Common Information
Type | Value |
---|---|
Value |
APT27 |
Category | |
Type | Threat Actor Identifier - Apt |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | 2023-05-02 | 329 | IT-Bedrohunglage in Bezug auf industrielle Steuerungssysteme und kritische Infrasrukturen | |||
Details | Website | 2023-04-30 | 4 | When Cyber Spies Come Calling | ||
Details | Website | 2023-04-24 | 23 | Open-Source Gh0st RAT Still Haunting Inboxes 15 Years After Release | ||
Details | Website | 2023-04-24 | 23 | Open-Source Gh0st RAT Still Haunting Inboxes 15 Years After Release | ||
Details | Website | 2023-04-15 | 4 | Russia accuses NATO of launching 5,000 cyberattacks since 2022 - RedPacket Security | ||
Details | Website | 2023-04-14 | 4 | Russia accuses NATO of launching 5,000 cyberattacks since 2022 | ||
Details | Website | 2023-04-12 | 7 | Beijing Calling: About Chinese APTs | SECUINFRA | ||
Details | Website | 2023-03-24 | 3 | Operation Soft Cell: Chinese Hackers Breach Middle East Telecom Providers - SPIXNET C2S | ||
Details | Website | 2023-03-23 | 3 | Operation Soft Cell: Chinese Hackers Breach Middle East Telecom Providers | ||
Details | Website | 2023-03-23 | 3 | Operation Soft Cell: Chinese Hackers Breach Middle East Telecom Providers | ||
Details | Website | 2023-03-23 | 3 | Operation Soft Cell: Chinese Hackers Breach Middle East Telecom Providers - RedPacket Security | ||
Details | Website | 2023-03-06 | 14 | 6th March – Threat Intelligence Report - Check Point Research | ||
Details | Website | 2023-03-03 | 3 | Chinese hackers target Linux with malware update | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker - National Cyber Security Consulting | ||
Details | Website | 2023-03-03 | 1 | Iron Tiger updates malware to target Linux platform | ||
Details | Website | 2023-03-01 | 1 | Linux Support Expands Cyber Spy Group's Arsenal | ||
Details | 2023-02-15 | 73 | JP-23-01 - Sustained activity by specific threat actors | |||
Details | Website | 2023-01-03 | 21 | Lookout Discovers Long-running Surveillance Campaigns Targeting Uyghurs | Lookout | ||
Details | Website | 2023-01-01 | 123 | The Mac Malware of 2022 👾 | ||
Details | Website | 2022-12-06 | 2 | Amnesty International breach linked to Chinese government, investigation finds | ||
Details | Website | 2022-12-06 | 9 | Weaponizing the IT Supply Chain: Leviathan’s Attacks and Kinetic Naval Intervention in the South China Sea | ||
Details | Website | 2022-12-01 | 27 | Lucky Mouse: Incident Response to Detection Engineering | ||
Details | Website | 2022-11-24 | 8 | What is an advanced persistent threat (APT)? Definition, list, examples and management best practices | ||
Details | Website | 2022-11-23 | 7 | From Coercion to Invasion: The Theory and Execution of China’s Cyber Activity in Cross-Strait Relations | ||
Details | 2022-11-22 | 165 | From Coercion to Invasion: The Theory and Execution of China’s Cyber Activity in Cross-Strait Relations | |||
Details | Website | 2022-11-18 | 56 | PC malware statistics, Q3 2022 |