mirror of
https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections
synced 2024-06-24 07:49:57 +00:00
2019.07.24.Winnti_German
This commit is contained in:
parent
2759ac91c0
commit
f4c9459c2a
BIN
2019/2019.07.24.Winnti_German/Winnti_ Attacking the Heart of the German Industry.pdf
Normal file
BIN
2019/2019.07.24.Winnti_German/Winnti_ Attacking the Heart of the German Industry.pdf
Normal file
Binary file not shown.
@ -25,6 +25,7 @@ Please fire issue to me if any lost APT/Malware events/campaigns.
|
||||
* [APT_REPORT collected by @blackorbird](https://github.com/blackorbird/APT_REPORT)
|
||||
|
||||
## 2019
|
||||
* Jul 24 - [[] Attacking the Heart of the German Industry](https://web.br.de/interaktiv/winnti/english/) | [Local](../../blob/master/2019/2019.07.24.Winnti_German)
|
||||
* Jul 24 - [[ProofPoint] Chinese APT “Operation LagTime IT” Targets Government Information Technology Agencies in Eastern Asia](https://www.proofpoint.com/us/threat-insight/post/chinese-apt-operation-lagtime-it-targets-government-information-technology) | [Local](../../blob/master/2019/2019.07.24.Operation_LagTime_IT)
|
||||
* Jul 18 - [[FireEye] Hard Pass: Declining APT34’s Invite to Join Their Professional Network](https://www.fireeye.com/blog/threat-research/2019/07/hard-pass-declining-apt34-invite-to-join-their-professional-network.html) | [Local](../../blob/master/2019/2019.07.18.APT34_Hard_Pass)
|
||||
* Jul 18 - [[Trend Micro] Spam Campaign Targets Colombian Entities with Custom-made ‘Proyecto RAT,’ Uses Email Service YOPmail for C&C](https://blog.trendmicro.com/trendlabs-security-intelligence/spam-campaign-targets-colombian-entities-with-custom-proyecto-rat-email-service-yopmail-for-cc/) | [Local](../../blob/master/2019/2019.07.18.Proyecto_RAT_Colombian)
|
||||
|
Loading…
Reference in New Issue
Block a user