273 lines
19 KiB
Markdown
273 lines
19 KiB
Markdown
Happy New year
|
||
|
||
## Exploit
|
||
|
||
https://www.mandiant.com/resources/blog/zero-days-exploited-2022
|
||
|
||
## predictions:
|
||
|
||
https://securelist.com/advanced-threat-predictions-for-2023/107939/
|
||
|
||
## summary:
|
||
|
||
THE CYBERTHREAT REPORT June 2023
|
||
Insights Gleaned from a Global Network of Experts, Sensors, Telemetry, and Intelligence
|
||
|
||
https://www.trellix.com/en-us/advanced-research-center/threat-reports/jun-2023.html
|
||
|
||
The State of Ransomware in the US: Report and Statistics 2022
|
||
|
||
https://www.emsisoft.com/en/blog/43258/the-state-of-ransomware-in-the-us-report-and-statistics-2022/
|
||
|
||
nsfocus summary
|
||
|
||
https://book.yunzhan365.com/tkgd/ftku/mobile/index.html
|
||
|
||
Crypto Money Laundering: Four Exchange Deposit Addresses Received Over $1 Billion in Illicit Funds in 2022
|
||
|
||
https://blog.chainalysis.com/reports/crypto-money-laundering-2022/
|
||
|
||
2022 Year in Review
|
||
|
||
https://thedfirreport.com/2023/03/06/2022-year-in-review/
|
||
|
||
20230511 update lnk
|
||
|
||
[1] https://www.eset.com/int/business/services/threat-intelligence/
|
||
[2] https://www.welivesecurity.com/2023/03/02/mqsttang-mustang-panda-latest-backdoor-treadsnew-ground-qt-mqtt/
|
||
[3] https://unit42.paloaltonetworks.com/playful-taurus/
|
||
[4] https://securelist.com/a-targeted-attack-against-the-syrian-ministry-of-foreign-affairs/34742/
|
||
[5] https://www.welivesecurity.com/2021/06/10/backdoordiplomacy-upgrading-quarian-turian/
|
||
[6] https://www.crowdstrike.com/blog/new-supply-chain-attack-leverages-comm100-chat-installer/
|
||
[7] https://github.com/GetRektBoy724/SharpUnhooker
|
||
[8] https://blogs.blackberry.com/en/2023/02/newspenguin-a-previously-unknown-threat-actortargets-pakistan-with-advanced-espionage-tool
|
||
[9] https://the.earth.li/~sgtatham/putty/0.78/htmldoc/Chapter7.html#plink
|
||
[10] https://asec.ahnlab.com/en/49089/
|
||
[11] https://www.nirsoft.net/utils/web_browser_password.html
|
||
[12] https://www.nirsoft.net/utils/network_password_recovery.html
|
||
[13] https://docs.devexpress.com/WindowsForms/15216/controls-and-libraries/pdf-viewer
|
||
[14] https://www.justice.gov/usao-edny/pr/founder-and-majority-owner-bitzlato-cryptocurrencyexchange-charged-unlicensed-money
|
||
[15] https://www.welivesecurity.com/2023/04/20/linux-malware-strengthens-links-lazarus-3cxsupply-chain-attack/
|
||
[16] https://telegra.ph/
|
||
[17] https://twitter.com/ESETresearch/status/1618960022150729728
|
||
[18] https://cert.gov.ua/article/3718487
|
||
[19] https://cert.gov.ua/article/341128
|
||
[20] https://www.malwarebytes.com/blog/threat-intelligence/2022/06/russias-apt28-uses-fear-ofnuclear-war-to-spread-follina-docs-in-ukrain
|
||
[21] https://attack.mitre.org/techniques/T1027/006/
|
||
[22] https://www.notion.so/
|
||
[23] https://www.welivesecurity.com/wp-content/uploads/2023/01/eset_apt_activity_report_t32022.
