Common Information
Type | Value |
---|---|
Value |
Российская Федерация |
Category | Target |
Type | Target-Information |
Misp Type | Cluster |
Description | None |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2020-06-17 | 24 | Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature | Malwarebytes Labs | ||
Details | Website | 2020-06-16 | 2 | ELF Malware Analysis 101: Linux Threats No Longer an Afterthought | ||
Details | Website | 2020-06-14 | 41 | Deep-dive: The DarkHotel APT | ||
Details | Website | 2020-06-10 | 39 | Anomali Threat Research Identifies Fake COVID-19 Contact Tracing Apps Used to Download Malware that Monitors Devices, Steals Personal Data | ||
Details | Website | 2020-06-09 | 18 | Looking at Big Threats Using Code Similarity – part 1 | ||
Details | Website | 2020-06-09 | 32 | Dark Basin: Uncovering a Massive Hack-For-Hire Operation - The Citizen Lab | ||
Details | Website | 2020-06-08 | 1 | German Task Force for COVID-19 Medical Equipment Targeted in Ongoing Phishing Campaign - Security Intelligence | ||
Details | Website | 2020-06-05 | 14 | Evasion Tactics in Hybrid Credit Card Skimmers | ||
Details | Website | 2020-06-04 | 1 | #LetsTalkSecurity: Ghost in the Machine | ||
Details | Website | 2020-05-28 | 0 | NSA: Russia's Sandworm Hackers Have Hijacked Mail Servers | ||
Details | Website | 2020-05-28 | 0 | Berlin seeks sanctions against Russian hackers over Bundestag cyberattack | ||
Details | Website | 2020-05-26 | 0 | German intelligence agencies warn of Russian hacking threats to critical infrastructure | ||
Details | Website | 2020-05-26 | 2 | Spam and phishing in Q1 2020 | ||
Details | Website | 2020-05-21 | 14 | Asnarök attackers twice modified attack midstream | ||
Details | Website | 2020-05-20 | 4 | IT threat evolution Q1 2020 | ||
Details | Website | 2020-05-20 | 26 | IT threat evolution Q1 2020. Statistics | ||
Details | Website | 2020-05-14 | 52 | Mikroceen: Spying backdoor leveraged in high‑profile networks in Central Asia | WeLiveSecurity | ||
Details | Website | 2020-05-12 | 53 | Top 10 Routinely Exploited Vulnerabilities | CISA | ||
Details | Website | 2020-05-11 | 0 | Executive Order: White House takes on Utility Hackers… | ||
Details | Website | 2020-05-11 | 0 | US Says Chinese Hacking Vaccine Research: Reports | SecurityWeek.Com | ||
Details | Website | 2020-05-07 | 24 | Poulight Stealer, a new Comprehensive Stealer from Russia - Yoroi | ||
Details | Website | 2020-05-07 | 0 | Energy Sector Critical Infrastructure: The Enemy Perspective | ||
Details | Website | 2020-05-06 | 2 | 039| Deconstructing the Dukes: A Researcher's Retrospective of APT29 - F-Secure Blog | ||
Details | Website | 2020-05-06 | 1 | DDoS attacks in Q1 2020 | ||
Details | Website | 2020-05-05 | 17 | How Mail Carrier Phishing Emails Tricked Businesses | Votiro |