Targeted Attack Trends: 2014 Annual Report
Common Information
Type | Value |
---|---|
UUID | 439262e0-2221-4003-b343-8e4de6dd95cd |
Fingerprint | 4779cd024dc3573b7a70efd8b217f2957c8b4e02a561eb8646bcaec22bd7bfd0 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | April 10, 2015, 6:02 p.m. |
Added to db | April 14, 2024, 10:39 a.m. |
Last updated | Aug. 30, 2024, 10:48 p.m. |
Headline | Targeted Attack Trends: 2014 Annual Report |
Title | Targeted Attack Trends: 2014 Annual Report |
Detected Hints/Tags/Attributes | 227/3/54 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 176 | cve-2012-0158 |
|
Details | CVE | 51 | cve-2014-1761 |
|
Details | CVE | 18 | cve-2014-6352 |
|
Details | CVE | 39 | cve-2014-4114 |
|
Details | Domain | 604 | www.trendmicro.com |
|
Details | Domain | 177 | blog.trendmicro.com |
|
Details | Domain | 1 | bitbucket.cassidiancybersecurity.com |
|
Details | Domain | 10 | www.japantimes.co.jp |
|
Details | Domain | 4 | www.commandfive.com |
|
Details | Domain | 212 | technet.microsoft.com |
|
Details | File | 3 | military.rtf |
|
Details | File | 1 | apec.xls |
|
Details | File | 3 | mh17.doc |
|
Details | File | 1 | idf_spokesperson_terror_attack_011012.doc |
|
Details | File | 4 | config.bak |
|
Details | File | 2 | flashplayerapp.exe |
|
Details | File | 1 | tan.exe |
|
Details | File | 1 | operation-arid-viper.pdf |
|
Details | File | 1 | wp-predator-pain-and-limitless.pdf |
|
Details | File | 1 | pitty%20tiger%20final%20report.pdf |
|
Details | File | 2 | c5_apt_skhack.pdf |
|
Details | File | 1 | wp-cybercriminals-use-what-works.pdf |
|
Details | File | 1 | wp_custom-defense-against-targeted-attacks.pdf |
|
Details | IPv4 | 3 | 94.185.85.122 |
|
Details | Url | 6 | http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp- |
|
Details | Url | 1 | http://blog.trendmicro.com/trendlabs-security-intelligence/risks-from-within- |
|
Details | Url | 1 | http://blog.trendmicro.com/trendlabs-security-intelligence/sandworm-to-blacken- |
|
Details | Url | 1 | http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-predator-pain-and-limitless.pdf |
|
Details | Url | 1 | http://blog.trendmicro.com/trendlabs-security-intelligence/pawn-storm-update- |
|
Details | Url | 1 | http://blog.trendmicro.com/trendlabs-security-intelligence/operation- |
|
Details | Url | 1 | http://bitbucket.cassidiancybersecurity.com/whitepapers |
|
Details | Url | 1 | http://www.japantimes.co.jp/news/2014/08/11/national/crime-legal/benesse-suspect-gets-fresh- |
|
Details | Url | 1 | http://www.japantimes.co.jp/news/2014/07/17/national/crime-legal/arrest-warrant-looms-systems-engineer- |
|
Details | Url | 1 | http://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ios_xagent.a |
|
Details | Url | 3 | http://blog.trendmicro.com/trendlabs-security-intelligence/new- |
|
Details | Url | 1 | http://blog.trendmicro.com/trendlabs-security-intelligence/specially-crafted-hwp- |
|
Details | Url | 1 | http://blog.trendmicro.com/trendlabs-security-intelligence/signed-pos- |
|
Details | Url | 2 | http://blog.trendmicro.com/trendlabs-security-intelligence/template-document- |
|
Details | Url | 1 | http://blog.trendmicro.com/trendlabs-security-intelligence/kivars-with- |
|
Details | Url | 1 | http://blog.trendmicro.com/trendlabs-security-intelligence/64-bit-version-of-havex-spotted/. |
|
Details | Url | 1 | http://blog.trendmicro.com/trendlabs-security-intelligence/wipall-malware- |
|
Details | Url | 1 | https://www.commandfive.com/papers/c5_apt_skhack.pdf |
|
Details | Url | 1 | http://blog.trendmicro.com/trendlabs-security-intelligence/plugx- |
|
Details | Url | 1 | http://blog.trendmicro.com/trendlabs-security-intelligence/bifrose-now- |
|
Details | Url | 24 | http://blog.trendmicro.com/trendlabs-security-intelligence |
|
Details | Url | 33 | http://blog.trendmicro.com/trendlabs-security- |
|
Details | Url | 1 | https://technet.microsoft.com/library/security/ms14-021. |
|
Details | Url | 1 | http://blog.trendmicro.com/trendlabs-security-intelligence/timeline-of-sandworm-attacks/. |
|
Details | Url | 1 | http://blog.trendmicro.com/trendlabs-security-intelligence/microsoft-windows-hit-by-new- |
|
Details | Url | 2 | http://blog.trendmicro.com/trendlabs-security-intelligence/plead- |
|
Details | Url | 1 | http://blog.trendmicro.com/trendlabs-security-intelligence/evilgrab-malware- |
|
Details | Url | 6 | http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white- |
|
Details | Url | 2 | http://www.trendmicro.com/us/enterprise/security-risk-management/deep-discovery/. |
|
Details | Url | 1 | http://www.trendmicro.com/cloud-content/us/pdfs/business/white-papers/wp_custom-defense-against-targeted-attacks.pdf |