From 3bc197d33f7c541e801496834b53dd803872ba19 Mon Sep 17 00:00:00 2001 From: blackorbird <137812951@qq.com> Date: Mon, 8 Apr 2019 15:52:42 +0800 Subject: [PATCH] Update and rename README.org to README.MD --- APT28/{README.org => README.MD} | 9 +++++++++ 1 file changed, 9 insertions(+) rename APT28/{README.org => README.MD} (98%) diff --git a/APT28/README.org b/APT28/README.MD similarity index 98% rename from APT28/README.org rename to APT28/README.MD index a74e606..525d991 100644 --- a/APT28/README.org +++ b/APT28/README.MD @@ -1,13 +1,22 @@ ### RELATED REPORT [1] https://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-full.pdf + [2] https://www.welivesecurity.com/2017/05/09/sednit-adds-two-zero-day-exploits-using-trumps-attack-syria-decoy/ + [3] https://www.emanueledelucia.net/apt28-targeting-military-institutions/ + [4] https://www.emanueledelucia.net/apt28-sofacy-seduploader-under-the-christmas-tree/ + [5] https://unit42.paloaltonetworks.com/unit42-sofacy-continues-global-attacks-wheels-new-cannon-trojan/ + [6] https://unit42.paloaltonetworks.com/dear-joohn-sofacy-groups-global-campaign/ + [7] https://unit42.paloaltonetworks.com/sofacy-creates-new-go-variant-of-zebrocy-tool/ + [8] https://blog.trendmicro.co.jp/archives/19829 + [9] https://www.welivesecurity.com/2018/11/20/sednit-whats-going-zebrocy/ +