APT_CyberCriminal_Campagin_.../index.csv

424 KiB
Executable File
Raw Permalink Blame History

1PublishedSHA-1FilenameDownload URL
20001-01-01725568c41fa9f1d7e8a2226e71e5b2a39fd08121C5_APT_ADecadeInReviewhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2011/2011.06.APT/C5_APT_ADecadeInReview.pdf
30001-01-01940615997789ceefea673c8a248829338c6ed7b0crowdstrike-deep-panda-reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.00.00.Deep.Panda/crowdstrike-deep-panda-report.pdf
42008-08-102fbd7813367fad45e7fd1922381a05e27b0e9673CYBERWAR-fd_2_https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2008/2008.08.10.Russian_Cyberwar_on_Georgia/CYBERWAR-fd_2_.pdf
52008-10-023e6399a4b608bbd99dd81bd2be4cd49731362b5eCyberwarhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2008/2008.10.02.China_Cyber_Warfare/Cyberwar.pdf
62008-11-0421ff0c24d2c1f9fc3ffbd7c5f12d0ba62674954ea492659https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2008/2008.11.04.China_Electornic_Long_Range_Reconnaissance/a492659.pdf
72008-11-043cb34c41fbc409d992dcab6a1655076494ffcf58chinas-electronichttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2008/2008.CHINA_CHINA_CYBER_WARFARE/chinas-electronic.pdf
82008-11-195d9541526e38d6ff91775c82f5e98090064d6fc9army-bans-usb-dhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2008/2008.11.19.UNDER_WORM_ASSAULT/army-bans-usb-d.pdf
92009-01-18b0f5f77865f24c5064f78ed7cd30bbdf2c111945Ashmore - Impact of Alleged Russian Cyber Attacks https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2009/2009.01.18.Russian_Cyber_Attacks/Ashmore%20-%20Impact%20of%20Alleged%20Russian%20Cyber%20Attacks%20.pdf
102009-03-2928dd92f598e7d8987d8236767856c70be4f7e85fghostnethttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2009/2009.03.29.GhostNet/ghostnet.pdf
112009-06-18f56db4d90d6d5aa8f3bf52b1239cdbe41d6a4268DECLAWING THE DRAGONhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/historical/2009/DECLAWING%20THE%20DRAGON.pdf
122009-10-1953094d0eb6013f0ec9691444d1b2bdd80e9b718dCyber-030https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2009/2009.10.19.Capability_China_Cyber_Warfare/Cyber-030.pdf
132010-01-12751384456df3630063f0b2a0a39868d468092f65Operation Aurorahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2010/2010.01.12.Operation_Aurora/Operation%20Aurora.pdf
142010-01-139a7a1d3f7719c02dced8633ac0bf43d6e9ec7a1bAurora_Botnet_Command_Structurehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2010/2010.01.13.Aurora_Botnet/Aurora_Botnet_Command_Structure.pdf
152010-01-2052123660be8b8cad9d46244f669f2cfd96101750Combating Threats - Operation Aurorahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2010/2010.01.20.Combating_Aurora/Combating%20Threats%20-%20Operation%20Aurora.pdf
162010-01-261001e5c45200e0f138e9e9d508afc31c475d6ce7how_can_u_tell_Aurorahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2010/2010.01.26.Operation_Aurora_IoC/how_can_u_tell_Aurora.pdf
172010-01-273494bd514034f0658ec66b2f515cd9a60c51a8e7Aurora_HBGARY_DRAFThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2010/2010.01.27.Operation_Aurora_Detect_Diagnose_Respond/Aurora_HBGARY_DRAFT.pdf
182010-02-104d9c8ecae38f217729cf8a9df934e7cc5de2ae1aWhitePaper HBGary Threat Report, Operation Aurorahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2010/2010.02.10.Threat_Report_Operation_Aurora/WhitePaper%20HBGary%20Threat%20Report%2C%20Operation%20Aurora.pdf
192010-03-146eb3094ecab54a8b80932f4bec263696f849ca77in-depth_analysis_of_hydraq_final_231538https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2010/2010.03.14.Hydraq/in-depth_analysis_of_hydraq_final_231538.pdf
202010-04-068a982bc5c8303440faa4d5672a38bb7a613c382bshadows-in-the-cloudhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2010/2010.04.06.Shadows_in_the_cloud/shadows-in-the-cloud.pdf
212010-09-03c7d0387067ba747e3a3d9b43b7349d7888bf574eMSUpdaterTrojanWhitepaperhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2010/2010.09.03.MSUpdater.Trojan/MSUpdaterTrojanWhitepaper.pdf
222010-09-21510f1b2342f3ca3dd24179821eb451488d6e9722Case_Study_Operation_Aurora_V11https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2010/2010.01.Case_Study_Operation_Aurora/Case_Study_Operation_Aurora_V11.pdf
232010-09-3093c9ad9c9d9e1d882d56d8ceb1aa684d147d0a78w32_stuxnet_dossierhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2010/2010.09.30.W32.Stuxnet_Dossier/w32_stuxnet_dossier.pdf
