Threat Intel Reads – January 2019
Tags
Common Information
Type | Value |
---|---|
UUID | fa24c482-083f-4b4a-8701-442e2a50d91c |
Fingerprint | 9dd020c992bd930a |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Feb. 2, 2019, 1:13 p.m. |
Added to db | Jan. 18, 2023, 10:39 p.m. |
Last updated | Nov. 17, 2024, 6:45 p.m. |
Headline | Tilting at windmills |
Title | Threat Intel Reads – January 2019 |
Detected Hints/Tags/Attributes | 90/2/136 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://threatintel.eu/2019/02/02/threat-intel-reads-january-2019/ |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 19 | www.politico.com |
|
Details | Domain | 434 | medium.com |
|
Details | Domain | 151 | www.bbc.com |
|
Details | Domain | 175 | www.zdnet.com |
|
Details | Domain | 145 | threatpost.com |
|
Details | Domain | 4 | www.betaalvereniging.nl |
|
Details | Domain | 2 | www.mbsecure.nl |
|
Details | Domain | 101 | www.theregister.co.uk |
|
Details | Domain | 16 | zeltser.com |
|
Details | Domain | 1 | juliareda.eu |
|
Details | Domain | 3 | www.mci.gov.sg |
|
Details | Domain | 768 | www.youtube.com |
|
Details | Domain | 2 | www.hackmageddon.com |
|
Details | Domain | 1 | bitofhex.com |
|
Details | Domain | 3 | blog-cert.opmd.fr |
|
Details | Domain | 172 | www.crowdstrike.com |
|
Details | Domain | 124 | www.nytimes.com |
|
Details | Domain | 43 | www.cyberscoop.com |
|
Details | Domain | 546 | www.recordedfuture.com |
|
Details | Domain | 1 | www.attack-community.org |
|
Details | Domain | 7 | www.nextron-systems.com |
|
Details | Domain | 1 | www.alexanderjaeger.de |
|
Details | Domain | 34 | www.enisa.europa.eu |
|
Details | Domain | 14 | www.flashpoint-intel.com |
|
Details | Domain | 27 | www.weforum.org |
|
Details | Domain | 3 | blog.haschek.at |
|
Details | Domain | 101 | cert.pl |
|
Details | Domain | 28 | www.cert.pl |
|
Details | Domain | 675 | www.linkedin.com |
|
Details | Domain | 1 | measuredresponse.org |
|
Details | Domain | 5 | cyber.dhs.gov |
|
Details | Domain | 39 | www.wsj.com |
|
Details | Domain | 19 | www.trustedsec.com |
|
Details | Domain | 1 | blog.lukaszolejnik.com |
|
Details | Domain | 41 | www.freebuf.com |
|
Details | Domain | 13 | theintercept.com |
|
Details | Domain | 98 | www.ncsc.gov.uk |
|
Details | Domain | 9 | www.thedailybeast.com |
|
Details | Domain | 403 | securelist.com |
|
Details | Domain | 1 | assets.bwbx.io |
|
Details | Domain | 123 | www.reuters.com |
|
Details | Domain | 170 | www.sans.org |
|
Details | Domain | 1 | www.redcanary.com |
|
Details | Domain | 28 | www.splunk.com |
|
Details | Domain | 114 | dragos.com |
|
Details | Domain | 2 | dale-peterson.com |
|
Details | Domain | 11 | dirkjanm.io |
|
Details | Domain | 1 | www.pscp.tv |
|
Details | 1 | medium.com/@maarten.goet |
||
Details | File | 1 | def-tahiti-threat-hunting-methodology.pdf |
|
Details | File | 2 | global-dns-hijacking-campaign-dns-record-manipulation-at-scale.html |
|
Details | File | 5 | 2019.pdf |
|
Details | File | 1 | poland-china-huawei-spy.html |
|
Details | File | 1 | the-curious-case-of-the-raspi-in-our-network.html |
|
Details | File | 99 | cert.pl |
|
Details | File | 141 | www.cer |
|
Details | File | 38 | t.pl |
|
Details | File | 1 | 193553.html |
|
Details | File | 1204 | index.php |
|
Details | File | 1 | -datamodel-endpoint.html |
|
Details | File | 22 | www.ps |
|
Details | Url | 1 | http://www.robertmlee.org/attribution-is-not-transitive-tribune-publishing-cyber-attack-as-a-case-study |
|
Details | Url | 1 | https://www.politico.com/story/2018/12/31/nsa-hacking-case-twitter-1077013 |
|
Details | Url | 1 | https://medium.com/@maarten.goet/windows-defender-atp-harnessing-the-collective-intelligence-of-the-infosec-community-for-threat-1758ec987db8 |
