mirror of
https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections
synced 2024-06-28 18:01:47 +00:00
2021.10.12.MysterySnail
This commit is contained in:
parent
a392cf10a6
commit
a6ee821cd2
BIN
2021/2021.10.12.MysterySnail/MysterySnail attacks with Windows zero-day _ Securelist.pdf
Normal file
BIN
2021/2021.10.12.MysterySnail/MysterySnail attacks with Windows zero-day _ Securelist.pdf
Normal file
Binary file not shown.
@ -28,6 +28,7 @@ Please fire issue to me if any lost APT/Malware events/campaigns.
|
||||
:small_blue_diamond: [vx-underground](https://vx-underground.org/apts.html) <br>
|
||||
|
||||
## 2021
|
||||
* Oct 12 - [[Kaspersky] MysterySnail attacks with Windows zero-day](https://securelist.com/mysterysnail-attacks-with-windows-zero-day/104509/) | [:closed_book:](../../blob/master/2021/2021.10.12.MysterySnail)
|
||||
* Oct 06 - [[Cybereason] Operation GhostShell: Novel RAT Targets Global Aerospace and Telecoms Firms](https://www.cybereason.com/blog/operation-ghostshell-novel-rat-targets-global-aerospace-and-telecoms-firms) | [:closed_book:](../../blob/master/2021/2021.10.06.Operation_GhostShell)
|
||||
* Oct 04 - [[JP-CERT] Malware Gh0stTimes Used by BlackTech](https://blogs.jpcert.or.jp/en/2021/10/gh0sttimes.html) | [:closed_book:](../../blob/master/2021/2021.10.04.Gh0stTimes_BlackTech)
|
||||
* Sep 30 - [[Kaspersky] GhostEmperor: From ProxyLogon to kernel mode](https://securelist.com/ghostemperor-from-proxylogon-to-kernel-mode/104407/) | [:closed_book:](../../blob/master/2021/2021.09.30.GhostEmperor)
|
||||
|
Loading…
Reference in New Issue
Block a user