242010-12-0987f9c1bed271cc832c0fed2ddcde55e72f9801ddR41524https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2010/2010.12.09.Stuxnet_Worm/R41524.pdf
252011-02-10e0fce95ccdb9c400f2dd3859ebe268f5bc7877cewp-global-energy-cyberattacks-night-dragonhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2011/2011.02.10.Night_Dragon/wp-global-energy-cyberattacks-night-dragon.pdf
262011-02-181fe534fe68fe1a93ef2b536f1365219653b560eeAlerts DL-2011 Alerts-A-2011-02-18-01 Night Dragon Attachment 1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2011/2011.02.18.Night_Dragon.Specific/Alerts%20DL-2011%20Alerts-A-2011-02-18-01%20Night%20Dragon%20Attachment%201.pdf
272011-04-13c35971b70eec914e14691b17b531aedc1f142217CyberEspionagehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/historical/2011/CyberEspionage.pdf
282011-04-204c1b1b0da537c482d359bf75435cb8abb1df7093Stuxnet_Under_the_Microscopehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2011/2011.04.20.Stuxnet/Stuxnet_Under_the_Microscope.pdf
292011-06-23db15d399006eb4b59465463484b85071881a89f6vol7no2Ballhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/historical/2011/vol7no2Ball.pdf
302011-08-02254132938c6ff6eeaa5e3b1e8d8d506472c028b7shady_rat_vanityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2011/2011.08.02.Operation_Shady_RAT_Vanity/shady_rat_vanity.pdf
312011-08-031461452398e57d541209eb6bc29e0743369b373bHTran_and_the_Advanced_Persistent_Threathttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2011/2011.08.03.HTran/HTran_and_the_Advanced_Persistent_Threat.pdf
322011-08-04deb92a55dffa951697d3367750df2cf8e4480f8fwp-operation-shady-rathttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2011/2011.08.04.Operation_Shady_RAT/wp-operation-shady-rat.pdf
332011-09-0983564e2939b4f62a4ff82c435adba86699cfc753FTA1001-The_RSA_Hackhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2011/2011.09.09.RSA_Hack/FTA1001-The_RSA_Hack.pdf
342011-09-112b98220caf158d1c4f6d72abbc379899e35edc4dC5_APT_SKHackhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2011/2011.09.11.SK_Hack/C5_APT_SKHack.pdf
352011-09-2223f1f9e5771be71725fa19487da59f6779f5ee3fwp_dissecting-lurid-apthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2011/2011.09.22.LURID_Downloader/wp_dissecting-lurid-apt.pdf
362011-10-032be5fe12ee54448d9e5dfa943ebcfcf44a115181enter-the-cyberdragonhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/historical/2011/enter-the-cyberdragon.pdf
372011-10-12fd81d98729029a483e0c5c69d908ab96014edbe5tb_advanced_persistent_threatshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2011/2011.10.12.1.php.group/tb_advanced_persistent_threats.pdf
382011-10-26c59b324139b965677a9933f7435b5ac34ca40126Duqu_Trojan_Questions_and_Answershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2011/2011.10.26.Duqu/Duqu_Trojan_Questions_and_Answers.pdf
392011-10-26f4231f388207b578c46b126e14d5ed4f9b405424Evolution_Drivers_Duqu_Stuxnethttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2011/2011.10.26.Duqu/Evolution_Drivers_Duqu_Stuxnet.pdf
402011-10-31f26ddf5c622dd52fc46cd46813c9552a08214587the_nitro_attackshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2011/2011.10.31.Nitro/the_nitro_attacks.pdf
412011-11-1502e2959da1d4522c2d94ffbc7a1871470b2f7912Faces_Ghost_RAThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2011/2011.11.15.Many_Faces_Gh0st_Rat/Faces_Ghost_RAT.pdf
422011-12-08b0ac3fce955bb8361b98a791919d639b18877d56Palebot_Palestinian_credentialshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2011/2011.12.08.Palebot_Trojan/Palebot_Palestinian_credentials.pdf
432012-01-03a486fb5b0b485796f0b2d1248c948e7c64c6b49awp_the-heartbeat-apt-campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.01.03.HeartBeat_APT/wp_the-heartbeat-apt-campaign.pdf
442012-02-03f8b1d371008a2108bb7ded054b7b0b7cdc4d5295C5_APT_C2InTheFifthDomainhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.02.03.Fifth_Domain_CnC/C5_APT_C2InTheFifthDomain.pdf
452012-02-29771d703ce533bea8dbece799705ce8e61717a8a5The_Sin_Digoo_Affairhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.02.29.Sin_Digoo_Affair/The_Sin_Digoo_Affair.pdf
462012-03-1275c240fb4334b2307b56c336284acad112e40063Crouching_tiger_hidden_dragonhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.03.12.Crouching_Tiger/Crouching_tiger_hidden_dragon.pdf
472012-03-1350511389957f7c2e0127031d8633724ae05354f3Crypto-DarkComet-Reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.03.13.DarkComet_RAT/Crypto-DarkComet-Report.pdf
