Common Information
Type Value
Value
T1218
Category
Type Mitre Att&Ck Techniques
Misp Type
Description
Details Published Attributes CTI Title
Details Website 2021-11-16 70 Return of Emotet malware | Zscaler
Details Website 2021-11-10 12 The Newest Malicious Actor: “Squirrelwaffle” Malicious Doc. | McAfee Blog
Details Pdf 2021-11-04 153 Title
Details Pdf 2021-10-07 222 FIN12 GROUP PROFILE: FIN12 PRIORITIZES SPEED TO DEPLOY RANSOMWARE AGAINST HIGH-VALUE TARGETS
Details Website 2021-10-04 173 BazarLoader and the Conti Leaks
Details Website 2021-09-16 39 APT Actors Exploiting Newly Identified Vulnerability in ManageEngine ADSelfService Plus | CISA
Details Website 2021-08-31 30 Financial Institutions in the Sight of New JsOutProx Attack Waves - Yoroi
Details Website 2021-07-19 75 Chinese State-Sponsored Cyber Operations: Observed TTPs | CISA
Details Website 2021-07-08 16 Hancitor Making Use of Cookies to Prevent URL Scraping | McAfee Blog
Details Pdf 2021-06-29 131 2021 Threat Detection Report
Details Website 2021-04-06 71 McAfee Defender’s Blog: Cuba Ransomware Campaign | McAfee Blog
Details Website 2021-03-23 71 Multistage low-volume attack using AzureEdge and Shopify CDN
Details Pdf 2021-03-02 229 RANSOMWARE UNCOVERED 2020—2021
Details Website 2021-02-25 190 So Unchill: Melting UNC2198 ICEDID to Ransomware Operations | Mandiant
Details Website 2020-07-30 18 McAfee Defender’s Blog: Operation North Star Campaign | McAfee Blog
Details Website 2020-05-22 164 Cyber-Criminal espionage Operation insists on Italian Manufacturing - Yoroi
Details Website 2020-03-03 161 Molerats Delivers Spark Backdoor to Government and Telecommunications Organizations
Details Pdf 2020-02-21 224 2019 Annual Security Roundup: The Sprawling Reach of Complex Threats
Details Pdf 2019-12-05 259 Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data
Details Pdf 2019-11-29 259 Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data
Details Website 2019-07-29 13 What Is Mshta, How Can It Be Used and How to Protect Against It | McAfee Blog