2020.06.03.Cycldek

This commit is contained in:
CyberMonitor 2020-06-04 12:10:51 +08:00
parent 0284efe051
commit 3148e25b26
28 changed files with 30 additions and 1 deletions

@ -0,0 +1,26 @@
07EE1B99660C8CD5207E128F44AA8CBC
1640EE7A414DFF996AF8265E0947DE36
1B19175C41B9A9881B23B4382CC5935F
1EA07468EBDFD3D9EEC59AC57A490701
2E522CE8104C0693288C997604AE0096
2FB731903BD12FF61E6F778FDF9926EE
3CA7BD71B30007FC30717290BB437152
4A21F9B508DB19398AEE7FE4AE0AC380
4B785345161D288D1652C1B2D5CEADA1
58FE8DB0F7AE505346F6E4687D0AE233
600E14E4B0035C6F0C6A344D87B6C27F
6BE1362D722BA4224979DE91A2CD6242
6D2E6A61EEDE06FA9D633CE151208831
6EA33305B5F0F703F569B9EBD6035BFD
7789055B0836A905D9AA68B1D4A50F09
782FF651F34C87448E4503B5444B6164
809196A64CA4A32860D28760267A1A8B
81660985276CF9B6D979753B6E581D34
88CDD3CE6E5BAA49DC69DA664EDEE5C1
A02E2796E0BE9D84EE0D4B205673EC20
A44804C2767DCCD4902AAE30C36E62C0
A4AD564F8FE80E2EE52E643E449C487D
A6C751D945CFE84C918E88DF04D85798
A9BCF983FE868A275F8D9D8F5DEFACF5
C73B000313DCD2289F51B367F744DCD8
D8DB9D6585D558BA2D28C33C6FC61874

@ -27,8 +27,11 @@ Please fire issue to me if any lost APT/Malware events/campaigns.
:small_blue_diamond: [APT_Digital_Weapon](https://github.com/RedDrip7/APT_Digital_Weapon) <br>
## 2020
* Jun 03 - [[Kaspersky] Cycldek: Bridging the (air) gap](https://securelist.com/cycldek-bridging-the-air-gap/97157/) | [:closed_book:](../../blob/master/2020/2020.06.03.Cycldek)
* May 29 - [[IronNet] Russian Cyber Attack Campaigns and Actors](https://ironnet.com/blog/russian-cyber-attack-campaigns-and-actors/) | [:closed_book:](../../blob/master/2020/2020.05.29_russian-cyber-attack-campaigns-and-actors)
* May 28 - [[Kaspersky] The zero-day exploits of Operation WizardOpium](https://securelist.com/the-zero-day-exploits-of-operation-wizardopium/97086/) | [:closed_book:](../../blob/master/2020/2020.05.28_Operation_WizardOpium)
* May 26 - [[ESET] From Agent.BTZ to ComRAT v4: A tenyear journey](https://www.welivesecurity.com/2020/05/26/agentbtz-comratv4-ten-year-journey/) | [:closed_book:](../../blob/master/2020/2020.05.26_From_Agent.BTZ_to_ComRAT)
* May 21 -[[Intezer] The Evolution of APT15s Codebase 2020](https://www.intezer.com/blog/research/the-evolution-of-apt15s-codebase-2020/) | [:closed_book:](../../blob/master/2020/2020.05.21.APT15_Codebase_2020)
* May 21 - [[Intezer] The Evolution of APT15s Codebase 2020](https://www.intezer.com/blog/research/the-evolution-of-apt15s-codebase-2020/) | [:closed_book:](../../blob/master/2020/2020.05.21.APT15_Codebase_2020)
* May 21 - [[Bitdefender] Iranian Chafer APT Targeted Air Transportation and Government in Kuwait and Saudi Arabia](https://www.bitdefender.com/files/News/CaseStudies/study/332/Bitdefender-Whitepaper-Chafer-creat4491-en-EN-interactive.pdf) | [:closed_book:](../../blob/master/2020/2020.05.21.Iranian_Chafer_APT)
* May 21 - [[ESET] No “Game over” for the Winnti Group](https://www.welivesecurity.com/2020/05/21/no-game-over-winnti-group/) | [:closed_book:](../../blob/master/2020/2020.05.21.No_Game_Over_Winnti)
* May 19 - [[Symantec] Sophisticated Espionage Group Turns Attention to Telecom Providers in South Asia](https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/greenbug-espionage-telco-south-asia) | [:closed_book:](../../blob/master/2020/2020.05.19.Greenbug_South_Asia)