Common Information
Type | Value |
---|---|
Value |
T1059 |
Category | |
Type | Mitre Att&Ck Techniques |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | 2020-02-21 | 224 | 2019 Annual Security Roundup: The Sprawling Reach of Complex Threats | |||
Details | Website | 2020-02-05 | 44 | Pro-Russian CyberSpy Gamaredon Intensifies Ukrainian Security Targeting - SentinelLabs | ||
Details | Website | 2020-01-29 | 54 | Emotet Technical Analysis - Part 1 Reveal the Evil Code | ||
Details | 2019-12-18 | 175 | MacProStorage-T3:4Work:Bitdefender-WhitePaper-RDPA-CREA4155-en_EN:Bitdefender-WhitePaper-RDPA-CREA4155-en_EN.indd | |||
Details | 2019-12-05 | 259 | Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data | |||
Details | 2019-11-29 | 259 | Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data | |||
Details | 2019-10-28 | 69 | Calypso APT | |||
Details | 2019-10-23 | 70 | Calypso APT | |||
Details | Website | 2019-10-23 | 147 | CyberThreatIntel/analysis.md at master · StrangerealIntel/CyberThreatIntel | ||
Details | Website | 2019-09-24 | 45 | 游走在东欧和中亚的奇幻熊 | ||
Details | Website | 2019-09-09 | 39 | ESET discovered an undocumented backdoor used by the infamous Stealth Falcon group | WeLiveSecurity | ||
Details | Website | 2019-08-14 | 252 | In the Balkans, businesses are under fire from a double‑barreled weapon | WeLiveSecurity | ||
Details | 2019-07-30 | 148 | OKRUM AND KETRICAN | |||
Details | Website | 2019-07-08 | 188 | Malicious campaign targets South Korean users with backdoor‑laced torrents | WeLiveSecurity | ||
Details | Website | 2019-05-07 | 2 | ATT&CK Series: Execution | ||
Details | Website | 2018-12-21 | 118 | The Christmas Card you never wanted - A new wave of Emotet is back to wreak havoc | ||
Details | Website | 2018-12-18 | 63 | Sofacy Creates New ‘Go’ Variant of Zebrocy Tool | ||
Details | — | 235 | Microsoft Word - Global Perspective of the SideWinder APT (pre-release final).docx | |||
Details | — | 178 | Demystifying the China’s Supply Chain Attack Targeting Financial Sector | |||
Details | — | 82 | TECHNICAL ANALYSIS OF THE NETWALKER RANSOMWARE |