FlawedAmmyy |
๐ - Aug 26 - [QianXin] APT-C-09 Reappeared as Conflict Intensified Between India and Pakistan |
๐ - Aug 22 - [PTsecurity] Operation TaskMasters: Cyberespionage in the digital economy age |
๐ - Aug 21 - [Fortinet] The Gamaredon Group: A TTP Profile Analysis |
๐ - Aug 21 - [Group-IB] Silence 2.0 |
๐ - Aug 20 - [StrangerealIntel] Malware analysis about unknown Chinese APT campaign |
๐ - Aug 14 - [ESET] In the Balkans, businesses are under fire from a doubleโbarreled weapon |
๐ - Aug 12 - [Kaspersky] Recent Cloud Atlas activity|
๐ - Aug 08 - [Anomali] Suspected BITTER APT Continues Targeting Government of China and Chinese Organizations |
๐ - Aug 07 - [FireEye] APT41: A Dual Espionage and Cyber Crime Operation |
๐ - Aug 05 - [Trend Micro] Latest Trickbot Campaign Delivered via Highly Obfuscated JS File |
๐ - Aug 05 - [ESET] Sharpening the Machete |
๐ - Aug 01 - [Anity] Analysis of the Attack of Mobile Devices by OceanLotus |
๐ - Jul 24 - [Dell] Resurgent Iron Liberty Targeting Energy Sector |
๐ - Jul 24 - [] Attacking the Heart of the German Industry |
๐ - Jul 24 - [Proofpoint] Chinese APT โOperation LagTime ITโ Targets Government Information Technology Agencies in Eastern Asia |
๐ - Jul 18 - [FireEye] Hard Pass: Declining APT34โs Invite to Join Their Professional Network |
๐ - Jul 18 - [Trend Micro] Spam Campaign Targets Colombian Entities with Custom-made โProyecto RAT,โ Uses Email Service YOPmail for C&C |
๐ - Jul 18 - [ESET] OKRUM AND KETRICAN: AN OVERVIEW OF RECENT KE3CHANG GROUP ACTIVITY |
๐ - Jul 17 - [AT&T] Newly identified StrongPity operations |
๐ - Jul 17 - [Intezer] EvilGnome: Rare Malware Spying on Linux Desktop Users |
๐ - Jul 16 - [Trend Micro] SLUB Gets Rid of GitHub, Intensifies Slack Use |
๐ - Jul 15 - [CISCO] SWEED: Exposing years of Agent Tesla campaigns |
๐ - Jul 11 - [ESET] Buhtrap group uses zeroโday in latest espionage campaigns |
๐ - Jul 09 - [CISCO] Sea Turtle keeps on swimming, finds new victims, DNS hijacking techniques |
๐ - Jul 04 - [Kaspersky] Twas the night before |
๐ - Jul 04 - [Trend Micro] Latest Spam Campaigns from TA505 Now Using New Malware Tools Gelup and FlowerPippi |
๐ - Jul 03 - [Anomali] Multiple Chinese Threat Groups Exploiting CVE-2018-0798 Equation Editor Vulnerability Since Late 2018 |
๐ - Jul 01 - [Check Point] Operation Tripoli |
๐ - Jul 01 - [Cylance] Threat Spotlight: Ratsnif - New Network Vermin from OceanLotus |
๐ - Jun 27 - [Trend Micro] ShadowGate Returns to Worldwide Operations With Evolved Greenflash Sundown Exploit Kit |
๐ - Jun 26 - [Recorded Future] Iranian Threat Actor Amasses Large Cyber Operations Infrastructure Network to Target Saudi Organizations |
๐ - Jun 25 - [QianXin] Analysis of MuddyC3, a New Weapon Used by MuddyWater |
๐ - Jun 25 - [Cybereason] OPERATION SOFT CELL: A WORLDWIDE CAMPAIGN AGAINST TELECOMMUNICATIONS PROVIDERS |
๐ - Jun 21 - [Symantec] Waterbug: Espionage Group Rolls Out Brand-New Toolset in Attacks Against Governments |
๐ - Jun 20 - [QianXin] New Approaches Utilized by OceanLotus to Target An Environmental Group in Vietnam |
๐ - Jun 12 - [ThaiCERT] Threat Group Cards: A Threat Actor Encyclopedia |
๐ - Jun 11 - [Recorded Future] The Discovery of Fishwrap: A New Social Media Information Operation Methodology |
๐ - Jun 10 - [BlackBerry] Threat Spotlight: MenuPass/QuasarRAT Backdoor |
๐ - Jun 10 - [Trend Micro] MuddyWater Resurfaces, Uses Multi-Stage Backdoor POWERSTATS V3 and New Post-Exploitation Tools |
๐ - Jun 05 - [Agari] Scattered Canary The Evolution and Inner Workings of a West African Cybercriminal Startup Turned BEC Enterprise |
๐ - Jun 04 - [Bitdefender] An APT Blueprint: Gaining New Visibility into Financial Threats |
๐ - Jun 03 - [Kaspersky] Zebrocyโs Multilanguage Malware Salad |
๐ - May 30 - [CISCO] 10 years of virtual dynamite: A high-level retrospective of ATM malware |
๐ - May 29 - [ESET] A dive into Turla PowerShell usage |
๐ - May 29 - [Yoroi] TA505 is Expanding its Operations |
๐ - May 28 - [Palo Alto Networks] Emissary Panda Attacks Middle East Government Sharepoint Servers |
๐ - May 27 - [360] APT-C-38 |
๐ - May 24 - [ENSILO] UNCOVERING NEW ACTIVITY BY APT10 |
๐ - May 22 - [ESET] A journey to Zebrocy land |
๐ - May 19 - [Intezer] HiddenWasp Malware Stings Targeted Linux Systems |
๐ - May 18 - [ADLab] Operation_BlackLion |
๐ - May 15 - [Chronicle] Winnti: More than just Windows and Gates |
๐ - May 13 - [Kaspersky] ScarCruft continues to evolve, introduces Bluetooth harvester |
๐ - May 11 - [Sebdraven] Chinese Actor APT target Ministry of Justice Vietnamese |
๐ - May 09 - [Clearsky] Iranian Nation-State APT Groups โ โBlack Boxโ Leak |
๐ - May 08 - [Kaspersky] FIN7.5: the infamous cybercrime rig โFIN7โ continues its activities |
๐ - May 08 - [QianXin] OceanLotusโ Attacks to Indochinese Peninsula: Evolution of Targets, Techniques and Procedure
|
๐ - May 07 - [Yoroi] ATMitch: New Evidence Spotted In The Wild |
๐ - May 07 - [ESET] Turla LightNeuron: An email too far |
๐ - May 07 - [Symantec] Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak |
๐ - May 03 - [Kaspersky] Whoโs who in the Zoo Cyberespionage operation targets Android users in the Middle East |
๐ - Apr 30 - [ThreatRecon] SectorB06 using Mongolian language in lure document |
๐ - Apr 24 - [CyberInt] legit remote admin tools turn into threat actors' tools |
๐ - Apr 23 - [Kaspersky] Operation ShadowHammer: a high-profile supply chain attack |
๐ - Apr 22 - [CheckPoint] FINTEAM: Trojanized TeamViewer Against Government Targets |
๐ - Apr 19 - [MalwareBytes] โFunky malware formatโ found in Ocean Lotus sample |
๐ - Apr 17 - [Palo Alto Networks] Aggah Campaign: Bit.ly, BlogSpot, and Pastebin Used for C2 in Large Scale Campaign |
๐ - Apr 17 - [CISCO] DNS Hijacking Abuses Trust In Core Internet Service |
๐ - Apr 10 - [CheckPoint] The Muddy Waters of APT Attacks |
๐ - Apr 10 - [Kaspersky] Project TajMahal โ a sophisticated new APT framework |
๐ - Apr 10 - [Kaspersky] Gaza Cybergang Group1, operation SneakyPastes |
๐ - Apr 02 - [Cylance] OceanLotus Steganography |
๐ - Mar 28 - [Trend Micro] Desktop, Mobile Phishing Campaign Targets South Korean Websites, Steals Credentials Via Watering Hole |
๐ - Mar 28 - [C4ADS] Above Us Only Stars: Exposing GPS Spoofing in Russia and Syria |
๐ - Mar 28 - [ThreatRecon] Threat Actor Group using UAC Bypass Module to run BAT File |
๐ - Mar 27 - [Symantec] Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S. |
๐ - Mar 25 - [Kaspersky] Operation ShadowHammer |
๐ - Mar 22 - [Netscout] LUCKY ELEPHANT CAMPAIGN MASQUERADING |
๐ - Mar 13 - [CISCO] GlitchPOS: New PoS malware for sale |
๐ - Mar 13 - [FlashPoint] โDMSniffโ POS Malware Actively Leveraged to Target Small-, Medium-Sized Businesses |
๐ - Mar 13 - [CheckPoint] Operation Sheep: Pilfer-Analytics SDK in Action |
๐ - Mar 12 - [Pala Alto Network] Operation Comando: How to Run a Cheap and Effective Credit Card Business |
๐ - Mar 11 - [ESET] Gaming industry still in the scope of attackers in Asia |
๐ - Mar 08 - [Resecurity] Supply Chain โ The Major Target of Cyberespionage Groups |
๐ - Mar 07 - [Trend Micro] New SLUB Backdoor Uses GitHub, Communicates via Slack |
๐ - Mar 06 - [Cybaze-Yoroi Z-LAB] Operation Pistacchietto |
๐ - Mar 06 - [NTT] Targeted attack using Taidoor Analysis report |
๐ - Mar 06 - [Symantec] Whitefly: Espionage Group has Singapore in Its Sights |
๐ - Mar 04 - [FireEye] APT40: Examining a China-Nexus Espionage Actor |
๐ - Feb 28 - [Marco Ramilli] Ransomware, Trojan and Miner together against โPIK-Groupโ |
๐ - Feb 27 - [Dell] A Peek into BRONZE UNIONโs Toolbox |
๐ - Feb 26 - [Cybaze-Yoroi Z-LAB] The Arsenal Behind the Australian Parliament Hack |
๐ - Feb 25 - [CarbonBlack] Defeating Compiler Level Obfuscations Used in APT10 Malware |
๐ - Feb 20 - [SecureSoft] IT IS IDENTIFIED ATTACKS OF THE CIBERCRIMINAL LAZARUS GROUP DIRECTED TO ORGANIZATIONS IN RUSSIA |
๐ - Feb 18 - [360] APT-C-36: Continuous Attacks Targeting Colombian Government Institutions and Corporations |
๐ - Feb 14 - [360] Suspected Molerats' New Attack in the Middle East |
๐ - Feb 06 - [Recorded Future] APT10 Targeted Norwegian MSP and US Companies in Sustained Campaign |
๐ - Feb 05 - [Anomali] Analyzing Digital Quartermasters in Asia โ Do Chinese and Indian APTs Have a Shared Supply Chain? |
๐ - Feb 01 - [Palo Alto Networks] Tracking OceanLotusโ new Downloader, KerrDown |
๐ - Jan 30 - [Kaspersky] Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities |
๐ - Jan 30 - [NSHC] The Double Life of SectorA05 Nesting in Agora (Operation Kitty Phishing |
๐ - Jan 30 - [Morphisec] NEW CAMPAIGN DELIVERS ORCUS RAT |
