mirror of
https://github.com/valitydev/APT_CyberCriminal_Campagin_Collections.git
synced 2024-11-06 16:55:28 +00:00
2019.02.06.APT10_Sustained_Campaign
This commit is contained in:
parent
18fd9e2123
commit
394d7b1ccc
1
2019/2019.02.06.APT10_Sustained_Campaign/.python-version
Normal file
1
2019/2019.02.06.APT10_Sustained_Campaign/.python-version
Normal file
@ -0,0 +1 @@
|
||||
2.7.15
|
Binary file not shown.
BIN
2019/2019.02.06.APT10_Sustained_Campaign/cta-2019-0206.pdf
Normal file
BIN
2019/2019.02.06.APT10_Sustained_Campaign/cta-2019-0206.pdf
Normal file
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
@ -23,6 +23,7 @@ Please fire issue to me if any lost APT/Malware events/campaigns.
|
||||
* [APTSimulator](https://github.com/NextronSystems/APTSimulator)
|
||||
|
||||
## 2019
|
||||
* Feb 06 - [[Recorded Future] APT10 Targeted Norwegian MSP and US Companies in Sustained Campaign](https://www.recordedfuture.com/apt10-cyberespionage-campaign/) | [Local](../../blob/master/2019/2019.02.06.APT10_Sustained_Campaign)
|
||||
* Jan 30 - [[Kaspersky] Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities](https://securelist.com/chafer-used-remexi-malware/89538/) | [Local](../../blob/master/2019/2019.01.30.Chafer_APT_Spy_Iran)
|
||||
* Jan 30 - [[NSHC] The Double Life of SectorA05 Nesting in Agora (Operation Kitty Phishing](https://threatrecon.nshc.net/2019/01/30/operation-kitty-phishing) | [Local](../../blob/master/2019/2019.01.30.Operation_Kitty_Phishing)
|
||||
* Jan 30 - [[Morphisec] NEW CAMPAIGN DELIVERS ORCUS RAT](http://blog.morphisec.com/new-campaign-delivering-orcus-rat) | [Local](../../blob/master/2019/2019.01.30.ORCUS_RAT)
|
||||
|
Loading…
Reference in New Issue
Block a user