mirror of
https://github.com/valitydev/APT_CyberCriminal_Campagin_Collections.git
synced 2024-11-06 16:55:28 +00:00
2019.05.07.ATMitch
This commit is contained in:
parent
d4a2b07b76
commit
26324de5b0
Binary file not shown.
2
2019/2019.05.07.ATMitch/hash.txt
Normal file
2
2019/2019.05.07.ATMitch/hash.txt
Normal file
@ -0,0 +1,2 @@
|
||||
bf9c35d8f33e2651d619fe22a2d55372dedd0855451d32f952ecfc73fa824092
|
||||
e372631f96face11e803e812d9a77a25d0a81fa41e4ac362dc8aee5c8a021000
|
Binary file not shown.
Binary file not shown.
@ -25,6 +25,7 @@ Please fire issue to me if any lost APT/Malware events/campaigns.
|
||||
* [APT_REPORT collected by @blackorbird](https://github.com/blackorbird/APT_REPORT)
|
||||
|
||||
## 2019
|
||||
* May 07 - [[Yoroi] ATMitch: New Evidence Spotted In The Wild](https://blog.yoroi.company/research/atmitch-new-evidence-spotted-in-the-wild/) | [Local](../../blob/master/2019/2019.05.07.ATMitch)
|
||||
* May 07 - [[ESET] Turla LightNeuron: An email too far](https://www.welivesecurity.com/wp-content/uploads/2019/05/ESET-LightNeuron.pdf) | [Local](../../blob/master/2019/2019.05.07.Turla_LightNeuron)
|
||||
* May 07 - [[Symantec] Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak](https://www.symantec.com/blogs/threat-intelligence/buckeye-windows-zero-day-exploit) | [Local](../../blob/master/2019/2019.05.07.Buckeye)
|
||||
* Apr 23 - [[Kaspersky] Operation ShadowHammer: a high-profile supply chain attack](https://securelist.com/operation-shadowhammer-a-high-profile-supply-chain-attack/90380/) | [Local](../../blob/master/2019/2019.04.23.Operation_ShadowHammer)
|
||||
|
Loading…
Reference in New Issue
Block a user