๐ - Jan 25 - [LAB52] WIRTE Group attacking the Middle East |
๐ - Jan 24 - [Carbon Black] GandCrab and Ursnif Campaign |
๐ - Jan 18 - [Palo Alto Networks] DarkHydrus delivers new Trojan that can use Google Drive for C2 communications |
๐ - Jan 17 - [Palo Alto Networks] Malware Used by โRockeโ Group Evolves to Evade Detection by Cloud Security Products |
๐ - Jan 16 - [360] Latest Target Attack of DarkHydruns Group Against Middle East |
๐
2018
- Dec 28 - [Medium] Goblin Panda changes the dropper and reuses the old infrastructure |
๐ - Dec 27 - [Cybaze-Yoroi Z-LAB] The Enigmatic โRoma225โ Campaign |
๐ - Dec 20 - [Objective-See] Middle East Cyber-Espionage: analyzing WindShift's implant: OSX.WindTail|
๐ - Dec 18 - [Trend Micro] URSNIF, EMOTET, DRIDEX and BitPaymer Gangs Linked by a Similar Loader |
๐ - Dec 13 - [Certfa] The Return of The Charming Kitten |
๐ - Dec 13 - [Trend Micro] Tildeb: Analyzing the 18-year-old Implant from the Shadow Brokersโ Leak |
๐ - Dec 13 - [Palo Alto Networks] Shamoon 3 Targets Oil and Gas Organization |
๐ - Dec 12 - [McAfee] โOperation Sharpshooterโ Targets Global Defense, Critical Infrastructure |
๐ - Dec 12 - [360] Donot (APT-C-35) Group Is Targeting Pakistani Businessman Working In China |
๐ - Dec 11 - [Cylance] Poking the Bear: Three-Year Campaign Targets Russian Critical Infrastructure |
๐ - Nov ?? - [Google] The Hunt for 3ve |
๐ - Nov 30 - [Trend Micro] New PowerShell-based Backdoor Found in Turkey, Strikingly Similar to MuddyWater Tools |
๐ - Nov 29 - [360] Analysis Of Targeted Attack Against Pakistan By Exploiting InPage Vulnerability And Related APT Groups |
๐ - Nov 28 - [Microsoft] Windows Defender ATP device risk score exposes new cyberattack, drives Conditional access to protect networks |
๐ - Nov 28 - [Clearsky] MuddyWater Operations in Lebanon and Oman |
๐ - Nov 27 - [CISCO] DNSpionage Campaign Targets Middle East |
๐ - Nov 20 - [Trend Micro] Lazarus Continues Heists, Mounts Attacks on Financial Organizations in Latin America |
๐ - Nov 19 - [FireEye] Not So Cozy: An Uncomfortable Examination of a Suspected APT29 Phishing Campaign |
๐ - Nov 13 - [Recorded Future] Chinese Threat Actor TEMP.Periscope Targets UK-Based Engineering Company Using Russian APT Techniques |
๐ - Nov 08 - [Symantec] FASTCash: How the Lazarus Group is Emptying Millions from ATMs |
๐ - Nov 05 - [Palo Alto Networks] Inception Attackers Target Europe with Year-old Office Vulnerability |
๐ - Nov 01 - [Trend Micro] Outlaw group: Perl-Based Shellbot Looks to Target Organizations via C&C |
๐ - Oct 19 - [Kaspersky] DarkPulsar |
๐ - Oct 18 - [Medium] APT Sidewinder changes theirs TTPs to install their backdoor |
๐ - Oct 18 - [CISCO] Tracking Tick Through Recent Campaigns Targeting East Asia |
๐ - Oct 18 - [McAfee] Operation Oceansalt Attacks South Korea, U.S. and Canada with Source Code from Chinese Hacker Group |
๐ - Oct 17 - [Marco Ramilli] MartyMcFly Malware: Targeting Naval Industry |
๐ - Oct 17 - [Cylance] The SpyRATs of OceanLotus: Malware Analysis White Paper |
๐ - Oct 17 - [ESET] GreyEnergy: Updated arsenal of one of the most dangerous threat actors |
๐ - Oct 17 - [Yoroi] Cyber-Espionage Campaign Targeting the Naval Industry (โMartyMcFlyโ) |
๐ - Oct 15 - [Kaspersky] Octopus-infested seas of Central Asia |
๐ - Oct 11 - [Symantec] Gallmaker: New Attack Group Eschews Malware to Live off the Land |
๐ - Oct 10 - [Kaspersky] MuddyWater expands operations |
๐ - Oct 03 - [FireEye] APT38: Details on New North Korean Regime-Backed Threat Group |
๐ - Sep 27 - [ESET] LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group |
๐ - Sep 20 - [360] (Non-English) (CN) PoisonVine |
๐ - Sep 19 - [Antiy] (Non-English) (CN) Green Spot APT |
๐ - Sep 13 - [FireEye] APT10 Targeting Japanese Corporations Using Updated TTPs |
๐ - Sep 10 - [Kaspersky] LuckyMouse signs malicious NDISProxy driver with certificate of Chinese IT company |
๐ - Sep 07 - [Volon] Targeted Attack on Indian Ministry of External Affairs using Crimson RAT |
๐ - Sep 07 - [CheckPoint] Domestic Kitten: An Iranian Surveillance Operation |
๐ - Sep 07 - [Medium] Goblin Panda targets Cambodia sharing capacities with another Chinese group hackers Temp Periscope |
๐ - Sep 04 - [Palo Alto Networks] OilRig Targets a Middle Eastern Government and Adds Evasion Techniques to OopsIE |
๐ - Sep 04 - [Group-IB] Silence: Moving into the darkside |
๐ - Aug 30 - [MalwareBytes] Reversing malware in a custom format: Hidden Bee elements |
๐ - Aug 30 - [CrowdStrike] Two Birds, One STONE PANDA |
๐ - Aug 30 - [Arbor] Double the Infection, Double the Fun |
๐ - Aug 30 - [Dark Matter] COMMSEC: The Trails of WINDSHIFT APT |
๐ - Aug 29 - [Trend Micro] The Urpage Connection to Bahamut, Confucius and Patchwork |
๐ - Aug 28 - [CheckPoint] CeidPageLock: A Chinese RootKit |
๐ - Aug 23 - [Kaspersky] Operation AppleJeus: Lazarus hits cryptocurrency exchange with fake installer and macOS malware |
๐ - Aug 21 - [ESET] TURLA OUTLOOK BACKDOOR |
๐ - Aug 21 - [Trend Micro] Supply Chain Attack Operation Red Signature Targets South Korean Organizations |
๐ - Aug 16 - [Recorded Future] Chinese Cyberespionage Originating From Tsinghua University Infrastructure |
๐ - Aug 09 - [McAfee] Examining Code Reuse Reveals Undiscovered Links Among North Koreaโs Malware Families |
๐ - Aug 02 - [Accenture] Goldfin Security Alert |
๐ - Aug 02 - [Palo Alto Networks] The Gorgon Group: Slithering Between Nation State and Cybercrime |
๐ - Aug 02 - [Medium] Goblin Panda against the Bears |
๐ - Aug 01 - [Medium] Malicious document targets Vietnamese officials |
๐ - Jul 31 - [Palo Alto Networks] Bisonal Malware Used in Attacks Against Russia and South Korea |
๐ - Jul 31 - [Medium] Malicious document targets Vietnamese officials |
๐ - Jul 27 - [Palo Alto Networks] New Threat Actor Group DarkHydrus Targets Middle East Government |
๐ - Jul 23 - [CSE] APT27: A long-term espionage campaign in Syria |
๐ - Jul 16 - [Trend Micro] New Andariel Reconnaissance Tactics Hint At Next Targets |
๐ - Jul 13 - [CSE] Operation Roman Holiday โ Hunting the Russian
APT28 group |
๐ - Jul 12 - [CISCO] Advanced Mobile Malware Campaign in India uses Malicious MDM |
๐ - Jul 09 - [ESET] Certificates stolen from Taiwanese tech-companies misused in Plead malware campaign |
๐ - Jul 08 - [CheckPoint] APT Attack In the Middle East: The Big Bang |
๐ - Jul 08 - [Fortinet] Hussarini โ Targeted Cyber Attack in the Philippines |
๐ - Jun XX - [Ahnlab] Operation Red Gambler |
๐ - Jun 26 - [Palo Alto Networks] RANCOR: Targeted Attacks in South East Asia Using PLAINTEE and DDKONG Malware Families |
๐ - Jun 23 - [Ahnlab] Full Discloser of Andariel,A Subgroup of Lazarus Threat Group |
๐ - Jun 22 - [Palo Alto networks] Tick Group Weaponized Secure USB Drives to Target Air-Gapped Critical Systems |
๐ - Jun 20 - [Symantec] Thrip: Espionage Group Hits Satellite, Telecoms, and Defense Companies |
๐ - Jun 19 - [Kaspersky] Olympic Destroyer is still alive |
๐ - Jun 15 - [CrowdStrike] Meet CrowdStrikeโs Adversary of the Month for June: MUSTANG PANDA |
๐ - Jun 14 - [Trend Micro] Another Potential MuddyWater Campaign uses Powershell-based PRB-Backdoor |
๐ - Jun 14 - [intezer] MirageFox: APT15 Resurfaces With New Tools Based On Old Ones |
๐ - Jun 13 - [Kaspersky] LuckyMouse hits national data center to organize country-level waterholing campaign |
๐ - Jun 07 - [Volexity] Patchwork APT Group Targets US Think Tanks |
๐ - Jun 07 - [ICEBRG] ADOBE FLASH ZERO-DAY LEVERAGED FOR TARGETED ATTACK IN MIDDLE EAST |
๐ - Jun 07 - [FireEye] A Totally Tubular Treatise on TRITON and TriStation |
๐ - Jun 06 - [CISCO] VPNFilter Update - VPNFilter exploits endpoints, targets new devices |
๐ - Jun 06 - [GuardiCore] OPERATION PROWLI: MONETIZING 40,000 VICTIM MACHINES |
๐ - Jun 06 - [Palo Alto Networks] Sofacy Groupโs Parallel Attacks |
๐ - May 31 - [CISCO] NavRAT Uses US-North Korea Summit As Decoy For Attacks In South Korea |
๐ - May 29 - [intezer] Iron Cybercrime Group Under The Scope |
๐ - May 23 - [CISCO] New VPNFilter malware targets at least 500K networking devices worldwide |
๐ - May 23 - [Ahnlab] Andariel Group Trend Report |
๐ - May 23 - [Trend Micro] Confucius Update: New Tools and Techniques, Further Connections with Patchwork |
๐ - May 22 - [Intrusiontruth] The destruction of APT3 |
๐ - May 22 - [ESET] Turla Mosquito: A shift towards more generic tools |
๐ - May 09 - [Recorded Future] Iranโs Hacker Hierarchy Exposed |
๐ - May 09 - [360] Analysis of CVE-2018-8174 VBScript 0day and APT actor related to Office targeted attack |
๐ - May 03 - [ProtectWise] Burning Umbrella |
