2019.02.14.Molerats_APT

This commit is contained in:
CyberMonitor 2019-02-15 15:35:59 +08:00
parent 0ffd37ff1b
commit e3931f02c0
3 changed files with 1 additions and 0 deletions

View File

@ -23,6 +23,7 @@ Please fire issue to me if any lost APT/Malware events/campaigns.
* [APTSimulator](https://github.com/NextronSystems/APTSimulator)
## 2019
* Feb 14 - [[360] Suspected Molerats' New Attack in the Middle East](https://ti.360.net/blog/articles/suspected-molerats-new-attack-in-the-middle-east-en/) | [Local](../../blob/master/2019/2019.02.14.Molerats_APT)
* Feb 06 - [[Recorded Future] APT10 Targeted Norwegian MSP and US Companies in Sustained Campaign](https://www.recordedfuture.com/apt10-cyberespionage-campaign/) | [Local](../../blob/master/2019/2019.02.06.APT10_Sustained_Campaign)
* Feb 05 - [[Anomali Labs] Analyzing Digital Quartermasters in Asia Do Chinese and Indian APTs Have a Shared Supply Chain?](https://www.anomali.com/blog/analyzing-digital-quartermasters-in-asia-do-chinese-and-indian-apts-have-a-shared-supply-chain) | [Local](../../blob/master/2019/2019.02.05.China_India_APT_shared)
* Jan 30 - [[Kaspersky] Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities](https://securelist.com/chafer-used-remexi-malware/89538/) | [Local](../../blob/master/2019/2019.01.30.Chafer_APT_Spy_Iran)