Common Information
Type | Value |
---|---|
Value |
T1022 |
Category | |
Type | Mitre Att&Ck Techniques |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2022-07-26 | 60 | Mandiant Red Team Emulates FIN11 Tactics To Control Operational Technology Servers | Mandiant | ||
Details | 2022-02-23 | 312 | APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION | |||
Details | Website | 2021-11-19 | 43 | Corporate Loader "Emotet": History of "X" Project Return for Ransomware | ||
Details | Website | 2020-06-18 | 76 | Digging up InvisiMole’s hidden arsenal | WeLiveSecurity | ||
Details | 2020-06-15 | 335 | INVISIMOLE: THE HIDDEN PART OF THE STORY | |||
Details | Website | 2020-06-11 | 91 | Return of the Higaisa APT | Zscaler Blog | ||
Details | 2020-05-21 | 132 | FROM AGENT.BTZ TO COMRAT V4 | |||
Details | Website | 2020-05-09 | 29 | Lazarus group leverages Covid themed HWP Document | ||
Details | 2020-05-07 | 111 | Tropic Trooper’s Back: USBferry Attack Targets Air-gapped Environments | |||
Details | Website | 2020-04-20 | 39 | WINNTI GROUP: Insights From the Past | ||
Details | 2020-03-30 | 14 | Defense Evasion Dominant in Top MITRE ATT&CK Tactics of 2019 | |||
Details | 2020-02-21 | 224 | 2019 Annual Security Roundup: The Sprawling Reach of Complex Threats | |||
Details | Website | 2020-01-31 | 37 | Winnti Group targeting universities in Hong Kong | WeLiveSecurity | ||
Details | 2019-12-05 | 259 | Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data | |||
Details | 2019-11-29 | 259 | Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data | |||
Details | 2019-11-06 | 68 | A vine climbing over the Great Firewall: a long‑term attack against China | |||
Details | Website | 2019-10-23 | 147 | CyberThreatIntel/analysis.md at master · StrangerealIntel/CyberThreatIntel | ||
Details | Website | 2019-10-10 | 41 | ESET discovers Attor, a spy platform with curious GSM fingerprinting | WeLiveSecurity | ||
Details | 2019-10-09 | 108 | AT COMMANDS, TOR-BASED COMMUNICATIONS | |||
Details | Website | 2019-09-09 | 39 | ESET discovered an undocumented backdoor used by the infamous Stealth Falcon group | WeLiveSecurity | ||
Details | 2019-08-09 | 248 | MACHETE JUST GOT SHARPER | |||
Details | 2019-07-30 | 148 | OKRUM AND KETRICAN | |||
Details | 2019-05-01 | 86 | TURLA LIGHTNEURON | |||
Details | Website | 2019-04-30 | 281 | Buhtrap backdoor and Buran ransomware distributed via major advertising platform | WeLiveSecurity | ||
Details | Website | 2019-04-22 | 48 | CB TAU Threat Intelligence Notification: HopLight Campaign (Linked to North Korea) is Reusing Substantial Amount of Code |