๐ - May 03 - [Kaspersky] Whoโs who in the Zoo: Cyberespionage operation targets Android users in the Middle East |
๐ - May 03 - [Ahnlab] Detailed Analysis of Red Eyes Hacking Group |
๐ - Apr 27 - [Tencent] OceanLotus new malware analysis |
๐ - Apr 26 - [CISCO] GravityRAT - The Two-Year Evolution Of An APT Targeting India |
๐ - Apr 24 - [FireEye] Metamorfo Campaigns Targeting Brazilian Users |
๐ - Apr 24 - [McAfee] Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide |
๐ - Apr 24 - [ESET] Sednit update: Analysis of Zebrocy |
๐ - Apr 23 - [Accenture] HOGFISH REDLEAVES CAMPAIGN |
๐ - Apr 23 - [Symantec] New Orangeworm attack group targets the healthcare sector in the U.S., Europe, and Asia |
๐ - Apr 23 - [Kaspersky] Energetic Bear/Crouching Yeti: attacks on servers |
๐ - Apr 17 - [NCCGroup] Decoding network data from a Gh0st RAT variant |
๐ - Apr 12 - [Kaspersky] Operation Parliament, who is doing what? |
๐ - Apr 04 - [Trend Micro] New MacOS Backdoor Linked to OceanLotus Found |
๐ - Mar 29 - [Trend Micro] ChessMaster Adds Updated Tools to Its Arsenal |
๐ - Mar 27 - [Arbor] Panda Banker Zeros in on Japanese Targets |
๐ - Mar 23 - [Ahnlab] Targeted Attacks on South Korean Organizations |
๐ - Mar 15 - [US-CERT] Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors |
๐ - Mar 14 - [Symantec] Inception Framework: Alive and Well, and Hiding Behind Proxies |
๐ - Mar 14 - [Trend Micro] Tropic Trooperโs New Strategy |
๐ - Mar 13 - [FireEye] Iranian Threat Group Updates Tactics, Techniques and Procedures in Spear Phishing Campaign |
๐ - Mar 13 - [Kaspersky] Time of death? A therapeutic postmortem of connected medicine |
๐ - Mar 13 - [Proofpoint] Drive-by as a service: BlackTDS |
๐ - Mar 13 - [ESET] OceanLotus: Old techniques, new backdoor |
๐ - Mar 12 - [Trend Micro] Campaign Possibly Connected to โMuddyWaterโ Surfaces in the Middle East and Central Asia |
๐ - Mar 09 - [CitizenLab] BAD TRAFFIC Sandvineโs PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads? |
๐ - Mar 09 - [Kaspersky] Masha and these Bears 2018 Sofacy Activity |
๐ - Mar 09 - [NCC] APT15 is alive and strong: An analysis of RoyalCli and RoyalDNS |
๐ - Mar 09 - [ESET] New traces of Hacking Team in the wild |
๐ - Mar 08 - [McAfee] Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant |
๐ - Mar 08 - [Kaspersky] OlympicDestroyer is here to trick the industry |
๐ - Mar 08 - [Arbor] Donot Team Leverages New Modular Malware Framework in South Asia |
๐ - Mar 08 - [Crysys] Territorial Dispute โ NSAโs perspective on APT landscape |
๐ - Mar 07 - [Palo Alto Networks] Patchwork Continues to Deliver BADNEWS to the Indian Subcontinent |
๐ - Mar 06 - [Kaspersky] The Slingshot APT |
๐ - Mar 05 - [Palo Alto Networks] Sure, Iโll take that! New ComboJack Malware Alters Clipboards to Steal Cryptocurrency |
๐ - Mar 02 - [McAfee] McAfee Uncovers Operation Honeybee, a Malicious Document Campaign Targeting Humanitarian Aid Groups |
๐ - Mar 01 - [Security 0wnage] A Quick Dip into MuddyWater's Recent Activity |
๐ - Feb 28 - [Palo Alto Networks] Sofacy Attacks Multiple Government Entities |
๐ - Feb 28 - [Symantec] Chafer: Latest Attacks Reveal Heightened Ambitions |
๐ - Feb 21 - [Avast] Avast tracks down Tempting Cedar Spyware |
๐ - Feb 20 - [Arbor] Musical Chairs Playing Tetris |
๐ - Feb 20 - [Kaspersky] A Slice of 2017 Sofacy Activity |
๐ - Feb 20 - [FireEye] APT37 (Reaper): The Overlooked North Korean Actor |
๐ - Feb 13 - [Trend Micro] Deciphering Confuciusโ Cyberespionage Operations |
๐ - Feb 13 - [RSA] Lotus Blossom Continues ASEAN Targeting |
๐ - Feb 07 - [CISCO] Targeted Attacks In The Middle East |
๐ - Feb 02 - [McAfee] Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victimsโ Systems |
๐ - Jan 30 - [Palo Alto Networks] Comnie Continues to Target Organizations in East Asia |
๐ - Jan 30 - [RSA] APT32 Continues ASEAN Targeting |
๐ - Jan 29 - [Trend Micro] Hacking Group Spies on Android Users in India Using PoriewSpy |
๐ - Jan 29 - [Palo Alto Networks] VERMIN: Quasar RAT and Custom Malware Used In Ukraine |
๐ - Jan 27 - [Accenture] DRAGONFISH DELIVERS NEW FORM OF ELISE MALWARE TARGETING ASEAN DEFENCE MINISTERSโ MEETING AND ASSOCIATES |
๐ - Jan 26 - [Palo Alto Networks] The TopHat Campaign: Attacks Within The Middle East Region Using Popular Third-Party Services |
๐ - Jan 25 - [Palo Alto Networks] OilRig uses RGDoor IIS Backdoor on Targets in the Middle East |
๐ - Jan 24 - [Trend Micro] Lazarus Campaign Targeting Cryptocurrencies Reveals Remote Controller Tool, an Evolved RATANKBA, and More |
๐ - Jan 18 - [NCSC] Turla group update Neuron malware |
๐ - Jan 17 - [Lookout] Dark Caracal |
๐ - Jan 16 - [Kaspersky] Skygofree: Following in the footsteps of HackingTeam |
๐ - Jan 16 - [Recorded Future] North Korea Targeted South Korean Cryptocurrency Users and Exchange in Late 2017 Campaign |
๐ - Jan 16 - [CISCO] Korea In The Crosshairs |
๐ - Jan 15 - [Trend Micro] New KillDisk Variant Hits Financial Organizations in Latin America |
๐ - Jan 12 - [Trend Micro] Update on Pawn Storm: New Targets and Politically Motivated Campaigns |
๐ - Jan 11 - [McAfee] North Korean Defectors and Journalists Targeted Using Social Networks and KakaoTalk |
๐ - Jan 09 - [ESET] Diplomats in Eastern Europe bitten by a Turla mosquito |
๐ - Jan 06 - [McAfee] Malicious Document Targets Pyeongchang Olympics |
๐ - Jan 04 - [Carnegie] Iranโs Cyber Threat: Espionage, Sabotage, and Revenge |
๐
2017
- Dec 19 - [Proofpoint] North Korea Bitten by Bitcoin Bug: Financially motivated campaigns reveal new dimension of the Lazarus Group |
๐ - Dec 17 - [McAfee] Operation Dragonfly Analysis Suggests Links to Earlier Attacks |
๐ - Dec 14 - [FireEye] Attackers Deploy New ICS Attack Framework โTRITONโ and Cause Operational Disruption to Critical Infrastructure |
๐ - Dec 11 - [Group-IB] MoneyTaker, revealed after 1.5 years of silent operations. |
๐ - Dec 11 - [Trend Micro] Untangling the Patchwork Cyberespionage Group |
๐ - Dec 07 - [FireEye] New Targeted Attack in the Middle East by APT34, a Suspected Iranian Threat Group, Using CVE-2017-11882 Exploit |
๐ - Dec 05 - [ClearSky] Charming Kitten: Iranian Cyber Espionage Against Human Rights Activists, Academic Researchers and Media Outlets โ And the HBO Hacker Connection |
๐ - Dec 04 - [RSA] The Shadows of Ghosts: Inside the Response of a Unique Carbanak Intrusion |
๐ - Nov 22 - [REAQTA] A dive into MuddyWater APT targeting Middle-East |
๐ - Nov 14 - [Palo Alto Networks] Muddying the Water: Targeted Attacks in the Middle East |
๐ - Nov 10 - [Palo Alto Networks] New Malware with Ties to SunOrcal Discovered |
๐ - Nov 07 - [McAfee] Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack |
๐ - Nov 07 - [Symantec] Sowbug: Cyber espionage group targets South American and Southeast Asian governments |
๐ - Nov 06 - [Trend Micro] ChessMasterโs New Strategy: Evolving Tools and Tactics |
๐ - Nov 06 - [Volexity] OceanLotus Blossoms: Mass Digital Surveillance and Attacks Targeting ASEAN, Asian Nations, the Media, Human Rights Groups, and Civil Society |
๐ - Nov 02 - [Palo Alto Networks] Recent InPage Exploits Lead to Multiple Malware Families |
๐ - Nov 02 - [PwC] The KeyBoys are back in town |
๐ - Nov 02 - [Clearsky] LeetMX โ a Yearlong Cyber-Attack Campaign Against Targets in Latin America |
๐ - Nov 02 - [RISKIQ] New Insights into Energetic Bearโs Watering Hole Attacks on Turkish Critical Infrastructure |
๐ - Oct 31 - [Cybereason] Night of the Devil: Ransomware or wiper? A look into targeted attacks in Japan using MBR-ONI |
๐ - Oct 30 - [Kaspersky] Gaza Cybergang โ updated activity in 2017 |
๐ - Oct 27 - [Bellingcat] Bahamut Revisited, More Cyber Espionage in the Middle East and South Asia |
๐ - Oct 24 - [ClearSky] Iranian Threat Agent Greenbug Impersonates Israeli High-Tech and Cyber Security Companies |
๐ - Oct 19 - [Bitdefender] Operation PZCHAO |
๐ - Oct 16 - [BAE Systems] Taiwan Heist: Lazarus Tools And Ransomware |
๐ - Oct 16 - [Kaspersky] BlackOasis APT and new targeted attacks leveraging zero-day exploit |
๐ - OCt 16 - [Proofpoint] Leviathan: Espionage actor spearphishes maritime and defense targets |
๐ - Oct 12 - [Dell] BRONZE BUTLER Targets Japanese Enterprises |
๐ - Oct 10 - [Trustwave] Post Soviet Bank Heists |
๐ - Oct 02 - [intezer] Evidence Aurora Operation Still Active Part 2: More Ties Uncovered Between CCleaner Hack & Chinese Hackers |
๐ - Sep XX - [MITRE] APT3 Adversary Emulation Plan |
๐ - Sep 28 - [Palo Alto Networks] Threat Actors Target Government of Belarus Using CMSTAR Trojan |
๐ - Sep 20 - [intezer] Evidence Aurora Operation Still Active: Supply Chain Attack Through CCleaner |
๐ - Sep 20 - [FireEye] Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware |
