mirror of
https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections
synced 2024-06-24 07:49:57 +00:00
2019.06.03.Zebrocy
This commit is contained in:
parent
ed40cb64a4
commit
e7af02988c
BIN
2019/2019.06.03.Zebrocy/Zebrocy Multilanguage Malware Salad.pdf
Normal file
BIN
2019/2019.06.03.Zebrocy/Zebrocy Multilanguage Malware Salad.pdf
Normal file
Binary file not shown.
@ -26,6 +26,7 @@ Please fire issue to me if any lost APT/Malware events/campaigns.
|
||||
|
||||
## 2019
|
||||
* Jun 04 - [[Bitdefender] An APT Blueprint: Gaining New Visibility into Financial Threats](https://www.bitdefender.com/files/News/CaseStudies/study/262/Bitdefender-WhitePaper-An-APT-Blueprint-Gaining-New-Visibility-into-Financial-Threats-interactive.pdf) | [Local](../../blob/master/2019/2019.06.04.APT_Blueprint)
|
||||
* Jun 03 - [[Kaspersky] Zebrocy’s Multilanguage Malware Salad](https://securelist.com/zebrocys-multilanguage-malware-salad/90680/) | [Local](../../blob/master/2019/2019.06.03.Zebrocy)
|
||||
* May 30 - [[CISCO] 10 years of virtual dynamite: A high-level retrospective of ATM malware](https://blog.talosintelligence.com/2019/05/10-years-of-virtual-dynamite.html) | [Local](../../blob/master/2019/2019.05.30.10_Years_ATM_Malware)
|
||||
* May 29 - [[ESET] A dive into Turla PowerShell usage](https://www.welivesecurity.com/2019/05/29/turla-powershell-usage/) | [Local](../../blob/master/2019/2019.05.29.Turla_PowerShell)
|
||||
* May 29 - [[Yoroi] TA505 is Expanding its Operations](https://blog.yoroi.company/research/ta505-is-expanding-its-operations/) | [Local](../../blob/master/2019/2019.05.29.TA505)
|
||||
|
Loading…
Reference in New Issue
Block a user