|
||
pdf
|
||
[24] https://blog.talosintelligence.com/yorotrooper-espionage-campaign-cis-turkey-europe/
|
||
[25] https://www.domaintools.com/resources/blog/winter-vivern-a-look-at-re-crafted-governmentmaldocs/
|
||
[26] https://scpc.gov.ua/api/docs/4eeb6a10-b7aa-4396-8b04-e0e4b7fca1lj/4eeb6a10-b7aa-4396-
|
||
8b04-e0e4b7fca1lj.pdf
|
||
[27] https://nvd.nist.gov/vuln/detail/CVE-2022-27926
|
||
|
||
other 2022 link:
|
||
1.https://ti.qianxin.com/blog/articles/SideCopy's-Golang-based-Linux-tool/
|
||
2.https://mp.weixin.qq.com/s/xKKr5UV26npohwvyv79U0w
|
||
3.https://lab52.io/blog/complete-dissection-of-an-apk-with-a-suspicious-c2-server/
|
||
4.https://citizenlab.ca/2022/04/catalangate-extensive-mercenary-spyware-operation-againstcatalans-using-pegasus-candiru/
|
||
5.https://mp.weixin.qq.com/s/1WtaS7htgiUGhtY_ovERxA
|
||
6.https://blog.cyble.com/2022/08/09/bitter-apt-group-using-dracarys-android-spyware/
|
||
7.https://www.mandiant.com/resources/blog/apt42-charms-cons-compromises
|
||
8.https://medium.com/s2wblog/unveil-the-evolution-of-kimsuky-targeting-android-devices-withnewly-discovered-mobile-malware-280dae5a650f
|
||
9.https://mp.weixin.qq.com/s/pd6fUs5TLdBtwUHauclDOQ
|
||
10.https://labs.k7computing.com/index.php/lazarus-apts-operation-interception-uses-signedbinary/
|
||
11.https://mp.weixin.qq.com/s/1pHp4WywrDnNcVBio8lq8w
|
||
12.https://www.trellix.com/en-us/about/newsroom/stories/research/prime-ministers-officecompromised.html
|
||
13.https://www.cisa.gov/uscert/ncas/alerts/aa22-047a
|
||
14.https://blog.sekoia.io/turla-new-phishing-campaign-eastern-europe/
|
||
15.https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/stonefly-north-koreaespionage
|
||
16.https://www.microsoft.com/en-us/security/blog/2022/09/29/zinc-weaponizing-open-sourcesoftware/
|
||
17.https://www.zscaler.com/blogs/security-research/new-espionage-attack-molerats-apttargeting-users-middle-east
|
||
18.https://www.cnnindonesia.com/teknologi/20220120191930-185-749298/ahli-sebut-gengransomware-conti-yang-bobol-bi-peretas-berbahaya
|
||
19.https://asec.ahnlab.com/en/38993/
|
||
20.https://mp.weixin.qq.com/s/QkKrxXbz3rHveokjwEoW-w
|
||
21.https://mp.weixin.qq.com/s/nnLqUBPX8xZ3hCr5u-iSjQ
|
||
22.https://securelist.com/bluenoroff-methods-bypass-motw/108383/
|
||
23.https://mp.weixin.qq.com/s/Xs54_RDKU5MvkvsPPCGKEw
|
||
24.https://www.proofpoint.com/us/blog/threat-insight/buy-sell-steal-evilnum-targetscryptocurrency-forex-commodities
|
||
25.https://mp.weixin.qq.com/s/1KIFSc3R5WrMklidXWSBaw
|
||
26.https://asec.ahnlab.com/en/44680/
|
||
27.https://mp.weixin.qq.com/s/PTWzKIPsO92XCP4-pXRDgg
|
||
28.https://blog.google/threat-analysis-group/countering-threats-north-korea/
|
||
29.https://twitter.com/ESETresearch/status/1559553324998955010
