CSS CYBER DEFENSE PROJECT Hotspot Analysis: Use of cybertools in regional tensions in Southeast Asia
Common Information
Type | Value |
---|---|
UUID | e5dba522-3960-4f98-822d-212561468182 |
Fingerprint | 2755963f5e30113911dd546b800e17e3bc51becfcf588d5e073536446c9a1078 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Aug. 23, 2018, 1:45 p.m. |
Added to db | July 4, 2024, 3:34 p.m. |
Last updated | Aug. 31, 2024, 8:58 a.m. |
Headline | CSS CYBER DEFENSE PROJECT Hotspot Analysis: Use of cybertools in regional tensions in Southeast Asia |
Title | CSS CYBER DEFENSE PROJECT Hotspot Analysis: Use of cybertools in regional tensions in Southeast Asia |
Detected Hints/Tags/Attributes | 286/3/102 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 27 | cve-2014-4113 |
|
Details | CVE | 30 | cve-2015-2545 |
|
Details | Domain | 2 | sipo.gess.ethz.ch |
|
Details | Domain | 2 | www.css.ethz.ch |
|
Details | Domain | 172 | www.crowdstrike.com |
|
Details | Domain | 177 | blog.trendmicro.com |
|
Details | Domain | 1 | www.aunsec.org |
|
Details | Domain | 110 | doi.org |
|
Details | Domain | 1 | ir.info |
|
Details | Domain | 10 | thediplomat.com |
|
Details | Domain | 403 | securelist.com |
|
Details | Domain | 1 | missiledefenseadvocacy.org |
|
Details | Domain | 184 | www.fireeye.com |
|
Details | Domain | 18 | www.cfr.org |
|
Details | Domain | 2 | blog.airbuscybersecurity.com |
|
Details | Domain | 45 | www.eff.org |
|
Details | Domain | 13 | blog.rapid7.com |
|
Details | Domain | 7 | asia.nikkei.com |
|
Details | Domain | 1 | news.usni.org |
|
Details | Domain | 25 | www.scmagazineuk.com |
|
Details | Domain | 123 | www.reuters.com |
|
Details | Domain | 19 | www.pwc.co.uk |
|
Details | Domain | 2 | www.hackmageddon.com |
|
Details | Domain | 24 | researchcenter.paloaltonetworks.com |
|
Details | Domain | 16 | searchsecurity.techtarget.com |
|
Details | Domain | 1 | searchenterprisedesktop.techtarget.co |
|
Details | Domain | 38 | blogs.cisco.com |
|
Details | Domain | 216 | www.symantec.com |
|
Details | Domain | 6 | www.economist.com |
|
Details | Domain | 7 | www.threatconnect.com |
|
Details | Domain | 177 | www.wired.com |
|
Details | 2 | css@sipo.gess.ethz.ch |
||
Details | File | 5 | www.css |
|
Details | File | 1 | historyofasean.php |
|
Details | File | 1 | ir.inf |
|
Details | File | 3 | apt32.html |
|
Details | File | 2 | groups.html |
|
Details | File | 2 | blog.ai |
|
Details | File | 1 | the_eps_awakens.html |
|
Details | File | 1 | in-town.html |
|
Details | File | 3 | two.html |
|
Details | Mandiant Temporary Group Assumption | 5 | TEMP.AVENGERS |
|
Details | Threat Actor Identifier - APT-C | 44 | APT-C-00 |
|
Details | Threat Actor Identifier - APT | 132 | APT32 |
|
Details | Threat Actor Identifier - APT | 11 | APT16 |
|
Details | Threat Actor Identifier - APT | 31 | APT30 |
|
Details | Threat Actor Identifier - APT | 18 | APT12 |
|
Details | Threat Actor Identifier - APT | 41 | APT5 |
|
Details | Threat Actor Identifier by SecureWorks | 5 | TG-2754 |
|
Details | Url | 1 | https://www.crowdstrike.com/blog/crowdstri |
|
Details | Url | 12 | https://blog.trendmicro.com/trendlabs- |
|
Details | Url | 1 | http://www.aunsec.org/historyofasean.php |
|
