Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack | Mandiant
Tags
attack-pattern: | Data Domains - T1583.001 Domains - T1584.001 Exploits - T1587.004 Exploits - T1588.005 Malware - T1587.001 Malware - T1588.001 Vulnerabilities - T1588.006 |
Common Information
Type | Value |
---|---|
UUID | 84ea9c8c-26b8-482a-9a32-78e584053bd3 |
Fingerprint | b49101f5b8adc5f1 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | April 18, 2015, midnight |
Added to db | Nov. 6, 2023, 7:10 p.m. |
Last updated | Nov. 17, 2024, 6:54 p.m. |
Headline | Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack |
Title | Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack | Mandiant |
Detected Hints/Tags/Attributes | 45/1/8 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 330 | ✔ | Threat Intelligence | https://www.mandiant.com/resources/blog/rss.xml | 2024-08-30 22:08 |