|
||
30.https://labs.k7computing.com/index.php/lazarus-apts-operation-interception-uses-signedbinary/
|
||
31.https://www.welivesecurity.com/2022/12/07/fantasy-new-agrius-wiper-supply-chain-attack/
|
||
32.https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/
|
||
33.https://unit42.paloaltonetworks.com/trident-ursa/
|
||
34.https://www.zscaler.com/blogs/security-research/lyceum-net-dns-backdoor
|
||
35.https://ti.qianxin.com/blog/articles/king-of-phishing-analysis-of-kimsuky's-recent-spearphishing-attacks-targeting-south-korea-with-multiple-topics
|
||
36.https://ti.qianxin.com/blog/articles/spikes-from-the-kimsuky-organization-targeted-killing-ofsouth-korea-with-multiple-assault-weapons/
|
||
37.https://ti.qianxin.com/blog/articles/the-tiger-of-the-forest-entrenched-on-foyan-mountain/
|
||
38.https://cluster25.io/2022/01/03/konni-targets-the-russian-diplomatic-sector/
|
||
39.https://mp.weixin.qq.com/s/GPpOF-SSJbVR3ZHsx8eXgA
|
||
40.https://www.malwarebytes.com/blog/threat-intelligence/2022/01/north-koreas-lazarus-aptleverages-windows-update-client-github-in-latest-campaign
|
||
41.https://asec.ahnlab.com/en/31089/
|
||
42.https://blog.alyac.co.kr/4501
|
||
43.https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/suspected-darkhotel-aptactivity-update.html
|
||
44.https://asec.ahnlab.com/en/32958/
|
||
45.https://securelist.com/lazarus-trojanized-defi-app/106195/
|
||
46.https://ti.qianxin.com/blog/articles/analysis-of-the-lazarus-group-attacks-on-koreancompanies/
|
||
47.https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lazarus-dream-jobchemical
|
||
48.https://www.cisa.gov/uscert/ncas/alerts/aa22-108a
|
||
49.https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/stonefly-north-koreaespionage
|
||
50.https://ti.qianxin.com/blog/articles/lazarus-armory-update-analysis-of-recent-andarielattacks/
|
||
51.https://research.nccgroup.com/2022/05/05/north-koreas-lazarus-and-their-initial-access-tradecraft-using-social-media-and-social-engineering/
|
||
52.https://asec.ahnlab.com/en/34461/
|
||
53.https://asec.ahnlab.com/en/34694/
|
||
54.https://asec.ahnlab.com/ko/34883/
|
||
55.https://mp.weixin.qq.com/s/ZV8AOTd7YGUgCTTTZtTktQ
|
||
56.https://blogs.jpcert.or.jp/en/2022/07/yamabot.html
|
||
57.https://mp.weixin.qq.com/s/USitU4jAg9y2XkQxbwcAPQ
|
||
58.https://www.securonix.com/blog/stiffbizon-detection-new-attack-campaign-observed/
|
||
59.https://www.volexity.com/blog/2022/07/28/sharptongue-deploys-clever-mail-stealing-browserextension-sharpext/
|
||
60.https://securelist.com/andariel-deploys-dtrack-and-maui-ransomware/107063/
|
||
61.https://mp.weixin.qq.com/s/R8fvBQDHrTA5-VnKINO5Wg
|
||
62.https://securelist.com/kimsukys-golddragon-cluster-and-its-c2-operations/107258/
