Common Information
Type | Value |
---|---|
Value |
APT12 |
Category | |
Type | Threat Actor Identifier - Apt |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | 2024-02-25 | 276 | Cyberwar 26 Feb 2024 | |||
Details | Website | 2022-11-24 | 8 | What is an advanced persistent threat (APT)? Definition, list, examples and management best practices | ||
Details | 2022-11-07 | 35 | China's Cyber Capabilitities: Warfare, Espionage, and Implications for the United States | |||
Details | Website | 2022-06-29 | 106 | Burrowing your way into VPNs, Proxies, and Tunnels | Mandiant | ||
Details | 2021-09-20 | 24 | China-Linked Group TAG-28 Targets India’s “The Times Group” and UIDAI (Aadhaar) Government Agency With Winnti Malware | |||
Details | 2021-09-20 | 32 | China-Linked Group TAG-28 Targets India’s “The Times Group” and UIDAI (Aadhaar) Government Agency With Winnti Malware | |||
Details | 2020-07-08 | 2403 | Threat Group Cards: A Threat Actor Encyclopedia | |||
Details | 2019-06-24 | 1277 | Threat Group Cards: A Threat Actor Encyclopedia | |||
Details | 2018-08-23 | 102 | CSS CYBER DEFENSE PROJECT Hotspot Analysis: Use of cybertools in regional tensions in Southeast Asia | |||
Details | 2018-02-14 | 22 | Targeting of Olympic Games IT Infrastructure Remains Unattributed | |||
Details | Website | 2016-12-01 | 8 | CNACOM Open Source Exploitation via Strategic Web Compromise | ||
Details | 2016-09-21 | 10 | Evron-Raz-VB2016-from1.indd | |||
Details | 2016-01-26 | 25 | Edwards-etal-VB2015.indd | |||
Details | Website | 2014-10-31 | 3 | Virus Bulletin :: CVE-2012-0158 continues to be used in targeted attacks | ||
Details | 2014-10-27 | 122 | APT28: A Window into Russia’s Cyber Espionage Operations? | FireEye | |||
Details | 2014-10-27 | 122 | SECURITY REIMAGINED | |||
Details | Website | 2014-09-03 | 30 | Darwin’s Favorite APT Group | Mandiant | ||
Details | — | 394 | A one-sided Affair: Japan and the People's Republic of China in Cyberspace |