How to irregular cyber warfare
Tags
country: | China North Korea Iran Israel |
maec-delivery-vectors: | Watering Hole |
attack-pattern: | Phishing - T1660 Phishing - T1566 Vulnerabilities - T1588.006 |
Common Information
Type | Value |
---|---|
UUID | d72a8fd2-8e89-4f34-a7a2-d33cc7ba3848 |
Fingerprint | 36a11b1f2a51dbc5 |
Analysis status | DONE |
Considered CTI value | -2 |
Text language | |
Published | Oct. 14, 2018, midnight |
Added to db | Jan. 18, 2023, 8:28 p.m. |
Last updated | Aug. 31, 2024, 11:07 p.m. |
Headline | Errata Security |
Title | How to irregular cyber warfare |
Detected Hints/Tags/Attributes | 34/3/0 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://blog.erratasec.com/2018/10/how-to-irregular-cyber-warfare.html |
URL Provider