๐ - Sep 20 - [CISCO] CCleaner Command and Control Causes Concern |
๐ - Sep 18 - [CISCO] CCleanup: A Vast Number of Machines at Risk |
๐ - Sep 18 - [Kaspersky] An (un)documented Word feature abused by attackers|
๐ - Sep 12 - [FireEye] FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY |
๐ - Sep 06 - [Symantec] Dragonfly: Western energy sector targeted by sophisticated attack group |
๐ - Sep 06 - [Treadstone 71] Intelligence Games in the Power Grid |
๐ - Aug 30 - [ESET] Gazing at Gazer: Turlaโs new second stage backdoor |
๐ - Aug 30 - [Kaspersky] Introducing WhiteBear |
๐ - Aug 25 - [Proofpoint] Operation RAT Cook: Chinese APT actors use fake Game of Thrones leaks as lures |
๐ - Aug 18 - [RSA] Russian Bank Offices Hit with Broad Phishing Wave |
๐ - Aug 17 - [Proofpoint] Turla APT actor refreshes KopiLuwak JavaScript backdoor for use in G20-themed attack |
๐ - Aug 15 - [Palo Alto Networks] The Curious Case of Notepad and Chthonic: Exposing a Malicious Infrastructure |
๐ - Aug 11 - [FireEye] APT28 Targets Hospitality Sector, Presents Threat to Travelers |
๐ - Aug 08 - [Kaspersky] APT Trends report Q2 2017 |
๐ - Aug 01 - [Positive Research] Cobalt strikes back: an evolving multinational threat to finance |
๐ - Jul 27 - [Trend Micro] ChessMaster Makes its Move: A Look into the Campaignโs Cyberespionage Arsenal |
๐ - Jul 27 - [Palo Alto Networks] OilRig Uses ISMDoor Variant; Possibly Linked to Greenbug Threat Group |
๐ - Jul 27 - [Clearsky, Trend Micro] Operation Wilted Tulip |
๐ - Jul 24 - [Palo Alto Networks] โTickโ Group Continues Attacks |
๐ - Jul 18 - [Clearsky] Recent Winnti Infrastructure and Samples |
๐ - Jul 18 - [Bitdefender] Inexsmar: An unusual DarkHotel campaign |
๐ - Jul 11 - [ProtectWise] Winnti Evolution - Going Open Source |
๐ - Jul 10 - [Trend Micro] OSX Malware Linked to Operation Emmental Hijacks User Network Traffic |
๐ - Jul 06 - [Malware Party] Operation Desert Eagle |
๐ - Jul 05 - [Citizen Lab] Insider Information: An intrusion campaign targeting Chinese language news sites |
๐ - Jun 30 - [ESET] TeleBots are back: supply-chain attacks against Ukraine |
๐ - Jun 30 - [Kaspersky] From BlackEnergy to ExPetr |
๐ - Jun 26 - [Dell] Threat Group-4127 Targets Google Accounts |
๐ - Jun 22 - [Palo Alto Networks] The New and Improved macOS Backdoor from OceanLotus |
๐ - Jun 22 - [Trend Micro] Following the Trail of BlackTechโs Cyber Espionage Campaigns |
๐ - Jun 19 - [root9B] SHELLTEA + POSLURP MALWARE: memory resident point-of-sale malware attacks industry |
๐ - Jun 18 - [Palo Alto Networks] APT3 Uncovered: The code evolution of Pirpi |
๐ - Jun 15 - [Recorded Future] North Korea Is Not Crazy |
๐ - Jun 14 - [ThreatConnect] KASPERAGENT Malware Campaign resurfaces in the run up to May Palestinian Authority Elections |
๐ - Jun 13 - [US-CERT] HIDDEN COBRA โ North Koreaโs DDoS Botnet Infrastructure |
๐ - Jun 12 - [Dragos] CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations |
๐ - Jun 12 - [ESET] WIN32/INDUSTROYER A new threat for industrial control systems |
๐ - May 30 - [Group-IB] Lazarus Arisen: Architecture, Techniques and Attribution |
๐ - May 24 - [Cybereason] OPERATION COBALT KITTY: A LARGE-SCALE APT IN ASIA CARRIED OUT BY THE OCEANLOTUS GROUP |
๐ - May 14 - [FireEye] Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations |
๐ - May 03 - [Palo Alto Networks] Kazuar: Multiplatform Espionage Backdoor with API Access |
๐ - May 03 - [CISCO] KONNI: A Malware Under The Radar For Years |
๐ - Apr 27 - [Morphisec] Iranian Fileless Attack Infiltrates Israeli Organizations |
๐ - Apr 13 - [F-SECURE] Callisto Group |
๐ - Apr 11 - [Kaspersky] Unraveling the Lamberts Toolkit |
๐ - Apr 10 - [Symantec] Longhorn: Tools used by cyberespionage group linked to Vault 7 |
๐ - Apr 06 - [PwC] Operation Cloud Hopper |
๐ - Apr 05 - [Palo Alto Networks, Clearsky] Targeted Attacks in the Middle East Using KASPERAGENT and MICROPSIA |
๐ - Mar 15 - [JPCERT] FHAPPI Campaign |
๐ - Mar 14 - [Clearsky] Operation Electric Powder โ Who is targeting Israel Electric Company? |
๐ - Mar 08 - [Netskope] Targeted Attack Campaigns with Multi-Variate Malware Observed in the Cloud |
๐ - Mar 06 - [Kaspersky] From Shamoon to StoneDrill |
๐ - Feb 28 - [IBM] Dridexโs Cold War: Enter AtomBombing |
๐ - Feb 27 - [Palo Alto Networks] The Gamaredon Group Toolset Evolution |
๐ - Feb 23 - [Bitdefender] Dissecting the APT28 Mac OS X Payload |
๐ - Feb 22 - [FireEye] Spear Phishing Techniques Used in Attacks Targeting the Mongolian Government |
๐ - Feb 21 - [Arbor] Additional Insights on Shamoon2 |
๐ - Feb 20 - [BAE Systems] azarus' False Flag Malware |
๐ - Feb 17 - [JPCERT] ChChes - Malware that Communicates with C&C Servers Using Cookie Headers |
๐ - Feb 16 - [BadCyber] Technical analysis of recent attacks against Polish banks |
๐ - Feb 15 - [Morphick] Deep Dive On The DragonOK Rambo Backdoor |
๐ - Feb 15 - [IBM] The Full Shamoon: How the Devastating Malware Was Inserted Into Networks |
๐ - Feb 15 - [Dell] Iranian PupyRAT Bites Middle Eastern Organizations |
๐ - Feb 15 - [Palo Alto Networks] Magic Hound Campaign Attacks Saudi Targets |
๐ - Feb 14 - [Medium] Operation Kingphish: Uncovering a Campaign of Cyber Attacks against Civil Society in Qatar and Nepal |
๐ - Feb 12 - [BAE Systems] Lazarus & Watering-Hole Attacks |
๐ - Feb 10 - [Cysinfo] Cyber Attack Targeting Indian Navy's Submarine And Warship Manufacturer |
๐ - Feb 10 - [DHS] Enhanced Analysis of GRIZZLY STEPPE Activity |
๐ - Feb 03 - [RSA] KingSlayer A Supply chain attack |
๐ - Feb 03 - [BadCyber] Several Polish banks hacked, information stolen by unknown attackers |
๐ - Feb 02 - [Proofpoint] Oops, they did it again: APT Targets Russia and Belarus with ZeroT and PlugX |
๐ - Jan 30 - [Palo Alto Networks] Downeks and Quasar RAT Used in Recent Targeted Attacks Against Governments |
๐ - Jan 25 - [Microsoft] Detecting threat actors in recent German industrial attacks with Windows Defender ATP |
๐ - Jan 19 - [Cysinfo] URI Terror Attack & Kashmir Protest Themed Spear Phishing Emails Targeting Indian Embassies And Indian Ministry Of External Affairs |
๐ - Jan 18 - [Trustwave] Operation Grand Mars: Defending Against Carbanak Cyber Attacks |
๐ - Jan 15 - [tr1adx] Bear Spotting Vol. 1: Russian Nation State Targeting of Government and Military Interests |
๐ - Jan 12 - [Kaspersky] The โEyePyramidโ attacks |
๐ - Jan 11 - [FireEye] APT28: AT THE CENTER OF THE STORM |
๐ - Jan 09 - [Palo Alto Networks] Second Wave of Shamoon 2 Attacks Identified |
๐ - Jan 05 - [Clearsky] Iranian Threat Agent OilRig Delivers Digitally Signed Malware, Impersonates University of Oxford |
๐
2016
- Dec 15 - [Microsoft] PROMETHIUM and NEODYMIUM APT groups on Turkish citizens living in Turkey and various other European countries. |
๐ - Dec 13 - [ESET] The rise of TeleBots: Analyzing disruptive KillDisk attacks |
๐ - Nov 30 - [Cysinfo] MALWARE ACTORS USING NIC CYBER SECURITY THEMED SPEAR PHISHING TO TARGET INDIAN GOVERNMENT ORGANIZATIONS |
๐ - Nov 22 - [Palo Alto Networks] Tropic Trooper Targets Taiwanese Government and Fossil Fuel Provider With Poison Ivy |
๐ - Nov 09 - [Fidelis] Down the H-W0rm Hole with Houdini's RAT |
๐ - Nov 03 - [Booz Allen] When The Lights Went Out: Ukraine Cybersecurity Threat Briefing |
๐ - Oct 31 - [Palo Alto Networks] Emissary Trojan Changelog: Did Operation Lotus Blossom Cause It to Evolve? |
๐ - Oct 27 - [ESET] En Route with Sednit Part 3: A Mysterious Downloader |
๐ - Oct 27 - [Trend Micro] BLACKGEAR Espionage Campaign Evolves, Adds Japan To Target List |
๐ - Oct 26 - [Vectra Networks] Moonlight โ Targeted attacks in the Middle East |
๐ - Oct 25 - [Palo Alto Networks] Houdiniโs Magic Reappearance |
๐ - Oct 25 - [ESET] En Route with Sednit Part 2: Lifting the lid on Sednit: A closer look at the software it uses |
๐ - Oct 20 - [ESET] En Route with Sednit Part 1: Approaching the Target |
๐ - Oct 17 - [ThreatConnect] ThreatConnect identifies Chinese targeting of two companies. Economic espionage or military intelligence? |
๐ - Oct 05 - [Kaspersky] Wave your false flags |
๐ - Oct 03 - [Kaspersky] On the StrongPity Waterhole Attacks Targeting Italian and Belgian Encryption Users |
๐ - Sep 29 - [NATO CCD COE] China and Cyber: Attitudes, Strategies, Organisation |
๐ - Sep 28 - [Palo Alto Networks] Confucius SaysโฆMalware Families Get Further By Abusing Legitimate Websites |
๐ - Sep 28 - [ThreatConnect] Belling the BEAR: russia-hacks-bellingcat-mh17-investigation |
๐ - Sep 26 - [Palo Alto Networks] Sofacyโs โKomplexโ OS X Trojan |
๐ - Sep 18 - [Cyberkov] Hunting Libyan Scorpions |