|
Details | Url | 252 | https://medium.com |
|
Details | Url | 1 | https://www.bbc.com/news/world-europe-46757009 |
|
Details | Url | 1 | https://www.zdnet.com/article/nsa-to-release-a-free-reverse-engineering-tool |
|
Details | Url | 1 | https://threatpost.com/uefi-rootkit-sednit/140420 |
|
Details | Url | 1 | https://www.betaalvereniging.nl/wp-content/uploads/def-tahiti-threat-hunting-methodology.pdf |
|
Details | Url | 1 | https://www.mbsecure.nl/blog/2018/12/tahiti-threat-hunting-methodology |
|
Details | Url | 1 | https://www.theregister.co.uk/2019/01/08/german_20_yr_old_confess_mass_hack_angriff |
|
Details | Url | 1 | https://zeltser.com/cybersecurity-writing-course |
|
Details | Url | 1 | https://www.reuters.com/article/us-huawei-iran-exclusive/exclusive-new-documents-link-huawei-to-suspected-front-companies-in-iran-syria-iduskcn1p21mh |
|
Details | Url | 1 | https://juliareda.eu/2018/12/eu-fossa-bug-bounties |
|
Details | Url | 1 | https://www.politico.com/story/2019/01/09/russia-kaspersky-lab-nsa-cybersecurity-1089131 |
|
Details | Url | 2 | https://www.fireeye.com/blog/threat-research/2019/01/global-dns-hijacking-campaign-dns-record-manipulation-at-scale.html |
|
Details | Url | 1 | https://www.wsj.com/articles/americas-electric-grid-has-a-vulnerable-back-doorand-russia-walked-through-it-11547137112 |
|
Details | Url | 1 | https://www.mci.gov.sg |
|
Details | Url | 1 | https://www.youtube.com/watch?v=cp0rjgepwew |
|
Details | Url | 1 | https://www.hackmageddon.com/2019/01/15/2018-a-year-of-cyber-attacks |
|
Details | Url | 1 | https://bitofhex.com/2019/01/13/attack-and-singapore-breach |
|
Details | Url | 3 | https://blog-cert.opmd.fr/dnspionage-focus-on-internal-actions |
|
Details | Url | 2 | https://www.crowdstrike.com/blog/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware |
|
Details | Url | 1 | https://www.nytimes.com/2019/01/11/world/europe/poland-china-huawei-spy.html |
|
Details | Url | 1 | https://www.theregister.co.uk/2019/01/11/notpetya_insurance_claim |
|
Details | Url | 1 | https://www.cyberscoop.com/mobile-zero-days-lookout-shmoocon-2019-android-barracuda-ios-stonefish |
|
Details | Url | 1 | https://www.recordedfuture.com/ashiyane-forum-history |
|
Details | Url | 1 | https://www.justice.gov/opa/pr/two-ukrainian-nationals-indicted-computer-hacking-and-securities-fraud-scheme-targeting-us |
|
Details | Url | 1 | https://www.attack-community.org/2019-01-15-third-workshop-at-eurocontrol-brussels |
|
Details | Url | 1 | https://www.nextron-systems.com/2019/01/02/50-shades-of-yara |
|
Details | Url | 1 | https://www.alexanderjaeger.de/autotimeliner-to-cyberchef-to-timesketch |
|
Details | Url | 1 | https://www.cyberscoop.com/trisis-investigator-saudi-aramco-schneider-electric-s4x19 |
|
Details | Url | 1 | https://www.enisa.europa.eu/publications/analysis-of-the-european-r-d-priorities-in-cybersecurity |
|
Details | Url | 1 | https://www.flashpoint-intel.com/blog/why-executive-protection-teams-need-finished-intelligence |
|
Details | Url | 1 | https://www.weforum.org/reports/the-global-risks-report-2019 |
|
Details | Url | 1 | https://blog.haschek.at/2018/the-curious-case-of-the-raspi-in-our-network.html |
|
Details | Url | 1 | https://www.cert.pl/en/news/single/mwdb-our-way-to-share-information-about-malicious-software |
|
Details | Url | 1 | https://www.enisa.europa.eu/news/enisa-news/supporting-the-fight-against-cybercrime-enisa-report-on-csirts-and-law-enforcement-cooperation |
|
Details | Url | 1 | https://www.bleepingcomputer.com/news/security/darkhydrus-apt-uses-google-drive-to-send-commands-to-roguerobin-trojan |
|
Details | Url | 1 | https://medium.com/mitre-attack/would-a-detection-by-any-other-name-detect-as-well-part-1-1577eba255bc |
