mirror of
https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections
synced 2024-06-24 07:49:57 +00:00
2019.09.05.UPSynergy
This commit is contained in:
parent
7e9d39e4ff
commit
7823d70742
Binary file not shown.
BIN
2019/2019.09.05.UPSynergy/samples/0b28433a2b7993da65e95a45c2adf7bc37edbd2a8db717b85666d6c88140698a.zip
Normal file
BIN
2019/2019.09.05.UPSynergy/samples/0b28433a2b7993da65e95a45c2adf7bc37edbd2a8db717b85666d6c88140698a.zip
Normal file
Binary file not shown.
@ -26,6 +26,7 @@ Please fire issue to me if any lost APT/Malware events/campaigns.
|
||||
|
||||
## 2019
|
||||
* Aug 31 - [[CyberThreatIntel] Malware analysis on Bitter APT campaign](https://github.com/StrangerealIntel/CyberThreatIntel/blob/master/offshore%20APT%20organization/Bitter/27-08-19/Malware%20analysis%2031-08-19.md) | [:closed_book:](../../blob/master/2019/2019.08.31.Bitter_APT_Malware_analysis)
|
||||
* Aug 29 - [[Trend Micro] ‘Heatstroke’ Campaign Uses Multistage Phishing Attack to Steal PayPal and Credit Card Information](https://blog.trendmicro.com/trendlabs-security-intelligence/heatstroke-campaign-uses-multistage-phishing-attack-to-steal-paypal-and-credit-card-information/) | [:closed_book:](../../blob/master/2019/2019.08.29.SectorJ04_2019)
|
||||
* Aug 29 - [[IBM] More_eggs, Anyone? Threat Actor ITG08 Strikes Again](https://securityintelligence.com/posts/more_eggs-anyone-threat-actor-itg08-strikes-again/) | [:closed_book:](../../blob/master/2019/2019.08.29.FIN6_ITG08)
|
||||
* Aug 29 - [[NSHC] SectorJ04 Group’s Increased Activity in 2019](https://threatrecon.nshc.net/2019/08/29/sectorj04-groups-increased-activity-in-2019/) | [:closed_book:](../../blob/master/2019/2019.08.29.SectorJ04_2019)
|
||||
* Aug 27 - [[Dell] LYCEUM Takes Center Stage in Middle East Campaign](https://www.secureworks.com/blog/lyceum-takes-center-stage-in-middle-east-campaign) | [:closed_book:](../../blob/master/2019/2019.08.27.LYCEUM_threat_group)
|
||||
|
Loading…
Reference in New Issue
Block a user