Common Information
Type | Value |
---|---|
Value |
T1032 |
Category | |
Type | Mitre Att&Ck Techniques |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2022-07-26 | 60 | Mandiant Red Team Emulates FIN11 Tactics To Control Operational Technology Servers | Mandiant | ||
Details | 2022-02-23 | 312 | APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION | |||
Details | Website | 2021-03-16 | 92 | 日本の製造業を狙うTickグループ - セキュリティ事業 - マクニカ | ||
Details | Website | 2020-12-22 | 68 | Trickbot Malware-as-a-service | ||
Details | Website | 2020-07-20 | 85 | GOLDEN CHICKENS: Evolution of the MaaS | ||
Details | Website | 2020-06-15 | 44 | Global Malicious Spam Campaign Using Black Lives Matter as a Lure | FortiGuard Labs | ||
Details | Website | 2020-06-11 | 91 | Return of the Higaisa APT | Zscaler Blog | ||
Details | 2020-05-28 | 51 | MALWARE TECHNICAL INSIGHT TURLA “Penquin_x64 | |||
Details | Website | 2020-05-21 | 108 | No “Game over” for the Winnti Group | WeLiveSecurity | ||
Details | Website | 2020-05-14 | 52 | Mikroceen: Spying backdoor leveraged in high‑profile networks in Central Asia | WeLiveSecurity | ||
Details | Website | 2020-05-12 | 128 | Updated BackConfig Malware Targeting Government and Military Organizations in South Asia | ||
Details | Website | 2020-05-09 | 29 | Lazarus group leverages Covid themed HWP Document | ||
Details | Website | 2020-04-22 | 26 | Vietnamese Threat Actors APT32 Targets Wuhan Government | ||
Details | Website | 2020-04-22 | 26 | Vietnamese Threat Actors APT32 Targeting Wuhan Government and Chinese Ministry of Emergency Management in Latest Example of COVID-19 Related Espionage | Mandiant | ||
Details | 2020-03-30 | 14 | Defense Evasion Dominant in Top MITRE ATT&CK Tactics of 2019 | |||
Details | 2020-02-21 | 224 | 2019 Annual Security Roundup: The Sprawling Reach of Complex Threats | |||
Details | 2019-12-05 | 259 | Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data | |||
Details | 2019-11-29 | 259 | Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data | |||
Details | Website | 2019-10-10 | 41 | ESET discovers Attor, a spy platform with curious GSM fingerprinting | WeLiveSecurity | ||
Details | 2019-10-09 | 108 | AT COMMANDS, TOR-BASED COMMUNICATIONS | |||
Details | 2019-07-30 | 148 | OKRUM AND KETRICAN | |||
Details | 2019-05-01 | 86 | TURLA LIGHTNEURON | |||
Details | Website | 2019-03-11 | 60 | Gaming industry still in the scope of attackers in Asia | WeLiveSecurity |