mirror of
https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections
synced 2024-06-28 18:01:47 +00:00
merge
This commit is contained in:
parent
beda486ce1
commit
3046c81119
BIN
2021/2021.03.02.HAFNIUM_APT/microsoft.com-HAFNIUM targeting Exchange Servers with 0-day exploits.pdf
BIN
2021/2021.03.02.HAFNIUM_APT/microsoft.com-HAFNIUM targeting Exchange Servers with 0-day exploits.pdf
Binary file not shown.
Binary file not shown.
File diff suppressed because one or more lines are too long
Binary file not shown.
Binary file not shown.
@ -28,11 +28,6 @@ Please fire issue to me if any lost APT/Malware events/campaigns.
|
|||||||
:small_blue_diamond: [vx-underground](https://vx-underground.org/apts.html) <br>
|
:small_blue_diamond: [vx-underground](https://vx-underground.org/apts.html) <br>
|
||||||
|
|
||||||
## 2021
|
## 2021
|
||||||
* Mar XX - [[CSET] Academics, AI, and APTs](https://cset.georgetown.edu/wp-content/uploads/CSET-Academics-AI-and-APTs.pdf)| [:closed_book:](../../blob/master/2021/2021.03.XX.Academics_AI_APTs)
|
|
||||||
* Mar 10 - [[Bitdefender] FIN8 Returns with Improved BADHATCH Toolkit](https://www.bitdefender.com/files/News/CaseStudies/study/394/Bitdefender-PR-Whitepaper-BADHATCH-creat5237-en-EN.pdf) | [:closed_book:](../../blob/master/2021/2021.03.10.FIN8_BADHATCH_Toolkit)
|
|
||||||
* Mar 10 - [[Intezer] New Linux Backdoor RedXOR Likely Operated by Chinese Nation-State Actor](https://www.intezer.com/blog/malware-analysis/new-linux-backdoor-redxor-likely-operated-by-chinese-nation-state-actor/) | [:closed_book:](../../blob/master/2021/2021.03.10.RedXOR)
|
|
||||||
* Mar 02 - [[Volexity] Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day Microsoft Exchange Vulnerabilities](https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/) | [:closed_book:](../../blob/master/2021/2021.03.02.Operation_Exchange_Marauder)
|
|
||||||
* Mar 02 - [[Microsoft] HAFNIUM targeting Exchange Servers with 0-day exploits](https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/) | [:closed_book:](../../blob/master/2021/2021.03.02.HAFNIUM_APT)
|
|
||||||
* Feb 28 - [[Recorded Future] China-linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions](https://www.recordedfuture.com/redecho-targeting-indian-power-sector/) | [:closed_book:](../../blob/master/2021/2021.02.28.RedEcho_APT)
|
* Feb 28 - [[Recorded Future] China-linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions](https://www.recordedfuture.com/redecho-targeting-indian-power-sector/) | [:closed_book:](../../blob/master/2021/2021.02.28.RedEcho_APT)
|
||||||
* Feb 25 - [[Proofpoint] TA413 Leverages New FriarFox Browser Extension to Target the Gmail Accounts of Global Tibetan Organizations](https://www.proofpoint.com/us/blog/threat-insight/ta413-leverages-new-friarfox-browser-extension-target-gmail-accounts-global) | [:closed_book:](../../blob/master/2021/2021.02.25.TA413_FriarFox)
|
* Feb 25 - [[Proofpoint] TA413 Leverages New FriarFox Browser Extension to Target the Gmail Accounts of Global Tibetan Organizations](https://www.proofpoint.com/us/blog/threat-insight/ta413-leverages-new-friarfox-browser-extension-target-gmail-accounts-global) | [:closed_book:](../../blob/master/2021/2021.02.25.TA413_FriarFox)
|
||||||
* Feb 25 - [[Kaspersky] Lazarus targets defense industry with ThreatNeedle](https://securelist.com/lazarus-threatneedle/100803/) | [:closed_book:](../../blob/master/2021/2021.02.25.Lazarus_ThreatNeedle)
|
* Feb 25 - [[Kaspersky] Lazarus targets defense industry with ThreatNeedle](https://securelist.com/lazarus-threatneedle/100803/) | [:closed_book:](../../blob/master/2021/2021.02.25.Lazarus_ThreatNeedle)
|
||||||
|
Loading…
Reference in New Issue
Block a user