Auto-Update index.csv

This commit is contained in:
CyberMonitor 2024-01-16 03:57:14 +00:00 committed by github-actions[bot]
parent b7ba7dd6bb
commit 7025bd90c6

@ -1535,5 +1535,6 @@ Published,SHA-1,Filename,Download URL
2023-01-09,3efdf94296306b558b39d4b2bfab93cb944a0013,INTRINSEC - Emotet returns and deploys loaders,https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.01.09.Emotet_return/INTRINSEC%20-%20Emotet%20returns%20and%20deploys%20loaders.pdf
2023-01-11,4d3fa4294df4b901a26c2f9bdbcae7c3be9f244a,Dark Pink APT unleashes malware for deeper and more sinister intrusions in the Asia-Pacific and Europe _ Group-IB Blog,https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.01.11.Dark_Pink_APT/Dark%20Pink%20APT%20unleashes%20malware%20for%20deeper%20and%20more%20sinister%20intrusions%20in%20the%20Asia-Pacific%20and%20Europe%20_%20Group-IB%20Blog.pdf
2023-01-26,adc02a61be87eeccc1ea3e3c6a5db73e3946f258,Welcome to Goot Camp_ Tracking the Evolution of GOOTLOADER Operations _ Mandiant,https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.01.26.GOOTLOADER_Operations/Welcome%20to%20Goot%20Camp_%20Tracking%20the%20Evolution%20of%20GOOTLOADER%20Operations%20_%20Mandiant.pdf
2023-12-21,95f848ff414c5e2288448815427b9f0019449ab9,Intellexa and Cytrox_ From fixer-upper to Intel Agency-grade spyware,https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.12.21.Intellexa_Cytrox/Intellexa%20and%20Cytrox_%20From%20fixer-upper%20to%20Intel%20Agency-grade%20spyware.pdf
2023-12-27,f9ebf0bee52c3bcf2193f1ab477359918b00da03,Operation Triangulation_ The last (hardware) mystery _ Securelist,https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.12.27.Operation_Triangulation/Operation%20Triangulation_%20The%20last%20%28hardware%29%20mystery%20_%20Securelist.pdf
2024-01-10,e71c1c4cd3ade02e4291bb9547aa9efbd4ce1a92,Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN _ Volexity,https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2024/2024.01.10.Active_Exploitation_UTA0178/Active%20Exploitation%20of%20Two%20Zero-Day%20Vulnerabilities%20in%20Ivanti%20Connect%20Secure%20VPN%20_%20Volexity.pdf

1 Published SHA-1 Filename Download URL
1535 2023-01-09 3efdf94296306b558b39d4b2bfab93cb944a0013 INTRINSEC - Emotet returns and deploys loaders https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.01.09.Emotet_return/INTRINSEC%20-%20Emotet%20returns%20and%20deploys%20loaders.pdf
1536 2023-01-11 4d3fa4294df4b901a26c2f9bdbcae7c3be9f244a Dark Pink APT unleashes malware for deeper and more sinister intrusions in the Asia-Pacific and Europe _ Group-IB Blog https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.01.11.Dark_Pink_APT/Dark%20Pink%20APT%20unleashes%20malware%20for%20deeper%20and%20more%20sinister%20intrusions%20in%20the%20Asia-Pacific%20and%20Europe%20_%20Group-IB%20Blog.pdf
1537 2023-01-26 adc02a61be87eeccc1ea3e3c6a5db73e3946f258 Welcome to Goot Camp_ Tracking the Evolution of GOOTLOADER Operations _ Mandiant https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.01.26.GOOTLOADER_Operations/Welcome%20to%20Goot%20Camp_%20Tracking%20the%20Evolution%20of%20GOOTLOADER%20Operations%20_%20Mandiant.pdf
1538 2023-12-21 95f848ff414c5e2288448815427b9f0019449ab9 Intellexa and Cytrox_ From fixer-upper to Intel Agency-grade spyware https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.12.21.Intellexa_Cytrox/Intellexa%20and%20Cytrox_%20From%20fixer-upper%20to%20Intel%20Agency-grade%20spyware.pdf
1539 2023-12-27 f9ebf0bee52c3bcf2193f1ab477359918b00da03 Operation Triangulation_ The last (hardware) mystery _ Securelist https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.12.27.Operation_Triangulation/Operation%20Triangulation_%20The%20last%20%28hardware%29%20mystery%20_%20Securelist.pdf
1540 2024-01-10 e71c1c4cd3ade02e4291bb9547aa9efbd4ce1a92 Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN _ Volexity https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2024/2024.01.10.Active_Exploitation_UTA0178/Active%20Exploitation%20of%20Two%20Zero-Day%20Vulnerabilities%20in%20Ivanti%20Connect%20Secure%20VPN%20_%20Volexity.pdf