๐ - Sep 14 - [Palo Alto Networks] MILE TEA: Cyber Espionage Campaign Targets Asia Pacific Businesses and Government Agencies |
๐ - Sep 06 - [Symantec] Buckeye cyberespionage group shifts gaze from US to Hong Kong |
๐ - Sep 01 - [IRAN THREATS] MALWARE POSING AS HUMAN RIGHTS ORGANIZATIONS AND COMMERCIAL SOFTWARE TARGETING IRANIANS, FOREIGN POLICY INSTITUTIONS AND MIDDLE EASTERN COUNTRIES |
๐ - Aug 25 - [Lookout] Technical Analysis of Pegasus Spyware |
๐ - Aug 24 - [Citizen Lab] The Million Dollar Dissident: NSO Groupโs iPhone Zero-Days used against a UAE Human Rights Defender |
๐ - Aug 19 - [ThreatConnect] Russian Cyber Operations on Steroids |
๐ - Aug 17 - [Kaspersky] Operation Ghoul: targeted attacks on industrial and engineering organizations |
๐ - Aug 16 - [Palo Alto Networks] Aveo Malware Family Targets Japanese Speaking Users |
๐ - Aug 11 - [IRAN THREATS] Iran and the Soft War for Internet Dominance |
๐ - Aug 08 - [Forcepoint] MONSOON |
๐ - Aug 08 - [Kaspersky] ProjectSauron: top level cyber-espionage platform covertly extracts encrypted government comms |
๐ - Aug 07 - [Symantec] Strider: Cyberespionage group turns eye of Sauron on targets |
๐ - Aug 06 - [360] APT-C-09 |
๐ - Aug 04 - [Recorded Future] Running for Office: Russian APT Toolkits Revealed |
๐ - Aug 03 - [EFF] Operation Manul: I Got a Letter From the Government the Other Day...Unveiling a Campaign of Intimidation, Kidnapping, and Malware in Kazakhstan |
๐ - Aug 02 - [Citizen Lab] Group5: Syria and the Iranian Connection |
๐ - Jul 28 - [ICIT] Chinaโs Espionage Dynasty |
๐ - Jul 26 - [Palo Alto Networks] Attack Delivers โ9002โ Trojan Through Google Drive |
๐ - Jul 21 - [360] Sphinx (APT-C-15) Targeted cyber-attack in the Middle East |
๐ - Jul 21 - [RSA] Hide and Seek: How Threat Actors Respond in the Face of Public Exposure |
๐ - Jul 13 - [SentinelOne] State-Sponsored SCADA Malware targeting European Energy Companies |
๐ - Jul 12 - [F-SECURE] NanHaiShu: RATing the South China Sea |
๐ - Jul 08 - [Kaspersky] The Dropping Elephant โ aggressive cyber-espionage in the Asian region |
๐ - Jul 07 - [Proofpoint] NetTraveler APT Targets Russian, European Interests |
๐ - Jul 07 - [Cymmetria] UNVEILING PATCHWORK: THE COPY-PASTE APT |
๐ - Jul 03 - [Check Point] From HummingBad to Worse |
๐ - Jul 01 - [Bitdefender] Pacifier APT |
๐ - Jul 01 - [ESET] Espionage toolkit targeting Central and Eastern Europe uncovered |
๐ - Jun 30 - [JPCERT] Asruex: Malware Infecting through Shortcut Files |
๐ - Jun 28 - [Palo Alto Networks] Prince of Persia โ Game Over |
๐ - Jun 28 - [JPCERT] (Japan)Attack Tool Investigation |
๐ - Jun 26 - [Trend Micro] The State of the ESILE/Lotus Blossom Campaign |
๐ - Jun 26 - [Cylance] Nigerian Cybercriminals Target High-Impact Industries in India via Pony |
๐ - Jun 23 - [Palo Alto Networks] Tracking Elirks Variants in Japan: Similarities to Previous Attacks |
๐ - Jun 21 - [Fortinet] The Curious Case of an Unknown Trojan Targeting German-Speaking Users |
๐ - Jun 21 - [FireEye] Redline Drawn: China Recalculates Its Use of Cyber Espionage |
๐ - Jun 21 - [ESET] Visiting The Bear Den |
๐ - Jun 17 - [Kaspersky] Operation Daybreak |
๐ - Jun 16 - [Dell] Threat Group-4127 Targets Hillary Clinton Presidential Campaign |
๐ - Jun 15 - [CrowdStrike] Bears in the Midst: Intrusion into the Democratic National Committee |
๐ - Jun 09 - [Clearsky] Operation DustySky Part 2 |
๐ - Jun 02 - [Trend Micro] FastPOS: Quick and Easy Credit Card Theft |
๐ - May 27 - [Trend Micro] IXESHE Derivative IHEATE Targets Users in America |
๐ - May 26 - [Palo Alto Networks] The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor |
๐ - May 25 - [Kaspersky] CVE-2015-2545: overview of current threats |
๐ - May 24 - [Palo Alto Networks] New Wekby Attacks Use DNS Requests As Command and Control Mechanism |
๐ - May 23 - [MELANI:GovCERT] APT Case RUAG Technical Report |
๐ - May 22 - [FireEye] TARGETED ATTACKS AGAINST BANKS IN THE MIDDLE EAST |
๐ - May 22 - [Palo Alto Networks] Operation Ke3chang Resurfaces With New TidePool Malware |
๐ - May 18 - [ESET] Operation Groundbait: Analysis of a surveillance toolkit |
๐ - May 17 - [FOX-IT] Mofang: A politically motivated information stealing adversary |
๐ - May 17 - [Symantec] Indian organizations targeted in Suckfly attacks |
๐ - May 10 - [Trend Micro] Backdoor as a Software Suite: How TinyLoader Distributes and Upgrades PoS Threats | paper |
๐ - May 09 - [CMU SEI] Using Honeynets and the Diamond Model for ICS Threat Analysis |
๐ - May 06 - [PwC] Exploring CVE-2015-2545 and its users |
๐ - May 05 - [Forcepoint] Jaku: an on-going botnet campaign |
๐ - May 02 - [Team Cymru] GOZNYM MALWARE target US, AT, DE |
๐ - May 02 - [Palo Alto Networks] Prince of Persia: Infy Malware Active In Decade of Targeted Attacks |
๐ - Apr 27 - [Kaspersky] Repackaging Open Source BeEF for Tracking and More |
๐ - Apr 26 - [Financial Times] Cyber warfare: Iran opens a new front |
๐ - Apr 26 - [Arbor] New Poison Ivy Activity Targeting Myanmar, Asian Countries |
๐ - Apr 22 - [Cylance] The Ghost Dragon |
๐ - Apr 21 - [SentinelOne] Teaching an old RAT new tricks |
๐ - Apr 21 - [Palo Alto Networks] New Poison Ivy RAT Variant Targets Hong Kong Pro-Democracy Activists |
๐ - Apr 18 - [Citizen Lab] Between Hong Kong and Burma: Tracking UP007 and SLServer Espionage Campaigns |
๐ - Apr 15 - [SANS] Detecting and Responding Pandas and Bears |
๐ - Apr 12 - [Microsoft] PLATINUM: Targeted attacks in South and Southeast Asia |
๐ - Mar 25 - [Palo Alto Networks] ProjectM: Link Found Between Pakistani Actor and Operation Transparent Tribe |
๐ - Mar 23 - [Trend Micro] Operation C-Major: Information Theft Campaign Targets Military Personnel in India |
๐ - Mar 18 - [SANS] Analysis of the Cyber Attack on the Ukrainian Power Grid: Defense Use Case |
๐ - Mar 17 - [PwC] Taiwan Presidential Election: A Case Study on Thematic Targeting |
๐ - Mar 15 - [Symantec] Suckfly: Revealing the secret life of your code signing certificates |
๐ - Mar 14 - [Proofpoint] Bank robbery in progress: New attacks from Carbanak group target banks in Middle East and US |
๐ - Mar 10 - [Citizen Lab] Shifting Tactics: Tracking changes in years-long espionage campaign against Tibetans |
๐ - Mar 09 - [FireEye] LESSONS FROM OPERATION RUSSIANDOLL |
๐ - Mar 08 - [360] Operation OnionDog: A 3 Year Old APT Focused On the Energy and Transportation Industries in Korean-language Countries |
๐ - Mar 03 - [Recorded Future] Shedding Light on BlackEnergy With Open Source Intelligence |
๐ - Mar 01 - [Proofpoint] Operation Transparent Tribe - APT Targeting Indian Diplomatic and Military Interests |
๐ - Feb 29 - [Fidelis] The Turbo Campaign, Featuring Derusbi for 64-bit Linux |
๐ - Feb 24 - [NOVETTA] Operation Blockbuster |
๐ - Feb 23 - [Cylance] OPERATION DUST STORM |
๐ - Feb 12 - [Palo Alto Networks] A Look Into Fysbis: Sofacyโs Linux Backdoor |
๐ - Feb 11 - [Recorded Future] Hacktivism: India vs. Pakistan |
๐ - Feb 09 - [Kaspersky] Poseidon Group: a Targeted Attack Boutique specializing in global cyber-espionage |
๐ - Feb 08 - [ICIT] Know Your Enemies 2.0: A Primer on Advanced Persistent Threat Groups |
๐ - Feb 04 - [Palo Alto Networks] T9000: Advanced Modular Backdoor Uses Complex Anti-Analysis Techniques |
๐ - Feb 03 - [Palo Alto Networks] Emissary Trojan Changelog: Did Operation Lotus Blossom Cause It to Evolve? |
๐ - Feb 01 - [Sucuri] Massive Admedia/Adverting iFrame Infection |
๐ - Feb 01 - [IBM] Organized Cybercrime Big in Japan: URLZone Now on the Scene |
๐ - Jan 29 - [F5] Tinbapore: Millions of Dollars at Risk |
๐ - Jan 29 - [Zscaler] Malicious Office files dropping Kasidet and Dridex |
๐ - Jan 28 - [Kaspersky] BlackEnergy APT Attacks in Ukraine employ spearphishing with Word documents |
๐ - Jan 27 - [Fidelis] Dissecting the Malware Involved in the INOCNATION Campaign |
๐ - Jan 26 - [SentinelOne] Analyzing a New Variant of BlackEnergy 3 |
๐ - Jan 24 - [Palo Alto Networks] Scarlet Mimic: Years-Long Espionage Campaign Targets Minority Activists |
๐ - Jan 21 - [Palo Alto Networks] NetTraveler Spear-Phishing Email Targets Diplomat of Uzbekistan |
๐ - Jan 19 - [360] 2015 APT Annual Report |
๐ - Jan 14 - [CISCO] RESEARCH SPOTLIGHT: NEEDLES IN A HAYSTACK |
๐ - Jan 14 - [Symantec] The Waterbug attack group |
๐ - Jan 07 - [Clearsky] Operation DustySky |
๐ - Jan 07 - [CISCO] RIGGING COMPROMISE - RIG EXPLOIT KIT |
๐ - Jan 03 - [ESET] BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry |
๐
2015
- Dec 23 - [PwC] ELISE: Security Through Obesity |
๐ - Dec 22 - [Palo Alto Networks] BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger |
๐ - Dec 20 - [FireEye] The EPS Awakens - Part 2 |