|
||
63.https://blog.alyac.co.kr/4892
|
||
64.https://blog.talosintelligence.com/2022/09/lazarus-magicrat.html
|
||
65.https://blog.talosintelligence.com/2022/09/lazarus-three-rats.html
|
||
66.https://mp.weixin.qq.com/s/MElSffbcrQkBYdVKo3hzFg
|
||
67.https://www.welivesecurity.com/2022/09/30/amazon-themed-campaigns-lazarus-netherlandsbelgium/
|
||
68.https://asec.ahnlab.com/en/40830/
|
||
69.https://ti.qianxin.com/blog/articles/job-hunting-trap-analysis-of-lazarus-attack-activitiesusing-recruitment-information-such-as-mizuho-bank-of-japan-as-bait/
|
||
70.https://mp.weixin.qq.com/s/OaECtSaeClPzFHslN_WamA
|
||
71.https://www.welivesecurity.com/2022/11/30/whos-swimming-south-korean-waters-meetscarcrufts-dolphin/
|
||
72.https://www.volexity.com/blog/2022/12/01/buyer-beware-fake-cryptocurrency-applicationsserving-as-front-for-applejeus-malware/
|
||
73.https://blog.google/threat-analysis-group/internet-explorer-0-day-exploited-by-north-koreanactor-apt37/
|
||
74.https://slowmist.medium.com/slowmist-our-in-depth-investigation-of-north-korean-apts-largescale-phishing-attack-on-nft-users-362117600519
|
||
75.https://www.netskope.com/blog/abusing-microsoft-office-using-malicious-web-archive-files
|
||
76.https://ti.qianxin.com/blog/articles/Samples-of-the-OceanLotus-attack-using-the-Glitchplatform/
|
||
77.https://mp.weixin.qq.com/s/5gXllrE1srnHtaFCc-86GA
|
||
78.https://mp.weixin.qq.com/s/tBQSbv55lJUipaPWFr1fKw
|
||
79.https://mp.weixin.qq.com/s/Ah3pFjYk5AOvKvZPwXod6g
|
||
80.https://mp.weixin.qq.com/s/U9LIfVVP5kHBFFt0LN0Q-A
|
||
81.https://mp.weixin.qq.com/s/u2iEmGMi-SN2G-Isnp2pdg
|
||
82.https://mp.weixin.qq.com/s/LkiNNIx5-FlBO8YY4FxzZw
|
||
83.https://mp.weixin.qq.com/s/v2wiJe-YPG0ng87ffBB9FQ
|
||
84.https://mp.weixin.qq.com/s/NLe4JqmjiB58IQ5Kn6DSLQ
|
||
85.https://blog.malwarebytes.com/threat-intelligence/2022/01/patchwork-apt-caught-in-its-ownweb/
|
||
86.https://mp.weixin.qq.com/s/ZNhdLN_AgGfjdk8nG8kLmw
|
||
87.https://mp.weixin.qq.com/s/T1-JbC9FsVV2UNnusYPJbw
|
||
88.https://www.welivesecurity.com/2022/01/18/donot-go-do-not-respawn/
|
||
89.https://mp.weixin.qq.com/s/UcAJRnZVG1hrv4VQTp4A5g
|
||
90.https://mp.weixin.qq.com/s/epRGn7Tnzx6rXihYXIpIIg
|
||
91.https://mp.weixin.qq.com/s/olI67y-qKpDfLGZTOIWXqw
|
||
92.http://blog.nsfocus.net/apt-sidewinder-20220218/
|
||
93.https://ti.dbappsecurity.com.cn/blog/articles/2022/03/11/bitter-nepal-army-day/
|
||
94.https://blog.talosintelligence.com/2022/03/transparent-tribe-new-campaign.html
|
||
95.https://ti.dbappsecurity.com.cn/blog/articles/2022/04/24/bitter-attack-bd/V
|
||
96.https://mp.weixin.qq.com/s/xRumzCNzQ857I7VDg57mBg
|
||
97.https://mp.weixin.qq.com/s/_KQJH2_VIjoBp2Msh71odg
|
||
