CSS CYBER DEFENSE PROJECT Hotspot Analysis: Use of cybertools in regional tensions in Southeast Asia
Image Description
Common Information
Type Value
UUID e5dba522-3960-4f98-822d-212561468182
Fingerprint 2755963f5e30113911dd546b800e17e3bc51becfcf588d5e073536446c9a1078
Analysis status DONE
Considered CTI value 2
Text language
Published Aug. 23, 2018, 1:45 p.m.
Added to db July 4, 2024, 3:34 p.m.
Last updated Aug. 31, 2024, 8:58 a.m.
Headline CSS CYBER DEFENSE PROJECT Hotspot Analysis: Use of cybertools in regional tensions in Southeast Asia
Title CSS CYBER DEFENSE PROJECT Hotspot Analysis: Use of cybertools in regional tensions in Southeast Asia
Detected Hints/Tags/Attributes 286/3/102
Attributes
Details Type #Events CTI Value
Details CVE 27
cve-2014-4113
Details CVE 30
cve-2015-2545
Details Domain 2
sipo.gess.ethz.ch
Details Domain 2
www.css.ethz.ch
Details Domain 172
www.crowdstrike.com
Details Domain 177
blog.trendmicro.com
Details Domain 1
www.aunsec.org
Details Domain 110
doi.org
Details Domain 1
ir.info
Details Domain 10
thediplomat.com
Details Domain 403
securelist.com
Details Domain 1
missiledefenseadvocacy.org
Details Domain 184
www.fireeye.com
Details Domain 18
www.cfr.org
Details Domain 2
blog.airbuscybersecurity.com
Details Domain 45
www.eff.org
Details Domain 13
blog.rapid7.com
Details Domain 7
asia.nikkei.com
Details Domain 1
news.usni.org
Details Domain 25
www.scmagazineuk.com
Details Domain 123
www.reuters.com
Details Domain 19
www.pwc.co.uk
Details Domain 2
www.hackmageddon.com
Details Domain 24
researchcenter.paloaltonetworks.com
Details Domain 16
searchsecurity.techtarget.com
Details Domain 1
searchenterprisedesktop.techtarget.co
Details Domain 38
blogs.cisco.com
Details Domain 216
www.symantec.com
Details Domain 6
www.economist.com
Details Domain 7
www.threatconnect.com
Details Domain 177
www.wired.com
Details Email 2
css@sipo.gess.ethz.ch
Details File 5
www.css
Details File 1
historyofasean.php
Details File 1
ir.inf
Details File 3
apt32.html
Details File 2
groups.html
Details File 2
blog.ai
Details File 1
the_eps_awakens.html
Details File 1
in-town.html
Details File 3
two.html
Details Mandiant Temporary Group Assumption 5
TEMP.AVENGERS
Details Threat Actor Identifier - APT-C 44
APT-C-00
Details Threat Actor Identifier - APT 132
APT32
Details Threat Actor Identifier - APT 11
APT16
Details Threat Actor Identifier - APT 31
APT30
Details Threat Actor Identifier - APT 18
APT12
Details Threat Actor Identifier - APT 41
APT5
Details Threat Actor Identifier by SecureWorks 5
TG-2754
Details Url 1
https://www.crowdstrike.com/blog/crowdstri
Details Url 12
https://blog.trendmicro.com/trendlabs-
Details Url 1
http://www.aunsec.org/historyofasean.php
Details Url 1
https://doi.org/10.1109/cyconus.2016.7836
Details Url 1
http://www.e
Details Url 1
https://thediplomat.com/2016/10/southeast-
Details Url 2
https://securelist.com/the-naikon-apt/69953
Details Url 1
http://missiledefenseadvocacy.org/missile-
Details Url 1
http://thediplomat.com/2017/01/evaluating-
Details Url 20
https://www.fireeye.com/blog/threat-
Details Url 1
https://doi.org/10.1111/j.1540
Details Url 1
https://doi.org/10.1080/18335330.2012.6531
Details Url 1
https://www.cfr.org/blog-post/chinas-
Details Url 1
https://www.cfr.org/global/global-conflict-
Details Url 2
https://www.fireeye.com/current-threats/apt-
Details Url 1
http://blog.airbuscybersecurity.com/post/201
Details Url 1
https://www.eff.org/deeplinks/2014/01/vietn
Details Url 1
https://www.cfr.org/report/conflict-south-
Details Url 1
https://www.cfr.org/report/armed-clash-
Details Url 1
https://www.cfr.org/blog/frustrated-
Details Url 1
https://securelist.com/cve-2015-2545-
Details Url 1
https://blog.rapid7.com/2013/06/07/keyboy-
Details Url 1
https://www.cfr.org/blog/can-asean-continue-
Details Url 1
https://doi.org/10.1109/iecon.2011.6120048
Details Url 1
http://thediplomat.com/2013/05/the-real-
Details Url 1
https://www.crowdstrike.com/blog/rhetoric-
Details Url 1
https://asia.nikkei.com/business/business-
Details Url 1
https://news.usni.org/2012/06/20/south-
Details Url 1
https://www.cfr.org/blog/how-can-
Details Url 1
https://www.scmagazineuk.com/ocean-lotus-
Details Url 1
https://www.crowdstrike.com/blog/whois-
Details Url 1
https://thediplomat.com/2017/05/chinas-
Details Url 4
https://www.reuters.com/article/us-
Details Url 1
https://thediplomat.com/2018/04/south-
Details Url 1
https://thediplomat.com/2018/04/whats-
Details Url 1
https://thediplomat.com/2017/02/japan-
Details Url 1
https://thediplomat.com/2016/10/singapore-
Details Url 2
https://www.pwc.co.uk/issues/cyber-security-
Details Url 1
https://www.hackmageddon.com/2012/05/01
Details Url 1
https://securelist.com/the-chronicles-of-the-
Details Url 2
https://researchcenter.paloaltonetworks.com
Details Url 1
http://searchsecurity.techtarget.com/definitio
Details Url 1
http://searchenterprisedesktop.techtarget.co
Details Url 1
https://doi.org/10.1109/cycon.2015.7158475
Details Url 1
https://blogs.cisco.com/security/scope-of-
Details Url 1
https://www.symantec.com/connect/blogs/so
Details Url 1
https://www.symantec.com/connect/blogs/bl
Details Url 1
https://www.economist.com/special-
Details Url 1
https://www.threatconnect.com/china-hacks-
Details Url 1
https://www.threatconnect.com/piercing-the-
Details Url 1
https://doi.org/10.1080/23738871.2018.1487
Details Url 1
https://www.wired.com/2016/01/hacker-
Details Url 1
https://www.wired.com/2014/12/hacker-