๐ - Dec 18 - [Palo Alto Networks] Attack on French Diplomat Linked to Operation Lotus Blossom |
๐ - Dec 16 - [Bitdefender] APT28 Under the Scope - A Journey into Exfiltrating Intelligence and Government Information |
๐ - Dec 16 - [Trend Micro] Operation Black Atlas, Part 2: Tools and Malware Used and How to Detect Them |
๐ - Dec 16 - [Fidelis] Dissecting the Malware Involved in the INOCNATION Campaign |
๐ - Dec 15 - [AirBus] Newcomers in the Derusbi family |
๐ - Dec 08 - [Citizen Lab] Packrat: Seven Years of a South American Threat Actor |
๐ - Dec 07 - [FireEye] Financial Threat Group Targets Volume Boot Record |
๐ - Dec 07 - [Symantec] Iran-based attackers use back door threats to spy on Middle Eastern targets |
๐ - Dec 04 - [Kaspersky] Sofacy APT hits high profile targets with updated toolset |
๐ - Dec 01 - [FireEye] China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets |
๐ - Nov 30 - [FOX-IT] Ponmocup A giant hiding in the shadows |
๐ - Nov 24 - [Palo Alto Networks] Attack Campaign on the Government of Thailand Delivers Bookworm Trojan |
๐ - Nov 23 - [Minerva Labs, ClearSky] CopyKittens Attack Group |
๐ - Nov 23 - [RSA] PEERING INTO GLASSRAT |
๐ - Nov 23 - [Trend Micro] Prototype Nation: The Chinese Cybercriminal Underground in 2015 |
๐ - Nov 19 - [Kaspersky] Russian financial cybercrime: how it works |
๐ - Nov 19 - [JPCERT] Decrypting Strings in Emdivi |
๐ - Nov 18 - [Palo Alto Networks] TDrop2 Attacks Suggest Dark Seoul Attackers Return |
๐ - Nov 18 - [CrowdStrike] Sakula Reloaded |
๐ - Nov 18 - [Damballa] Damballa discovers new toolset linked to Destover Attackerโs arsenal helps them to broaden attack surface |
๐ - Nov 16 - [FireEye] WitchCoven: Exploiting Web Analytics to Ensnare Victims |
๐ - Nov 10 - [Palo Alto Networks] Bookworm Trojan: A Model of Modular Architecture |
๐ - Nov 09 - [Check Point] Rocket Kitten: A Campaign With 9 Lives |
๐ - Nov 04 - [RSA] Evolving Threats:dissection of a CyberEspionage attack |
๐ - Oct 16 - [Citizen Lab] Targeted Malware Attacks against NGO Linked to Attacks on Burmese Government Websites(https://otx.alienvault.com/pulse/5621208f4637f21ecf2aac36/) |
๐ - Oct 15 - [Citizen Lab] Pay No Attention to the Server Behind the Proxy: Mapping FinFisherโs Continuing Proliferation |
๐ - Oct 05 - [Recorded Future] Proactive Threat Identification Neutralizes Remote Access Trojan Efficacy |
๐ - Oct 03 - [Cybereason] Webmail Server APT: A New Persistent Attack Methodology Targeting Microsoft Outlook Web Application (OWA) |
๐ - Sep 23 - [ThreatConnect] PROJECT CAMERASHY: CLOSING THE APERTURE ON CHINAโS UNIT 78020 | PDF |
๐ - Sep 17 - [F-SECURE] The Dukes 7 Years of Russian Cyber Espionage - PDF |
๐ - Sep 16 - [Proofpoint] The shadow knows: Malvertising campaigns use domain shadowing to pull in Angler EK |
๐ - Sep 16 - [Trend Micro] Operation Iron Tiger: How China-Based Actors Shifted Attacks from APAC to US Targets | IOC |
๐ - Sep 15 - [Proofpoint] In Pursuit of Optical Fibers and Troop Intel: Targeted Attack Distributes PlugX in Russia |
๐ - Sep 09 - [Trend Micro] Shadow Force Uses DLL Hijacking, Targets South Korean Company |
๐ - Sep 09 - [Kaspersky] Satellite Turla: APT Command and Control in the Sky |
๐ - Sep 08 - [Palo Alto Networks] Musical Chairs: Multi-Year Campaign Involving New Variant of Gh0st Malware |
๐ - Sep 01 - [Trend Micro, Clearsky] The Spy Kittens Are Back: Rocket Kitten 2 | PDF |
๐ - Aug 20 - [Arbor] PlugX Threat Activity in Myanmar |
๐ - Aug 20 - [Kaspersky] New activity of the Blue Termite APT |
๐ - Aug 19 - [Symantec] New Internet Explorer zero-day exploited in Hong Kong attacks |
๐ - Aug 10 - [ShadowServer] The Italian Connection: An analysis of exploit supply chains and digital quartermasters |
๐ - Aug 08 - [Cyint] Threat Analysis: Poison Ivy and Links to an Extended PlugX Campaign |
๐ - Aug 05 - [Dell] Threat Group-3390 Targets Organizations for Cyberespionage |
๐ - Aug 04 - [RSA] Terracotta VPN: Enabler of Advanced Threat Anonymity |
๐ - Jul 30 - [ESET] Operation Potao Express | IOC |
๐ - Jul 28 - [Symantec] Black Vine: Formidable cyberespionage group targeted aerospace, healthcare since 2012 |
๐ - Jul 27 - [FireEye] HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group |
๐ - Jul 22 - [F-SECURE] Duke APT group's latest tools: cloud services and Linux support |
๐ - Jul 20 - [ThreatConnect] China Hacks the Peace Palace: All Your EEZโs Are Belong to Us |
๐ - Jul 20 - [Palo Alto Networks] Watering Hole Attack on Aerospace Firm Exploits CVE-2015-5122 to Install IsSpace Backdoor |
๐ - Jul 14 - [Palo Alto Networks] Tracking MiniDionis: CozyCarโs New Ride Is Related to Seaduke |
๐ - Jul 14 - [Trend Micro] An In-Depth Look at How Pawn Stormโs Java Zero-Day Was Used |
๐ - Jul 13 - [Symantec] "Forkmeiamfamous": Seaduke, latest weapon in the Duke armory |
๐ - Jul 13 - [FireEye] Demonstrating Hustle, Chinese APT Groups Quickly Use Zero-Day Vulnerability CVE-2015-5119 Following Hacking Team Leak |
๐ - Jul 10 - [Palo Alto Networks] APT Group UPS Targets US Government with Hacking Team Flash Exploit |
๐ - Jul 09 - [Symantec] Butterfly: Corporate spies out for financial gain |
๐ - Jul 08 - [Kaspersky] Wild Neutron โ Economic espionage threat actor returns with new tricks |
๐ - Jul 08 - [Volexity] APT Group Wekby Leveraging Adobe Flash Exploit (CVE-2015-5119) |
๐ - Jun 30 - [ESET] Dino โ the latest spying malware from an allegedly French espionage group analyzed |
๐ - Jun 28 - [Dragon Threat Labs] APT on Taiwan - insight into advances of adversary TTPs |
๐ - Jun 26 - [FireEye] Operation Clandestine Wolf โ Adobe Flash Zero-Day in APT3 Phishing Campaign |
๐ - Jun 24 - [PwC] UnFIN4ished Business (FIN4) |
๐ - Jun 22 - [Kaspersky] Winnti targeting pharmaceutical companies |
๐ - Jun 16 - [Palo Alto Networks] Operation Lotus Bloom |
๐ - Jun 15 - [Citizen Lab] Targeted Attacks against Tibetan and Hong Kong Groups Exploiting CVE-2014-4114 |
๐ - Jun 12 - [Volexity] Afghan Government Compromise: Browser Beware |
๐ - Jun 10 - [Kaspersky] The_Mystery_of_Duqu_2_0 IOC Yara |
๐ - Jun 10 - [Crysys] Duqu 2.0 |
๐ - Jun 09 - [Microsoft] Duqu 2.0 Win32k Exploit Analysis |
๐ - Jun 04 - [JP Internet Watch] Blue Thermite targeting Japan (CloudyOmega) |
๐ - Jun 03 - [ClearSky] Thamar Reservoir |
๐ - May 29 - [360] OceanLotusReport |
๐ - May 28 - [Kaspersky] Grabit and the RATs |
๐ - May 27 - [Antiy Labs] Analysis On Apt-To-Be Attack That Focusing On China's Government Agency' |
๐ - May 27 - [CyberX] BlackEnergy 3 โ Exfiltration of Data in ICS Networks |
๐ - May 26 - [ESET] Dissecting-Linux/Moose |
๐ - May 21 - [Kaspersky] The Naikon APT and the MsnMM Campaigns |
๐ - May 19 - [Panda] Operation 'Oil Tanker' |
๐ - May 18 - [Palo Alto Networks] Cmstar Downloader: Lurid and Enfalโs New Cousin |
๐ - May 14 - [Trend Micro] Operation Tropic Trooper |
๐ - May 14 - [Kaspersky] The Naikon APT |
๐ - May 13 - [Cylance] SPEAR: A Threat Actor Resurfaces |
๐ - May 12 - [PR Newswire] root9B Uncovers Planned Sofacy Cyber Attack Targeting Several International and Domestic Financial Institutions |
๐ - May 07 - [G DATA] Dissecting the Kraken |
๐ - May 05 - [Ahnlab] Targeted attack on Franceโs TV5Monde |
๐ - Apr 27 - [PWC] Attacks against Israeli & Palestinian interests |
๐ - Apr 22 - [F-SECURE] CozyDuke |
๐ - Apr 21 - [Kaspersky] The CozyDuke APT |
๐ - Apr 20 - [PWC] Sofacy II โ Same Sofacy, Different Day |
๐ - Apr 18 - [FireEye] Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russiaโs APT28 in Highly-Targeted Attack |
๐ - Apr 16 - [Trend Micro] Operation Pawn Storm Ramps Up its Activities; Targets NATO, White House |
๐ - Apr 15 - [Kaspersky] The Chronicles of the Hellsing APT: the Empire Strikes Back |
๐ - Apr 12 - [FireEye] APT 30 and the Mechanics of a Long-Running Cyber Espionage Operation |
๐ - Mar 31 - [CheckPoint] Volatile Cedar โ Analysis of a Global Cyber Espionage Campaign |
๐ - Mar 30 - [CrowdStrike] Chopping packets: Decoding China Chopper Web shell traffic over SSL |
๐ - Mar 19 - [Trend Micro] Rocket Kitten Showing Its Claws: Operation Woolen-GoldFish and the GHOLE campaign |
๐ - Mar 11 - [Kaspersky] Inside the EquationDrug Espionage Platform |
๐ - Mar 10 - [Citizen Lab] Tibetan Uprising Day Malware Attacks |
๐ - Mar 06 - [F-SECURE] Is Babar a Bunny? |
๐ - Mar 06 - [Kaspersky] Animals in the APT Farm |
๐ - Mar 05 - [ESET] Casper Malware: After Babar and Bunny, Another Espionage Cartoon |
๐ - Feb 24 - [PWC] A deeper look into Scanbox |
๐ - Feb 27 - [ThreatConnect] The Anthem Hack: All Roads Lead to China |
๐ - Feb 25 - [FireEye] Southeast Asia: An Evolving Cyber Threat Landscape |