98.https://blog.talosintelligence.com/2022/05/bitter-apt-adds-bangladesh-to-their.html
|
||
99.https://mp.weixin.qq.com/s/qsGxZIiTsuI7o-_XmiHLHg
|
||
100.https://blog.group-ib.com/sidewinder-antibot
|
||
101.https://mp.weixin.qq.com/s/PxFybr0SmA-lymDQ_L5W-Q
|
||
102.https://mp.weixin.qq.com/s/8j_rHA7gdMxY1_X8alj8Zg
|
||
103.https://mp.weixin.qq.com/s/YKSedzm7haO0vPttIqsUAQ
|
||
104.https://it.rising.com.cn/anquan/19904.html
|
||
105.https://www.secuinfra.com/en/techtalk/whatever-floats-your-boat-bitter-apt-continues-totarget-bangladesh/
|
||
106.https://mp.weixin.qq.com/s/wqcBiOYqPOLlOI6owyHxEw
|
||
107.https://blog.talosintelligence.com/2022/07/transparent-tribe-targets-education.html
|
||
108.https://blog.checkpoint.com/2022/07/13/a-hit-is-made-suspected-india-based-sidewinderapt-successfully-cyber-attacks-pakistan-military-focused-targets/
|
||
109.https://mp.weixin.qq.com/s/U7RiFIlyLGo0aTYttvPQfg
|
||
110.https://blog.morphisec.com/apt-c-35-new-windows-framework-revealed
|
||
111.https://paper.seebug.org/1943/#1
|
||
112.https://mp.weixin.qq.com/s/YB32toWJWdiTBpnSnuypJA
|
||
113.https://mp.weixin.qq.com/s/IZNl6N2K1LUU7e1hT4JeYw
|
||
114.https://mp.weixin.qq.com/s/heWhL6ev_pigAF_HMR4oLQ
|
||
115.https://www.zscaler.com/blogs/security-research/warhawk-new-backdoor-arsenalsidewinder-apt-group-0
|
||
116.https://mp.weixin.qq.com/s/XMrWLx6KVeoDQ7WzvOcwqA
|
||
117.https://mp.weixin.qq.com/s/IwcxY3TqkmyY-pBxnXuM1A
|
||
118.https://mp.weixin.qq.com/s/BXjZ6fEgNmLY_l8cZt1FXQ
|
||
119.https://www.a.com/blogs/security-research/apt-36-uses-new-ttps-and-new-tools-targetindian-governmental-organizations
|
||
120.https://mp.weixin.qq.com/s/LOZTOz4Lo6cOpeD4mMC29g
|
||
121.https://mp.weixin.qq.com/s/NOpFJx4LnMOWhTm0iluFfw
|
||
122.https://www.securonix.com/blog/new-steppykavach-attack-campaign/
|
||
123.https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/prime-ministers-officecompromised.html
|
||
124.https://www.crowdstrike.com/blog/observations-from-the-stellarparticle-campaign/
|
||
125.https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/shuckwormgamaredon-espionage-ukraine
|
||
126.https://www.microsoft.com/security/blog/2022/02/04/actinium-targets-ukrainianorganizations/
|
||
127.http://blog.nsfocus.net/apt-lorec53-20220216/
|
||
128.https://www.cisa.gov/uscert/ncas/alerts/aa22-047a
|
||
129.https://www.cisa.gov/uscert/ncas/alerts/aa22-054a
|
||
130.https://unit42.paloaltonetworks.com/ukraine-targeted-outsteel-saintbot/
|
||
131.https://mp.weixin.qq.com/s/j2w_cZgprGsM0zTQ5ngEWA
|
||
132.https://mp.weixin.qq.com/s/_3DPj9N3nLhDqlWrqsUcfw
|
||
133.https://lab52.io/blog/looking-for-penquins-in-the-wild/
|
||
134.https://www.proofpoint.com/us/blog/threat-insight/asylum-ambuscade-state-actor-usescompromised-private-ukrainian-military-emails
