mirror of
https://github.com/valitydev/APT_CyberCriminal_Campagin_Collections.git
synced 2024-11-06 16:55:28 +00:00
2019.02.14.Molerats_APT
This commit is contained in:
parent
0ffd37ff1b
commit
e3931f02c0
Binary file not shown.
Binary file not shown.
@ -23,6 +23,7 @@ Please fire issue to me if any lost APT/Malware events/campaigns.
|
||||
* [APTSimulator](https://github.com/NextronSystems/APTSimulator)
|
||||
|
||||
## 2019
|
||||
* Feb 14 - [[360] Suspected Molerats' New Attack in the Middle East](https://ti.360.net/blog/articles/suspected-molerats-new-attack-in-the-middle-east-en/) | [Local](../../blob/master/2019/2019.02.14.Molerats_APT)
|
||||
* Feb 06 - [[Recorded Future] APT10 Targeted Norwegian MSP and US Companies in Sustained Campaign](https://www.recordedfuture.com/apt10-cyberespionage-campaign/) | [Local](../../blob/master/2019/2019.02.06.APT10_Sustained_Campaign)
|
||||
* Feb 05 - [[Anomali Labs] Analyzing Digital Quartermasters in Asia – Do Chinese and Indian APTs Have a Shared Supply Chain?](https://www.anomali.com/blog/analyzing-digital-quartermasters-in-asia-do-chinese-and-indian-apts-have-a-shared-supply-chain) | [Local](../../blob/master/2019/2019.02.05.China_India_APT_shared)
|
||||
* Jan 30 - [[Kaspersky] Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities](https://securelist.com/chafer-used-remexi-malware/89538/) | [Local](../../blob/master/2019/2019.01.30.Chafer_APT_Spy_Iran)
|
||||
|
Loading…
Reference in New Issue
Block a user