2021.01.25.APT16_Elmer_backdoor

This commit is contained in:
cybermonitor 2022-06-02 17:26:58 +08:00
parent 83051c4a64
commit 701a1a1579
2 changed files with 1 additions and 0 deletions

View File

@ -168,6 +168,7 @@ Please fire issue to me if any lost APT/Malware events/campaigns.
* Feb 01 - [[ESET] Operation NightScout: Supplychain attack targets online gaming in Asia](https://www.welivesecurity.com/2021/02/01/operation-nightscout-supply-chain-attack-online-gaming-asia/) | [:closed_book:](../../blob/master/2021/2021.02.01.Operation_NightScout)
* Jan 31 - [[JPCERT] A41APT case ~ Analysis of the Stealth APT Campaign Threatening Japan](http://jsac.jpcert.or.jp/archive/2021/pdf/JSAC2021_202_niwa-yanagishita_en.pdf) | [:closed_book:](../../blob/master/2021/2021.01.31.A41APT)
* Jan 28 - [[ClearSky] “Lebanese Cedar” APT: Global Lebanese Espionage Campaign Leveraging Web Servers](https://www.clearskysec.com/wp-content/uploads/2021/01/Lebanese-Cedar-APT.pdf) | [:closed_book:](../../blob/master/2021/2021.01.28.Lebanese_Cedar_APT)
* Jan 25 - [[cybergeeks] A DETAILED ANALYSIS OF ELMER BACKDOOR USED BY APT16](https://cybergeeks.tech/a-detailed-analysis-of-elmer-backdoor-used-by-apt16/) | [:closed_book:](../../blob/master/2021/2021.01.25.APT16_Elmer_backdoor)
* Jan 20 - [[JPCERT] Commonly Known Tools Used by Lazarus](https://blogs.jpcert.or.jp/en/2021/01/Lazarus_tools.html) | [:closed_book:](../../blob/master/2021/2021.01.20.Commonly_Known_Tools_Lazarus)
* Jan 20 - [[Cybie] A Deep Dive Into Patchwork APT Group](https://cybleinc.com/2021/01/20/a-deep-dive-into-patchwork-apt-group/) | [:closed_book:](../../blob/master/2021/2021.01.20.Deep_Dive_Patchwork)
* Jan 14 - [[Positive] Higaisa or Winnti? APT41 backdoors, old and new](https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/higaisa-or-winnti-apt-41-backdoors-old-and-new/) | [:closed_book:](../../blob/master/2021/2021.01.14.Higaisa_or_Winnti_APT41)