|
||
135.https://ti.qianxin.com/blog/articles/Analysis-of-attack-activities-of-suspectedaptorganization-unc1151-against-ukraine-and-other-countries/
|
||
136.https://mp.weixin.qq.com/s/YsyeLQDR_LQLfKhigSm2_Q
|
||
137.https://securityaffairs.co/wordpress/129337/apt/invisimole-targets-ukraine-government.html
|
||
138.https://www.malwarebytes.com/blog/threat-intelligence/2022/04/new-uac-0056-activitytheres-a-go-elephant-in-the-room
|
||
139.https://cert.gov.ua/article/39138
|
||
140.https://inquest.net/blog/2022/04/18/nobelium-israeli-embassy-maldoc
|
||
141.https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/shuckwormintense-campaign-ukraine
|
||
142.https://businessinsights.bitdefender.com/deep-dive-into-the-elephant-framework-a-newcyber-threat-in-ukraine
|
||
143.https://www.mandiant.com/resources/blog/tracking-apt29-phishing-campaigns
|
||
144.https://cert.gov.ua/article/40102
|
||
145.https://mp.weixin.qq.com/s/bIXX0hUITaPkeJ6yf0yWPw
|
||
146.https://cluster25.io/2022/05/13/cozy-smuggled-into-the-box/
|
||
147.https://www.welivesecurity.com/2022/05/20/sandworm-ukraine-new-version-arguepatchmalware-loader/
|
||
148.https://mp.weixin.qq.com/s/a94G-QVTGbIc8vu9yL_nww
|
||
149.https://mp.weixin.qq.com/s/gJFSlpIlbaI11lcClNN_Xw
|
||
150.https://www.malwarebytes.com/blog/threat-intelligence/2022/06/russias-apt28-uses-fear-ofnuclear-war-to-spread-follina-docs-in-ukraine
|
||
151.https://inquest.net/blog/2022/06/27/glowsand
|
||
152.https://blog.malwarebytes.com/threat-intelligence/2022/07/cobalt-strikes-again-uac-0056-
|
||
continues-to-target-ukraine-in-its-latest-campaign/
|
||
153.https://ti.qianxin.com/blog/articles/analysis-of-apt29's-attack-activities-against-italy/
|
||
154.https://blog.google/threat-analysis-group/continued-cyber-activity-in-eastern-europeobserved-by-tag/
|
||
155.http://blog.nsfocus.net/gamaredon/
|
||
156.https://www.mandiant.com/resources/apt29-continues-targeting-microsoft
|
||
157.https://blog.talosintelligence.com/2022/09/gamaredon-apt-targets-ukrainian-agencies.html
|
||
158.https://www.recordedfuture.com/russia-nexus-uac-0113-emulating-telecommunicationproviders-in-ukraine
|
||
159.https://blog.cluster25.duskrise.com/2022/09/23/in-the-footsteps-of-the-fancy-bearpowerpoint-graphite/
|
||
160.https://www.bleepingcomputer.com/news/security/new-ransomware-attacks-in-ukrainelinked-to-russian-sandworm-hackers/
|
||
161.https://www.cyberscoop.com/apt28-fancy-bear-satellite/
|
||
162.https://unit42.paloaltonetworks
|
||
163.https://www.cybercom.mil/Media/News/Article/2897570/iranian-intel-cyber-suite-ofmalware-uses-open-source-tools/
|
||
164.https://ti.qianxin.com/blog/articles/promethium-attack-activity-analysis-disguised-as-Winrar.
