Common Information
Type Value
Value
T1043
Category
Type Mitre Att&Ck Techniques
Misp Type
Description
Details Published Attributes CTI Title
Details Website 2020-06-11 91 Return of the Higaisa APT | Zscaler Blog
Details Pdf 2020-05-27 132 標的型攻撃の実態と 対策アプローチ
Details Pdf 2020-05-21 132 FROM AGENT.BTZ TO COMRAT V4
Details Website 2020-05-21 108 No “Game over” for the Winnti Group | WeLiveSecurity
Details Website 2020-05-14 52 Mikroceen: Spying backdoor leveraged in high‑profile networks in Central Asia | WeLiveSecurity
Details Website 2020-05-12 128 Updated BackConfig Malware Targeting Government and Military Organizations in South Asia
Details Pdf 2020-05-07 111 Tropic Trooper’s Back: USBferry Attack Targets Air-gapped Environments
Details Website 2020-04-17 71 Gamaredon APT Group Use Covid-19 Lure in Campaigns
Details Website 2020-02-27 79 “Higaisa(黑格莎)”组织近期攻击活动报告
Details Pdf 2020-02-21 224 2019 Annual Security Roundup: The Sprawling Reach of Complex Threats
Details Website 2020-02-12 5 CSI: Evidence Indicators for Targeted Ransomware Attacks - Part I | McAfee Blog
Details Website 2020-01-31 37 Winnti Group targeting universities in Hong Kong | WeLiveSecurity
Details Website 2019-12-17 11 It’s time to disconnect RDP from the internet | WeLiveSecurity
Details Pdf 2019-12-05 259 Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data
Details Pdf 2019-12-04 154 Pulling the PKPLUG: the Adversary Playbook for the long-standing espionage activity of a Chinese nation-state adversary
Details Pdf 2019-11-29 259 Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data
Details Pdf 2019-11-04 175 警惕来自节假日的祝福
Details Pdf 2019-10-28 69 Calypso APT
Details Website 2019-10-28 126 SWEED Targeting Precision Engineering Companies in Italy
Details Pdf 2019-10-23 70 Calypso APT
Details Website 2019-10-15 39 Illicit Cryptomining Threat Actor Rocke Changes Tactics, Now More Difficult to Detect
Details Website 2019-10-10 41 ESET discovers Attor, a spy platform with curious GSM fingerprinting | WeLiveSecurity
Details Pdf 2019-10-09 108 AT COMMANDS, TOR-BASED COMMUNICATIONS
Details Website 2019-08-14 252 In the Balkans, businesses are under fire from a double‑barreled weapon | WeLiveSecurity
Details Pdf 2019-08-13 284 MacProStorage02:_2019CLF:Bitdefender-Whitepaper-Hard-creat3095-A4-v2-en_EN:Bitdefender-Whitepaper-Hard-creat3095-A4-v2-en_EN.indd