Common Information
Type | Value |
---|---|
Value |
APT19 |
Category | |
Type | Threat Actor Identifier - Apt |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-02 | 6 | Chinese Threat Groups That Use Ransomware and Ransomware Groups That Use Chinese Names | ||
Details | 2024-02-25 | 276 | Cyberwar 26 Feb 2024 | |||
Details | Website | 2023-06-13 | 2 | What is New in the MITRE ATT&CK Framework v12 and v13? | ||
Details | Website | 2023-03-02 | 5 | Threat Actors: The Definitive 2023 Guide to Cybercriminals | ||
Details | 2023-01-20 | 454 | CYBERDEFENSE REPORT Software Supply Chain Attacks An Illustrated Typological Review | |||
Details | 2022-11-07 | 35 | China's Cyber Capabilitities: Warfare, Espionage, and Implications for the United States | |||
Details | Website | 2022-09-06 | 50 | Adversaries Actively Utilizing PowerShell Empire | ||
Details | 2022-05-21 | 344 | UNKNOWN | |||
Details | Website | 2022-05-12 | 24 | SCYTHE Library: #ThreatThursday - Buhtrap | ||
Details | 2022-02-23 | 312 | APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION | |||
Details | Website | 2022-01-01 | 6 | CyberThreatIntel/Analysis.md at master · StrangerealIntel/CyberThreatIntel | ||
Details | 2021-11-04 | 153 | Title | |||
Details | Website | 2021-03-24 | 10 | Hunting and detecting Cobalt Strike | ||
Details | Website | 2020-10-01 | 85 | Potential for China Cyber Response to Heightened U.S.–China Tensions | CISA | ||
Details | 2020-07-08 | 2403 | Threat Group Cards: A Threat Actor Encyclopedia | |||
Details | 2020-03-30 | 14 | Defense Evasion Dominant in Top MITRE ATT&CK Tactics of 2019 | |||
Details | 2019-12-09 | 77 | HI TECH CRIME TRENDS 2019/2020 | |||
Details | 2019-12-05 | 73 | HI TECH CRIME TRENDS 2019/2020 | |||
Details | Website | 2019-08-29 | 233 | Definitive Dossier of Devilish Debug Details – Part One: PDB Paths and Malware | Mandiant | ||
Details | 2019-06-24 | 1277 | Threat Group Cards: A Threat Actor Encyclopedia | |||
Details | Website | 2017-07-01 | 2 | Connect the Dots on State-Sponsored Cyber Incidents - Deep Panda | ||
Details | Website | 2017-06-30 | 12 | Obfuscation in the Wild: Targeted Attackers Lead the Way in Evasion Techniques | Mandiant | ||
Details | Website | 2017-06-06 | 52 | Privileges and Credentials: Phished at the Request of Counsel | Mandiant | ||
Details | 2017-04-04 | 113 | Operation Cloud Hopper |