|
||
exe/
|
||
165.https://ti.qianxin.com/blog/articles/the-lyceum-organization-uses-military-hotspot-events-asbait-to-target-targeted-attacks-on-the-middle-east/
|
||
166.https://research.checkpoint.com/2022/apt35-exploits-log4j-vulnerability-to-distribute-newmodular-powershell-toolkit/
|
||
167.https://www.sentinelone.com/labs/wading-through-muddy-waters-recent-activity-of-aniranian-state-sponsored-threat-actor/
|
||
168.https://ti.qianxin.com/blog/articles/Summary-of-MuddyWater's-recent-attack-activity/
|
||
169.https://team-cymru.com/blog/2022/01/26/analysis-of-a-management-ip-address-linked-tomolerats-apt/
|
||
170.https://blog.talosintelligence.com/2022/01/iranian-apt-muddywater-targets-turkey.html
|
||
171.https://www.cybereason.com/blog/research/powerless-trojan-iranian-apt-phosphorus-addsnew-powershell-backdoor-for-espionage
|
||
172.https://blog.talosintelligence.com/2022/02/arid-viper-targets-palestine.html
|
||
173.https://www.proofpoint.com/us/blog/threat-insight/ugg-boots-4-sale-tale-palestinianaligned-espionage
|
||
174.https://mp.weixin.qq.com/s/_BQzqAjroi7TBxmT191Vjg
|
||
175.https://www.mandiant.com/resources/blog/telegram-malware-iranian-espionage
|
||
176.https://www.cisa.gov/uscert/sites/default/files/publications/AA22-055A_Iranian_GovernmentSponsored_Actors_Conduct_Cyber_Operations.pdf
|
||
177.https://blog.talosintelligence.com/2022/03/iranian-supergroup-muddywater.html
|
||
178.https://thedfirreport.com/2022/03/21/apt35-automates-initial-access-using-proxyshell/
|
||
179.https://blog.morphisec.com/vmware-identity-manager-attack-backdoor
|
||
180.https://www.cybereason.com/blog/operation-bearded-barbie-apt-c-23-campaign-targetingisraeli-officials
|
||
181.https://www.malwarebytes.com/blog/threat-intelligence/2022/05/apt34-targets-jordangovernment-using-new-saitama-backdoor
|
||
182.https://mp.weixin.qq.com/s/yjcCYJNUQq6smc3YsBmYhA
|
||
183.https://mp.weixin.qq.com/s/WBCGGLog3IwJhXZmbjxoTQ
|
||
184.https://lab52.io/blog/muddywaters-light-first-stager-targetting-middle-east/
|
||
185.https://mp.weixin.qq.com/s/1uJaPS-nuGNI8lQ1-ZekIA
|
||
186.https://www.avertium.com/resources/threat-reports/in-depth-look-at-apt35-aka-charmingkitten
|
||
187.https://www.deepinstinct.com/blog/new-muddywater-threat-old-kitten-new-tricks
|
||
188.https://securityintelligence.com/posts/hive00117-fileless-malware-delivery-eastern-europe/
|
||
189.https://mp.weixin.qq.com/s/eyIfchJVi9kJq_the8TIBQ
|
||
190.https://www.microsoft.com/security/blog/2022/07/27/untangling-knotweed-europeanprivate-sector-offensive-actor-using-0-day-exploits/
|
||
191.https://mp.weixin.qq.com/s/mstwBMkS0G3Et4GOji2mwA
|
||
192.https://www.mandiant.com/resources/blog/suspected-iranian-actor-targeting-israeli-shipping
|
||
193.http://blog.nsfocus.net/murenshark/
|
||
194.https://www.mandiant.com/resources/blog/dprk-whatsapp-phishing
|
||
195.https://www.sentinelone.com/labs/the-mystery-of-metador-an-unattributed-threat-hiding-intelcos-isps-and-universities/
|
||
196.https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/witchettysteganography-espionage
|
||
197.https://www.mandiant.com/resources/blog/trojanized-windows-installers-ukrainiangovernment
|
||
198.https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/
|
||
view#gid=0
|
||
199.https://www.volexity.com/blog/2022/06/15/driftingcloud-zero-day-sophos-firewallexploitation-and-an-insidious-breach/
|
||
200.https://decoded.avast.io/janvojtesek/the-return-of-candiru-zero-days-in-the-middle-east/
|
||
201.https://www.ncsgroup.vn/blog/warning-new-attack-campaign-utilized-a-new-0day-rcevulnerability-on-microsoft-exchange-server-12715.html
|
||
202.https://mp.weixin.qq.com/s/VeyE0LVqWXsQ2slahU5AWQ
|
||
203.https://ti.qianxin.com/blog/articles/operation-dragon-breath-(apt-q-27)-dimensionalityreduction-blow-to-the-gambling-industry/
|