|
Details | Url | 1 | https://www.linkedin.com/pulse/how-can-single-report-appeal-both-executives-lenny-zeltser |
|
Details | Url | 1 | https://measuredresponse.org/threat-modeling |
|
Details | Url | 1 | https://www.cyberscoop.com/dhs-dns-directive-government-shutdown |
|
Details | Url | 1 | https://cyber.dhs.gov/ed/19-01 |
|
Details | Url | 1 | https://blogs.technet.microsoft.com/exchange/2019/01/04/contextualizing-attacker-activity-within-sessions-in-exchange-online |
|
Details | Url | 1 | https://www.zdnet.com/article/zerodium-will-now-pay-2-million-for-apple-ios-remote-jailbreaks |
|
Details | Url | 1 | https://www.wsj.com/articles/inside-googles-team-battling-hackers-11548264655 |
|
Details | Url | 1 | https://www.trustedsec.com/2018/12/webinar-series-post-exploitation |
|
Details | Url | 1 | https://zeltser.com/executive-summary-for-security-assessment-report-tips |
|
Details | Url | 1 | https://blog.lukaszolejnik.com/the-french-doctrine-of-offensive-cyber-operations |
|
Details | Url | 1 | https://www.freebuf.com/articles/paper/193553.html |
|
Details | Url | 1 | https://www.darkreading.com/attacks-breaches/triton-trisis-attack-was-more-widespread-than-publicly-known/d/d-id/1333661 |
|
Details | Url | 1 | https://theintercept.com/document/2019/01/24/intellipedia-bios-threats |
|
Details | Url | 1 | https://www.ncsc.gov.uk/alerts/alert-dns-hijacking-activity |
|
Details | Url | 1 | https://medium.com/mitre-attack/would-a-detection-by-any-other-name-detect-as-well-part-2-2b2cf9180e21 |
|
Details | Url | 1 | https://www.thedailybeast.com/this-time-its-russias-emails-getting-leaked |
|
Details | Url | 1 | https://securelist.com/greyenergys-overlap-with-zebrocy/89506 |
|
Details | Url | 1 | https://www.youtube.com/watch?v=h8ptjimxsag |
|
Details | Url | 1 | https://citizenlab.ca/2019/01/statement-from-citizen-lab-director-on-attempted-operations-against-researchers |
|
Details | Url | 1 | https://www.rappler.com//newsbreak/investigative/221470-russian-disinformation-system-influences-philippine-social-media |
|
Details | Url | 1 | https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-2018 |
|
Details | Url | 1 | https://assets.bwbx.io/documents/users/iqjwhbfdfxiu/riz2tt7h2.fs/v0 |
|
Details | Url | 1 | https://www.virusbulletin.com/blog/2019/01/threat-intelligence-teams-should-consider-recruiting-journalists |
|
Details | Url | 1 | https://www.dni.gov/index.php/newsroom/congressional-testimonies/item/1947-statement-for-the-record-worldwide-threat-assessment-of-the-us-intelligence-community |
|
Details | Url | 1 | https://blog.eclecticiq.com/on-the-importance-of-standard-operating-procedures-in-threat-intelligence |
|
Details | Url | 1 | https://www.enisa.europa.eu/news/enisa-news/enisa-publishes-training-course-material-on-network-forensics-for-cybersecurity-specialists |
|
Details | Url | 1 | https://www.reuters.com/investigates/special-report/usa-spying-karma |
|
Details | Url | 2 | https://www.reuters.com/investigates/special-report/usa-spying-raven |
|
Details | Url | 1 | https://www.sans.org/cyber-security-summit/archives |
|
Details | Url | 1 | https://www.redcanary.com/blog/five-great-talks-from-the-sans-cti-summit |
|
Details | Url | 1 | https://www.splunk.com/blog/2019/01/17/-datamodel-endpoint.html |
|
Details | Url | 1 | https://dragos.com/blog/industry-news/webinar-summary-uncovering-ics-threat-activity-groups |
|
Details | Url | 1 | https://www.youtube.com/watch?v=23crqckwpti |
|
Details | Url | 1 | https://dale-peterson.com/2019/01/31/post-game-analysis-s4-ics-detection-challenge |
|
Details | Url | 3 | https://dirkjanm.io/abusing-exchange-one-api-call-away-from-domain-admin |
|
Details | Url | 1 | https://www.pscp.tv/w/1bdgyomvybdxx |