Common Information
Type Value
Value
APT27
Category
Type Threat Actor Identifier - Apt
Misp Type
Description
Details Published Attributes CTI Title
Details Pdf 2023-05-02 329 IT-Bedrohunglage in Bezug auf industrielle Steuerungssysteme und kritische Infrasrukturen
Details Website 2023-04-30 4 When Cyber Spies Come Calling
Details Website 2023-04-24 23 Open-Source Gh0st RAT Still Haunting Inboxes 15 Years After Release
Details Website 2023-04-24 23 Open-Source Gh0st RAT Still Haunting Inboxes 15 Years After Release
Details Website 2023-04-15 4 Russia accuses NATO of launching 5,000 cyberattacks since 2022 - RedPacket Security
Details Website 2023-04-14 4 Russia accuses NATO of launching 5,000 cyberattacks since 2022
Details Website 2023-04-12 7 Beijing Calling: About Chinese APTs | SECUINFRA
Details Website 2023-03-24 3 Operation Soft Cell: Chinese Hackers Breach Middle East Telecom Providers - SPIXNET C2S
Details Website 2023-03-23 3 Operation Soft Cell: Chinese Hackers Breach Middle East Telecom Providers
Details Website 2023-03-23 3 Operation Soft Cell: Chinese Hackers Breach Middle East Telecom Providers
Details Website 2023-03-23 3 Operation Soft Cell: Chinese Hackers Breach Middle East Telecom Providers - RedPacket Security
Details Website 2023-03-06 14 6th March – Threat Intelligence Report - Check Point Research
Details Website 2023-03-03 3 Chinese hackers target Linux with malware update | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker - National Cyber Security Consulting
Details Website 2023-03-03 1 Iron Tiger updates malware to target Linux platform
Details Website 2023-03-01 1 Linux Support Expands Cyber Spy Group's Arsenal
Details Pdf 2023-02-15 73 JP-23-01 - Sustained activity by specific threat actors
Details Website 2023-01-03 21 Lookout Discovers Long-running Surveillance Campaigns Targeting Uyghurs | Lookout
Details Website 2023-01-01 123 The Mac Malware of 2022 👾
Details Website 2022-12-06 2 Amnesty International breach linked to Chinese government, investigation finds
Details Website 2022-12-06 9 Weaponizing the IT Supply Chain: Leviathan’s Attacks and Kinetic Naval Intervention in the South China Sea
Details Website 2022-12-01 27 Lucky Mouse: Incident Response to Detection Engineering
Details Website 2022-11-24 8 What is an advanced persistent threat (APT)? Definition, list, examples and management best practices
Details Website 2022-11-23 7 From Coercion to Invasion: The Theory and Execution of China’s Cyber Activity in Cross-Strait Relations
Details Pdf 2022-11-22 165 From Coercion to Invasion: The Theory and Execution of China’s Cyber Activity in Cross-Strait Relations
Details Website 2022-11-18 56 PC malware statistics, Q3 2022