Common Information
Type Value
Value
TEMP.PERISCOPE
Category
Type Mandiant Temporary Group Assumption
Misp Type
Description
Details Published Attributes CTI Title
Details Website 2024-10-29 3 Spy games: When Chinese hackers targeted foreign polls, governments | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Details Website 2024-09-04 11 Reconnaissance Scanning Tools Used by Chinese Threat Actors and Those Available in Open Source
Details Website 2024-07-17 17 Understanding APT40: Insights from CISA’s Latest Joint Security Advisory
Details Pdf 2024-02-25 276 Cyberwar 26 Feb 2024
Details Pdf 2023-11-22 136 MERICS REPORT
Details Website 2023-04-20 45 How Microsoft names threat actors
Details Website 2023-02-16 5 Threat Actors Sheets: OpenAI Generated !
Details Pdf 2023-01-11 25 Threat landscape for industrial automation systems
Details Pdf 2022-11-07 35 China's Cyber Capabilitities: Warfare, Espionage, and Implications for the United States
Details Pdf 2021-11-04 153 Title
Details Website 2021-11-03 7 Hackers Target Organizations in the Naval and Maritime Sectors | Infosec Resources
Details Website 2021-10-26 14 China cyber attacks: the current threat landscape
Details Website 2021-07-18 4 Four Chinese Nationals Working with the Ministry of State Security Charged with Global Computer Intrusion Campaign Targeting Intellectual Property and Confidential Business Information, Including Infectious Disease Research
Details Pdf 2021-01-07 25 Adversary Infrustructure Report 2020 - A Defender's View
Details Website 2021-01-04 43 nao-sec.org
Details Pdf 2020-12-30 25 Adversary Infrustructure Report 2020 - A Defender's View
Details Pdf 2020-12-01 129 UNKNOWN
Details Pdf 2020-07-08 2403 Threat Group Cards: A Threat Actor Encyclopedia
Details Pdf 2020-03-13 20 Cybersecurity threatscape
Details Pdf 2020-02-28 20 Актуальные киберугрозы
Details Pdf 2020-01-20 114 An Overhead View of the Royal Road
Details Website 2020-01-15 3 Hainan Xiandun Technology Company is APT40
Details Pdf 2019-12-04 195 Attribution is in the object: using RTF object dimensions to track APT phishing weaponizers
Details Pdf 2019-06-24 1277 Threat Group Cards: A Threat Actor Encyclopedia
Details Pdf 2019-06-24 18 Hack at all costs