Common Information
Type Value
Value
T1588.004
Category
Type Mitre Att&Ck Techniques
Misp Type
Description
Details Published Attributes CTI Title
Details Pdf 2024-10-08 167 Outmaneuvering Rhysida: How Advanced Threat Intelligence Shields Critical Infrastructure from Ransomware
Details Pdf 2024-07-09 207 APT40 Advisory - PRC MSS tradecraft in action
Details Pdf 2024-07-08 207 APT40 Advisory - PRC MSS tradecraft in action
Details Website 2024-06-03 96 Ransomware Rebounds: Extortion Threat Surges in 2023, Attackers Rely on Publicly Available and Legitimate Tools | Google Cloud Blog
Details Pdf 2023-04-27 44 PowerPoint Presentation
Details Website 2023-04-25 54 Anomali Cyber Watch: Two Supply-Chain Attacks Chained Together, Decoy Dog Stealthy DNS Communication, EvilExtractor Exfiltrates to FTP Server
Details Website 2023-04-20 72 3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible | Mandiant
Details Pdf 2023-04-04 194 PowerPoint Presentation
Details Website 2023-01-24 16 Anomali Cyber Watch: Roaming Mantis Changes DNS on Wi-Fi Routers, Hook Android Banking Trojan Has Device Take-Over Capabilities, Ke3chang Targeted Iran with Updated Turian Backdoor
Details Pdf 2022-11-16 216 IcedID-IcedID Beacon - Hunting, Preventing, and Responding to IcedID Malware using Logpoint
Details Pdf 2022-09-09 96 PowerPoint Presentation
Details Pdf 2022-09-01 144 APT42: Crooked Charms, Cons and Compromises
Details Website 2022-06-02 99 To HADES and Back: UNC2165 Shifts to LOCKBIT to Evade Sanctions | Mandiant
Details Pdf 2022-05-21 344 UNKNOWN
Details Website 2022-04-28 128 Tracking APT29 Phishing Campaigns | Atlassian Trello
Details Website 2021-05-04 133 The UNC2529 Triple Double: A Trifecta Phishing Campaign | Mandiant
Details Website 2021-02-25 190 So Unchill: Melting UNC2198 ICEDID to Ransomware Operations | Mandiant
Details Website 2020-12-22 66 Spicy Hot Pot Rootkit: Finding, Hunting, and Eradicating It