๐ - Feb 25 - [Sophos] PlugX goes to the registry (and India) |
๐ - Feb 18 - [G DATA] Babar: espionage software finally found and put under the microscope |
๐ - Feb 18 - [CIRCL Luxembourg] Shooting Elephants |
๐ - Feb 17 - [Kaspersky] Desert Falcons APT |
๐ - Feb 17 - [Kaspersky] A Fanny Equation: "I am your father, Stuxnet" |
๐ - Feb 16 - [Trend Micro] Operation Arid Viper |
๐ - Feb 16 - [Kaspersky] The Carbanak APT |
๐ - Feb 16 - [Kaspersky] Equation: The Death Star of Malware Galaxy |
๐ - Feb 10 - [CrowdStrike] CrowdStrike Global Threat Intel Report for 2014 |
๐ - Feb 04 - [Trend Micro] Pawn Storm Update: iOS Espionage App Found |
๐ - Feb 02 - [FireEye] Behind the Syrian Conflictโs Digital Frontlines |
๐ - Jan 29 - [JPCERT] Analysis of PlugX Variant - P2P PlugX |
๐ - Jan 29 - [Symantec] Backdoor.Winnti attackers and Trojan.Skelky |
๐ - Jan 27 - [Kaspersky] Comparing the Regin module 50251 and the "Qwerty" keylogger |
๐ - Jan 22 - [Kaspersky] Regin's Hopscotch and Legspin |
๐ - Jan 22 - [Symantec] Scarab attackers Russian targets | IOCs |
๐ - Jan 22 - [Symantec] The Waterbug attack group |
๐ - Jan 20 - [BlueCoat] Reversing the Inception APT malware |
๐ - Jan 20 - [G DATA] Analysis of Project Cobra |
๐ - Jan 15 - [G DATA] Evolution of Agent.BTZ to ComRAT |
๐ - Jan 12 - [Dell] Skeleton Key Malware Analysis |
๐ - Jan 11 - [Dragon Threat Labs] Hong Kong SWC attack |
๐
2014
- Dec 22 - [Group-IB] Anunak: APT against financial institutions |
๐ - Dec 21 - [ThreatConnect] Operation Poisoned Helmand |
๐ - Dec 19 - [US-CERT] TA14-353A: Targeted Destructive Malware (wiper) |
๐ - Dec 18 - [Citizen Lab] Malware Attack Targeting Syrian ISIS Critics |
๐ - Dec 17 - [CISCO] Wiper Malware โ A Detection Deep Dive |
๐ - Dec 12 - [Fidelis] Bots, Machines, and the Matrix |
๐ - Dec 12 - [AirBus] Vinself now with steganography |
๐ - Dec 10 - [Ahnlab] South Korea MBR Wiper |
๐ - Dec 10 - [F-Secure] W64/Regin, Stage #1 |
๐ - Dec 10 - [F-Secure] W32/Regin, Stage #1 |
๐ - Dec 10 - [Kaspersky] Cloud Atlas: RedOctober APT |
๐ - Dec 09 - [BlueCoat] The Inception Framework |
๐ - Dec 08 - [Kaspersky] The 'Penquin' Turla |
๐ - Dec 05 - [Cylance] Operation Cleaver: The Notepad Files |
๐ - Dec 02 - [Cylance] Operation Cleaver | IOCs |
๐ - Nov 30 - [FireEye] FIN4: Stealing Insider Information for an Advantage in Stock Trading? |
๐ - Nov 24 - [CrowdStrike] Deep Panda Uses Sakula Malware |
๐ - Nov 24 - [TheIntercept] Regin: SECRET MALWARE IN EUROPEAN UNION ATTACK LINKED TO U.S. AND BRITISH INTELLIGENCE |
๐ - Nov 24 - [Kaspersky] Kaspersky's report on The Regin Platform |
๐ - Nov 24 - [Symantec] Regin: Top-tier espionage tool enables stealthy surveillance |
๐ - Nov 21 - [FireEye] Operation Double Tap | IOCs |
๐ - Nov 20 - [0x1338] EvilBunny: Suspect #4 |
๐ - Nov 14 - [ESET] Roaming Tiger (Slides) |
๐ - Nov 14 - [F-Secure] OnionDuke: APT Attacks Via the Tor Network |
๐ - Nov 13 - [Symantec] Operation CloudyOmega: Ichitaro 0-day targeting Japan |
๐ - Nov 12 - [ESET] Korplug military targeted attacks: Afghanistan & Tajikistan |
๐ - Nov 11 - [GDATA] The Uroburos case- Agent.BTZโs successor, ComRAT |
๐ - Nov 10 - [Kaspersky] The Darkhotel APT - A Story of Unusual Hospitality |
๐ - Nov 03 - [FireEye] Operation Poisoned Handover: Unveiling Ties Between APT Activity in Hong Kongโs Pro-Democracy Movement |
๐ - Nov 03 - [Kaspersky] New observations on BlackEnergy2 APT activity |
๐ - Oct 31 - [GData] Operation TooHash |
๐ - Oct 30 - [Sophos] The Rotten Tomato Campaign |
๐ - Oct 28 - [CISCO] Group 72, Opening the ZxShell |
๐ - Oct 28 - [FireEye] APT28 - A Window Into Russia's Cyber Espionage Operations |
๐ - Oct 27 - [Invincea] Micro-Targeted Malvertising via Real-time Ad Bidding |
๐ - Oct 27 - [PWC] ScanBox framework โ whoโs affected, and whoโs using it? |
๐ - Oct 27 - [Netresec] Full Disclosure of Havex Trojans - ICS Havex backdoors |
๐ - Oct 24 - [AirBus] LeoUncia and OrcaRat |
๐ - Oct 23 - [LEVIATHAN] THE CASE OF THE MODIFIED BINARIES |
๐ - Oct 22 - [PWC] Sofacy Phishing by PWC |
๐ - Oct 22 - [Trend Micro] Operation Pawn Storm: The Red in SEDNIT |
๐ - Oct 20 - [PWC] OrcaRAT - A whale of a tale |
๐ - Oct 14 - [iSightPartners] Sandworm - CVE-2104-4114 |
๐ - Oct 14 - [CISCO] Group 72 |
๐ - Oct 14 - [Novetta] Derusbi Preliminary Analysis |
๐ - Oct 14 - [Novetta] Hikit Preliminary Analysis |
๐ - Oct 14 - [Novetta] ZoxPNG Preliminary Analysis |
๐ - Oct 09 - [Volexity] Democracy in Hong Kong Under Attack |
๐ - Oct 03 - [Palo Alto Networks] New indicators for APT group Nitro |
๐ - Sep 26 - [F-Secure] BlackEnergy & Quedagh |
๐ - Sep 26 - [FireEye] Aided Frame, Aided Direction (Sunshop Digital Quartermaster) |
๐ - Sep 23 - [Kaspersky] Ukraine and Poland Targeted by BlackEnergy (video)
- Sep 19 - [Palo Alto Networks] Watering Hole Attacks using Poison Ivy by "th3bug" group |
๐ - Sep 18 - [F-Secure] COSMICDUKE: Cosmu with a twist of MiniDuke |
๐ - Sep 17 - [U.S. Senate Committee] Chinese intrusions into key defense contractors |
๐ - Sep 10 - [FireEye] Operation Quantum Entanglement |
๐ - Sep 08 - [Usenix] When Governments Hack Opponents: A Look at Actors and Technology video |
๐ - Sep 08 - [Usenix] Targeted Threat Index: Characterizingand Quantifying Politically-MotivatedTargeted Malware video |
๐ - Sep 04 - [ClearSky] Gholee โ a โProtective Edgeโ themed spear phishing campaign |
๐ - Sep 04 - [FireEye] Forced to Adapt: XSLCmd Backdoor Now on OS X |
๐ - Sep 04 - [Netresec] Analysis of Chinese MITM on Google |
๐ - Sep 03 - [FireEye] Darwinโs Favorite APT Group (APT12) |
๐ - Aug 29 - [FireEye] Syrian Malware Team Uses BlackWorm for Attacks |
๐ - Aug 28 - [AlienVault] Scanbox: A Reconnaissance Framework Used with Watering Hole Attacks |
๐ - Aug 27 - [Kaspersky] NetTraveler APT Gets a Makeover for 10th Birthday |
๐ - Aug 25 - [Malware Must Die] Vietnam APT Campaign |
๐ - Aug 20 - [Kaspersky] El Machete |
๐ - Aug 18 - [Kaspersky] The Syrian Malware House of Cards |
๐ - Aug 16 - [HP] Profiling an enigma: The mystery of North Koreaโs cyber threat landscape |
๐ - Aug 13 - [USENIX] A Look at Targeted Attacks Through the Lense of an NGO |
๐ - Aug 12 - [FireEye] New York Times Attackers Evolve Quickly (Aumlib/Ixeshe/APT12) |
๐ - Aug 07 - [Kaspersky] The Epic Turla Operation Appendix |
๐ - Aug 06 - [FireEye] Operation Poisoned Hurricane |
๐ - Aug 05 - [ThreatConnect] Operation Arachnophobia |
๐ - Aug 04 - [FireEye] SIDEWINDER TARGETED ATTACK AGAINST ANDROID IN THE GOLDEN AGE OF AD LIBRARIES |
๐ - Jul 31 - [Kaspersky] Energetic Bear/Crouching Yeti |
๐ - Jul 29 - [Dell] Threat Group-3279 Targets the Video Game Industry |
๐ - Jul 20 - [Vinsula] Sayad (Flying Kitten) Analysis & IOCs |
๐ - Jul 11 - [AirBus] Pitty Tiger |
๐ - Jul 10 - [CIRCL] TR-25 Analysis - Turla / Pfinet / Snake/ Uroburos |
๐ - Jul 07 - [CrowdStrike] Deep Pandas, Deep in Thought: Chinese Targeting of National Security Think Tanks |
๐ - Jul 10 - [TrapX] Anatomy of the Attack: Zombie Zero |
๐ - Jun 30 - [Symantec] Dragonfly: Cyberespionage Attacks Against Energy Suppliers |
๐ - Jun 20 - [Blitzanalysis] Embassy of Greece Beijing |
๐ - Jun 09 - [CrowdStrike] Putter Panda |
๐ - Jun 06 - [Arbor] Illuminating The Etumbot APT Backdoor (APT12) |
๐ - May 28 - [iSightPartners] NewsCaster_An_Iranian_Threat_Within_Social_Networks |
๐ - May 21 - [Fidelis] RAT in jar: A phishing campaign using Unrecom |
๐ - May 20 - [ESET] Miniduke Twitter C&C |
๐ - May 13 - [CrowdStrike] Cat Scratch Fever: CrowdStrike Tracks Newly Reported Iranian Actor as FLYING KITTEN |
๐ - May 13 - [FireEye] Operation Saffron Rose (aka Flying Kitten) |
๐ - Apr 26 - [FireEye] CVE-2014-1776: Operation Clandestine Fox |
๐ - Mar 12 - [FireEye] A Detailed Examination of the Siesta Campaign |
๐ - Mar 08 - [Reuters] Russian spyware Turla |
๐ - Mar 07 - [BAE] Snake Campaign & Cyber Espionage Toolkit |
๐ - Mar 06 - [Trend Micro] The Siesta Campaign |
๐ - Feb 28 - [GData] Uroburos: Highly complex espionage software with Russian roots |
๐ - Feb 25 - [CrowdStrike] The French Connection: French Aerospace-Focused CVE-2014-0322 Attack Shares Similarities with 2012 Capstone Turbine Activity |
๐ - Feb 23 - [Fidelis] Gathering in the Middle East, Operation STTEAM |
๐ - Feb 20 - [CrowdStrike] Mo' Shells Mo' Problems - Deep Panda Web Shells |
๐ - Feb 20 - [FireEye] Operation GreedyWonk: Multiple Economic and Foreign Policy Sites Compromised, Serving Up Flash Zero-Day Exploit |
๐ - Feb 19 - [FireEye] XtremeRAT: Nuisance or Threat? |
๐ - Feb 19 - [Context Information Security] The Monju Incident |
๐ - Feb 13 - [FireEye] Operation SnowMan: DeputyDog Actor Compromises US Veterans of Foreign Wars Website |
