Common Information
Type | Value |
---|---|
Value |
FIN6 |
Category | |
Type | Threat Actor Identifier - Fin |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-13 | 24 | Lessons from a Honeypot with US Citizens’ Data | ||
Details | Website | 2024-11-06 | 8 | Red Team Engagements on TryHackMe: The Ultimate Beginner’s Guide | ||
Details | Website | 2024-10-10 | 2 | Seqrite XDR: AV-TEST Certified Advanced EDR | Robust Protection | ||
Details | Website | 2024-10-03 | 4 | HR Honeypot: Hackers Flip the Script on Job Market Scams | ||
Details | Website | 2024-10-02 | 6 | Fake Job Applications Deliver Dangerous More_eggs Malware to HR Professionals | ||
Details | Website | 2024-10-02 | 6 | More_eggs Malware Spread via Fake Resumes to HR Departments | ||
Details | Website | 2024-10-01 | 18 | More_eggs Backdoor IOCs - III - SEC-1275-1 | ||
Details | Website | 2024-09-30 | 33 | MDR in Action: Preventing The More_eggs Backdoor From Hatching | ||
Details | Website | 2024-09-18 | 7 | RansomWar in Real Time, Case Study 2: Louisiana and Norsk Hydro, 2019 | ||
Details | 2024-07-04 | 66 | Defending Against OS Credential Dumping: Threat Landscape, Strategies, and Best Practices | |||
Details | Website | 2023-12-13 | 6 | Risky Biz News: Ukraine intelligence hacks and wipes Russia's tax agency | ||
Details | Website | 2023-10-26 | 3 | Detection Content to Address Attacker Techniques Covered in the “Domain of Thrones: Part I” Research - SOC Prime | ||
Details | 2023-10-06 | 32 | Cyber Threat Investigations & Expert Services (CTIX) FLASH Wrap-Up September 2023 | |||
Details | Website | 2023-06-14 | 9 | What Are Today’s Top Cyber Weapons? | ||
Details | Website | 2023-05-22 | 1 | Golden Chickens malware developer unmasked | ||
Details | Website | 2023-05-20 | 3 | Meet 'Jack' from Romania! Mastermind Behind Golden Chickens Malware | ||
Details | Website | 2023-05-20 | 2 | Meet 'Jack' from Romania! Mastermind Behind Golden Chickens Malware - RedPacket Security | ||
Details | Website | 2023-05-19 | 1 | Researchers Identify Second Developer of 'Golden Chickens' Malware | ||
Details | 2023-01-11 | 25 | Threat landscape for industrial automation systems | |||
Details | Website | 2022-10-18 | 31 | Unmasking VENOM SPIDER | ||
Details | Website | 2022-09-08 | 1 | Cyberattack Downtime Calculator - Make the case for MDR | ||
Details | Website | 2022-08-25 | 38 | MORE_EGGS and Some LinkedIn Resumé Spearphishing | ||
Details | Website | 2022-07-26 | 60 | Mandiant Red Team Emulates FIN11 Tactics To Control Operational Technology Servers | Mandiant | ||
Details | Website | 2022-07-14 | 237 | GitHub - MichaelKoczwara/Awesome-CobaltStrike-Defence: Defences against Cobalt Strike | ||
Details | Website | 2022-06-21 | 26 | Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 2) — Elastic Security Labs |