Details | Url | 1 | https://doi.org/10.1109/cyconus.2016.7836 |
|
Details | Url | 1 | http://www.e |
|
Details | Url | 1 | https://thediplomat.com/2016/10/southeast- |
|
Details | Url | 2 | https://securelist.com/the-naikon-apt/69953 |
|
Details | Url | 1 | http://missiledefenseadvocacy.org/missile- |
|
Details | Url | 1 | http://thediplomat.com/2017/01/evaluating- |
|
Details | Url | 20 | https://www.fireeye.com/blog/threat- |
|
Details | Url | 1 | https://doi.org/10.1111/j.1540 |
|
Details | Url | 1 | https://doi.org/10.1080/18335330.2012.6531 |
|
Details | Url | 1 | https://www.cfr.org/blog-post/chinas- |
|
Details | Url | 1 | https://www.cfr.org/global/global-conflict- |
|
Details | Url | 2 | https://www.fireeye.com/current-threats/apt- |
|
Details | Url | 1 | http://blog.airbuscybersecurity.com/post/201 |
|
Details | Url | 1 | https://www.eff.org/deeplinks/2014/01/vietn |
|
Details | Url | 1 | https://www.cfr.org/report/conflict-south- |
|
Details | Url | 1 | https://www.cfr.org/report/armed-clash- |
|
Details | Url | 1 | https://www.cfr.org/blog/frustrated- |
|
Details | Url | 1 | https://securelist.com/cve-2015-2545- |
|
Details | Url | 1 | https://blog.rapid7.com/2013/06/07/keyboy- |
|
Details | Url | 1 | https://www.cfr.org/blog/can-asean-continue- |
|
Details | Url | 1 | https://doi.org/10.1109/iecon.2011.6120048 |
|
Details | Url | 1 | http://thediplomat.com/2013/05/the-real- |
|
Details | Url | 1 | https://www.crowdstrike.com/blog/rhetoric- |
|
Details | Url | 1 | https://asia.nikkei.com/business/business- |
|
Details | Url | 1 | https://news.usni.org/2012/06/20/south- |
|
Details | Url | 1 | https://www.cfr.org/blog/how-can- |
|
Details | Url | 1 | https://www.scmagazineuk.com/ocean-lotus- |
|
Details | Url | 1 | https://www.crowdstrike.com/blog/whois- |
|
Details | Url | 1 | https://thediplomat.com/2017/05/chinas- |
|
Details | Url | 4 | https://www.reuters.com/article/us- |
|
Details | Url | 1 | https://thediplomat.com/2018/04/south- |
|
Details | Url | 1 | https://thediplomat.com/2018/04/whats- |
|
Details | Url | 1 | https://thediplomat.com/2017/02/japan- |
|
Details | Url | 1 | https://thediplomat.com/2016/10/singapore- |
|
Details | Url | 2 | https://www.pwc.co.uk/issues/cyber-security- |
|
Details | Url | 1 | https://www.hackmageddon.com/2012/05/01 |
|
Details | Url | 1 | https://securelist.com/the-chronicles-of-the- |
|
Details | Url | 2 | https://researchcenter.paloaltonetworks.com |
|
Details | Url | 1 | http://searchsecurity.techtarget.com/definitio |
|
Details | Url | 1 | http://searchenterprisedesktop.techtarget.co |
|
Details | Url | 1 | https://doi.org/10.1109/cycon.2015.7158475 |
|
Details | Url | 1 | https://blogs.cisco.com/security/scope-of- |
|
Details | Url | 1 | https://www.symantec.com/connect/blogs/so |
|
Details | Url | 1 | https://www.symantec.com/connect/blogs/bl |
|
Details | Url | 1 | https://www.economist.com/special- |
|
Details | Url | 1 | https://www.threatconnect.com/china-hacks- |
|
Details | Url | 1 | https://www.threatconnect.com/piercing-the- |
|
Details | Url | 1 | https://doi.org/10.1080/23738871.2018.1487 |
|
Details | Url | 1 | https://www.wired.com/2016/01/hacker- |
|
Details | Url | 1 | https://www.wired.com/2014/12/hacker- |