2019.05.07.ATMitch

This commit is contained in:
CyberMonitor 2019-05-08 13:00:50 +08:00
parent d4a2b07b76
commit 26324de5b0
5 changed files with 3 additions and 0 deletions

View File

@ -0,0 +1,2 @@
bf9c35d8f33e2651d619fe22a2d55372dedd0855451d32f952ecfc73fa824092
e372631f96face11e803e812d9a77a25d0a81fa41e4ac362dc8aee5c8a021000

View File

@ -25,6 +25,7 @@ Please fire issue to me if any lost APT/Malware events/campaigns.
* [APT_REPORT collected by @blackorbird](https://github.com/blackorbird/APT_REPORT)
## 2019
* May 07 - [[Yoroi] ATMitch: New Evidence Spotted In The Wild](https://blog.yoroi.company/research/atmitch-new-evidence-spotted-in-the-wild/) | [Local](../../blob/master/2019/2019.05.07.ATMitch)
* May 07 - [[ESET] Turla LightNeuron: An email too far](https://www.welivesecurity.com/wp-content/uploads/2019/05/ESET-LightNeuron.pdf) | [Local](../../blob/master/2019/2019.05.07.Turla_LightNeuron)
* May 07 - [[Symantec] Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak](https://www.symantec.com/blogs/threat-intelligence/buckeye-windows-zero-day-exploit) | [Local](../../blob/master/2019/2019.05.07.Buckeye)
* Apr 23 - [[Kaspersky] Operation ShadowHammer: a high-profile supply chain attack](https://securelist.com/operation-shadowhammer-a-high-profile-supply-chain-attack/90380/) | [Local](../../blob/master/2019/2019.04.23.Operation_ShadowHammer)