๐ - Feb 11 - [Kaspersky] Unveiling "Careto" - The Masked APT |
๐ - Jan 31 - [Fidelis] Intruder File Report- Sneakernet Trojan |
๐ - Jan 21 - [RSA] Shell_Crew (Deep Panda) |
๐ - Jan 15 - [Fidelis] New CDTO: A Sneakernet Trojan Solution |
๐ - Jan 14 - [Kaspersky] The Icefog APT Hits US Targets With Java Backdoor |
๐ - Jan 13 - [Symantec] Targeted attacks against the Energy Sector |
๐ - Jan 06 - [AirBus] PlugX: some uncovered points |
๐
2013
- XXX XX - [CERT-ISAC] Inside Report โ APT Attacks on Indian Cyber Space |
๐ - XXX XX - [KPMG] Energy at Risk: A Study of IT Security in the Energy and Natural Resources Industry |
๐ - XXX XX - [FireEye] THE LITTLE MALWARE THAT COULD: Detecting and Defeating the China Chopper Web Shell |
๐ - XXX XX - [CrowdStrike] Deep Panda |
๐ - XXX XX - [CISAK] Dark Seoul Cyber Attack: Could it be worse? |
๐ - XXX XX - [Fireeye] OPERATION SAFFRON ROSE |
๐ - Dec 20 - [Ahnlab] ETSO APT Attacks Analysis |
๐ - Dec 12 - [FireEye] Operation Ke3chang: Targeted Attacks Against Ministries of Foreign Affairs |
๐ - Dec 02 - [Fidelis] njRAT, The Saga Continues |
๐ - Nov 10 - [FireEye] Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method |
๐ - Oct 25 - [FireEye] Evasive Tactics: Terminator RAT |
๐ - Oct 24 - [Trend Micro] FakeM RAT |
๐ - Sep 25 - [Kaspersky] The 'ICEFROG' APT: A Tale of cloak and three daggers |
๐ - Sep 21 - [FireEye] Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets |
๐ - Sep 19 - [Trend Micro] 2Q 2013 Report on Targeted Attack Campaigns: A Look Into EvilGrab |
๐ - Sep 17 - [Symantec] Hidden Lynx - Professional Hackers for Hire |
๐ - Sep 11 - [Kaspersky] The "Kimsuky" Operation |
๐ - Sep 06 - [FireEye] Evasive Tactics: Taidoor |
๐ - Aug 23 - [FireEye] Operation Molerats: Middle East Cyber Attacks Using Poison Ivy |
๐ - Aug 21 - [FireEye] POISON IVY: Assessing Damage and Extracting Intelligence |
๐ - Aug 19 - [Rapid7] ByeBye Shell and the targeting of Pakistan |
๐ - Aug 02 - [CitizenLab] Surtr: Malware Family Targeting the Tibetan Community |
๐ - Aug 02 - [ThreatConnect] Where There is Smoke, There is Fire: South Asian Cyber Espionage Heats Up |
๐ - Jul 31 - [BlackHat] Hunting the Shadows: In Depth Analysis of Escalated APT Attacks |
๐ - Jul 31 - [Dell] Secrets of the Comfoo Masters |
๐ - Jul 15 - [Sophos] The PlugX malware revisited: introducing "Smoaler" |
๐ - Jul 01 - [McAfee] Targeted Campaign Steals Credentials in Gulf States and Caribbean |
๐ - Jun 28 - [ThreatGeek] njRAT Uncovered |
๐ - Jun 21 - [Citizen Lab] A Call to Harm: New Malware Attacks Target the Syrian Opposition |
๐ - Jun 18 - [FireEye] Trojan.APT.Seinup Hitting ASEAN |
๐ - Jun 07 - [Rapid7] KeyBoy, Targeted Attacks against Vietnam and India |
๐ - Jun 04 - [Kaspersky] The NetTraveller (aka 'Travnet') |
๐ - Jun 01 - [Purdue] Crude Faux: An analysis of cyber conflict within the oil & gas industries |
๐ - Jun XX - [BlueCoat] The Chinese Malware Complexes: The Maudi Surveillance Operation |
๐ - May 30 - [CIRCL] TR-14 - Analysis of a stage 3 Miniduke malware sample |
๐ - May 20 - [Norman] OPERATION HANGOVER: Unveiling an Indian Cyberattack Infrastructure |
๐ - May 16 - [ESET] Targeted information stealing attacks in South Asia use email, signed binaries |
๐ - Apr 21 - [Bitdefender] MiniDuke - The Final Cut |
๐ - Apr 13 - [Kaspersky] "Winnti" More than just a game |
๐ - Apr 07 - [FireEye] WORLD WAR C |
๐ - Apr 01 - [FireEye] Trojan.APT.BaneChant |
๐ - Mar 28 - [Circl] TR-12 - Analysis of a PlugX malware variant used for targeted attacks |
๐ - Mar 27 - [malware.lu] APT1: technical backstage (Terminator/Fakem RAT) |
๐ - Mar 21 - [Fidelis] Darkseoul/Jokra Analysis And Recovery |
๐ - Mar 20 - [Kaspersky] The TeamSpy Crew Attacks |
๐ - Mar 20 - [McAfee] Dissecting Operation Troy |
๐ - Mar 17 - [Trend Micro] Safe: A Targeted Threat |
๐ - Mar 13 - [Citizen lab] You Only Click Twice: FinFisherโs Global Proliferation |
๐ - Feb 27 - [Crysys] Miniduke: Indicators v1 |
๐ - Feb 27 - [Kaspersky] The MiniDuke Mystery: PDF 0-day Government Spy Assembler 0x29A Micro Backdoor |
๐ - Feb 26 - [Symantec] Stuxnet 0.5: The Missing Link |
๐ - Feb 22 - [Symantec] Comment Crew: Indicators of Compromise |
๐ - Feb 18 - [FireEye] Mandiant APT1 Report |
๐ - Feb 12 - [AIT] Targeted cyber attacks: examples and challenges ahead |
๐ - Jan 18 - [McAfee] Operation Red October |
๐ - Jan 14 - [Kaspersky] The Red October Campaign |
๐ - Jan 02 - [FireEye] SUPPLY CHAIN ANALYSIS: From Quartermaster to SunshopFireEye |
๐
2012
- Nov 13 - [FireEye] Poison Ivy Malware Analysis |
๐ - Nov 03 - [CyberPeace] Systematic cyber attacks against Israeli and Palestinian targets going on for a year |
๐ - Nov 01 - [Fidelis] RECOVERING FROM SHAMOON |
๐ - Oct 31 - [DEA] CYBER ESPIONAGE Against Georgian Government (Georbot Botnet) |
๐ - Oct 27 - [Symantec] Trojan.Taidoor: Targeting Think Tanks |
๐ - Oct 08 - [Matasano] pest control: taming the rats |
๐ - Sep 18 - [Dell] The Mirage Campaign |
๐ - Sep 12 - [RSA] The VOHO Campaign: An in depth analysis |
๐ - Sep 07 - [Citizen lab] IEXPLORE RAT |
๐ - Sep 06 - [Symantec] The Elderwood Project |
๐ - Aug 19 - [Rapid7] ByeBye Shell and the targeting of Pakistan |
๐ - Aug 18 - [Trend Micro] The Taidoor Campaign AN IN-DEPTH ANALYSIS |
๐ - Aug 09 - [Kaspersky] Gauss: Abnormal Distribution |
๐ - Jul 27 - [Kaspersky] The Madi Campaign |
๐ - Jul 25 - [Citizen lab] From Bahrain With Love: FinFisherโs Spy Kit Exposed? |
๐ - Jul 11 - [Wired] Wired article on DarkComet creator |
๐ - Jul 10 - [Citizenlab] Advanced Social Engineering for the Distribution of LURK Malware |
๐ - May 31 - [Crysys] sKyWIper (Flame/Flamer) |
๐ - May 22 - [Trend Micro] IXESHE An APT Campaign |
๐ - May 18 - [Symantec] Analysis of Flamer C&C Server |
๐ - Apr 16 - [Kaspersky] OSX.SabPub & Confirmed Mac APT attacks |
๐ - Apr 10 - [McAfee] Anatomy of a Gh0st RAT |
๐ - Mar 26 - [Trend Micro] Luckycat Redux |
๐ - Mar 13 - [Arbor] Reversing DarkComet RAT's crypto |
๐ - Mar 12 - [contextis] Crouching Tiger, Hidden Dragon, Stolen Data |
๐ - Feb 29 - [Dell] The Sin Digoo Affair |
๐ - Feb 03 - [CommandFive] Command and Control in the Fifth Domain |
๐ - Jan 03 - [Trend Micro] The HeartBeat APT |
๐
2011
- Dec 08 - [Norman] Palebot trojan harvests Palestinian online credentials |
๐ - Nov 15 - [Norman] The many faces of Gh0st Rat |
๐ - Oct 31 - [Symantec] The Nitro Attacks: Stealing Secrets from the Chemical Industry |
๐ - Oct 26 - [Dell] Duqu Trojan Questions and Answers |
๐ - Oct 12 - [Zscaler] Alleged APT Intrusion Set: "1.php" Group |
๐ - Sep 22 - [Trend Micro] The "LURID" Downloader |
๐ - Sep 11 - [CommandFive] SK Hack by an Advanced Persistent Threat |
๐ - Sep 09 - [Fidelis] The RSA Hack |
๐ - Aug 04 - [McAfee] Operation Shady RAT |
๐ - Aug 03 - [Dell] HTran and the Advanced Persistent Threat |
๐ - Aug 02 - [vanityfair] Operation Shady rat : Vanity |
๐ - Jun ?? - [CommandFive] Advanced Persistent Threats:A Decade in Review |
๐ - Apr 20 - [ESET] Stuxnet Under the Microscope |
๐ - Feb 18 - [NERC] Night Dragon Specific Protection Measures for Consideration |
๐ - Feb 10 - [McAfee] Global Energy Cyberattacks: Night Dragon |
๐
2010
- Dec 09 - [CRS] The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability |
๐ - Sep 30 - [Symantec] W32.Stuxnet Dossier |
๐ - Sep 03 - [Seculert] The "MSUpdater" Trojan And Ongoing Targeted Attacks |
๐ - Apr 06 - [ShadowServer] Shadows in the cloud: Investigating Cyber Espionage 2.0 |
๐ - Mar 14 - [CA] In-depth Analysis of Hydraq |
๐ - Feb 10 - [HB Gary] Threat Report: Operation Aurora |
๐ - Jan ?? - [Triumfant] Case Study: Operation Aurora |
๐ - Jan 27 - [Alberts] Operation Aurora Detect, Diagnose, Respond |
๐ - Jan 26 - [McAfee] How Can I Tell if I Was Infected By Aurora? (IOCs) |
๐ - Jan 20 - [McAfee] Combating Aurora|
๐ - Jan 13 - [Damballa] The Command Structure of the Aurora Botnet |
๐ - Jan 12 - [Google] Operation Aurora |
๐
2009
- Oct 19 - [Northrop Grumman] Capability of the Peopleโs Republic of China to Conduct Cyber Warfare and Computer Network Exploitation |
๐ - Mar 29 - [TheSecDevGroup] Tracking GhostNet |
๐ - Jan 18 - [Baltic] Impact of Alleged Russian Cyber Attacks |
๐
2008
- Nov XX - [Military Review] CHINA_CHINA_CYBER_WARFARE|
๐ - Nov 19 - [Wired] Agent.BTZ |
๐ - Nov 04 - [DTIC] China's Electronic Long-Range Reconnaissance |
๐ - Oct 02 - [Culture Mandala] How China will use cyber warfare to leapfrog in military competitiveness |
๐ - Aug 10 - [Georgia] Russian Invasion of Georgia Russian Cyberwar on Georgia |
๐
2006
Report
Red Canary
NSA
Objective-See
ESET
Kaspersky
FireEye
AhnLab
Group-IB
PTSecurity
ENISA
CrowdStrike
QianXin
Tencent
Verizon
Sophos
360
Microsoft
Other