Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack | Mandiant
Common Information
Type Value
UUID 84ea9c8c-26b8-482a-9a32-78e584053bd3
Fingerprint b49101f5b8adc5f1
Analysis status DONE
Considered CTI value 2
Text language
Published April 18, 2015, midnight
Added to db Nov. 6, 2023, 7:10 p.m.
Last updated Nov. 17, 2024, 6:54 p.m.
Headline Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack
Title Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack | Mandiant
Detected Hints/Tags/Attributes 45/1/8
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 330 Threat Intelligence https://www.mandiant.com/resources/blog/rss.xml 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details CVE 11
cve-2015-3043
Details CVE 37
cve-2015-1701
Details CVE 20
cve-2014-0515
Details Domain 1
ssl-icloud.com
Details IPv4 2
17.0.0.134
Details IPv4 3
87.236.215.246
Details IPv4 1
87.236.215.0
Details Threat Actor Identifier - APT 783
APT28