482012-03-26bdb218fdc0cce0bc57f77a9a1e6d3cc7e81b55f9wp_luckycat_reduxhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.03.26.Luckycat_Redux/wp_luckycat_redux.pdf
492012-04-105dba7529dfdcd435578dad0c219da02da54b28a0Know Your Digital Enemyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.04.10.Gh0st_RAT/Know%20Your%20Digital%20Enemy.pdf
502012-04-160b792ff94ca71eeb71aba780286f7c4bf9f75b40OSX_SabPubhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.04.16.OSX.SabPub/OSX_SabPub.pdf
512012-05-180120f4f065c62bcd218bbc21bc729bd3645adf14w32_flamer_newsforyouhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.05.18.Flamer_CnC/w32_flamer_newsforyou.pdf
522012-05-22c00b7449b733f070c148c5b6c0a4df087a3f34f1wp_ixeshehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.05.22.IXESHE/wp_ixeshe.pdf
532012-05-316e4df95a65ad848c8192c7c76ed35d622764cab3skywiperhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.05.31.Flame_sKyWIper/skywiper.pdf
542012-07-1061c047476369c5069e39f3d06825d847d924d216Tibet_Lurkhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.07.10.SE_LURK_Malware/Tibet_Lurk.pdf
552012-07-11983e09b7e903852529a53e7973fa8b91ac818ec2dark-comet-syrian-spy-toolhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.07.11.DarkComet_Creator/dark-comet-syrian-spy-tool.pdf
562012-07-256d0de3e44a012f45a7b56a9862d1d67ef8bfd7e8From-Bahrain-With-Love-FinFishers-Spy-Kit-Exposedhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.07.25.FinFisher_Spy_Kit/From-Bahrain-With-Love-FinFishers-Spy-Kit-Exposed.pdf
572012-07-2751b16ee4bb04d663a4c67e23e3d3bf816ae12207The_Madi_Infostealershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.07.27.Madi_Campaign/The_Madi_Infostealers.pdf
582012-08-094c9c37199b1e1da37d0dae56f7a6469e0b0a4c6ekaspersky-lab-gausshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.08.09.Gauss/kaspersky-lab-gauss.pdf
592012-08-185fc09310938d289541ffe01a218ae644abe2495dwp_the_taidoor_campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.08.18.Taidoor_Campaign/wp_the_taidoor_campaign.pdf
602012-08-192ca545418f9fefe1c4dd96feeeff256adbb97e6fByeBye Shell and the targeting of Pakistanhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.08.19.ByeBye_Shell/ByeBye%20Shell%20and%20the%20targeting%20of%20Pakistan.pdf
612012-09-06ce7a662c0f822536e6beff4856f701d28137c8e1the-elderwood-projecthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.09.06.Elderwood/the-elderwood-project.pdf
622012-09-07bd6f3f93d3c87e78149d766b2613ed9e18bc2620IEXPL0RE_RAThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.09.07.IEXPLORE_RAT/IEXPL0RE_RAT.pdf
632012-09-12759e45d0b495ec23949b3324fd543df7e450afdcVOHO_WP_FINAL_READY-FOR-Publication-09242012_AChttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.09.12.VOHO_Campaign/VOHO_WP_FINAL_READY-FOR-Publication-09242012_AC.pdf
642012-09-18cfd4451a15223fdf667285b12a8829a4b409495aThe_Mirage_Campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.09.18.Mirage_Campaign/The_Mirage_Campaign.pdf
652012-10-08203258819d7fbffdfae2c5df96d71254a2816ca6PEST-CONTROLhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.10.08.Pest_Control/PEST-CONTROL.pdf
662012-10-27c32627e18128fbf249a084272310996d1b794bb5trojan_taidoor-targeting_think_tankshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.10.27.Taidoor/trojan_taidoor-targeting_think_tanks.pdf
672012-10-31340b8d20ea5489bf3cfbe390dacc01237f11034bCyber_Espionage_Against_Georgian_Governmenthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.10.31.CYBER_ESPIONAGE_Georbot_Botnet/Cyber_Espionage_Against_Georgian_Government.pdf
682012-11-014477f8bb9e82fa99d4c0f1d57720f5856b8ee9f8FTA 1007 - Shamoonhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.11.01.RECOVERING_FROM_SHAMOON/FTA%201007%20-%20Shamoon.pdf
692012-11-03299a326641766c588a04f990927f795ecc31726fCyberattack_against_Israeli_and_Palestinian_targetshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.11.03.Israeli_and_Palestinian_Attack/Cyberattack_against_Israeli_and_Palestinian_targets.pdf
702012-11-135276375276d632b9a43037ef9a99221b81cb1a61fireeye-poison-ivy-reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2012/2012.11.13.Poison_Ivy/fireeye-poison-ivy-report.pdf
712012-11-13e802d6f06085f22242a66b06c785315e1c63c070WickedRose_andNCPHhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2006/2006.Wicked_Rose/WickedRose_andNCPH.pdf
722013-01-027ddab1f54ef0ba0a48efdb7ca39ddcc82f0a84d6fireeye-malware-supply-chainhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.01.02.SUPPLY_CHAIN_ANALYSIS/fireeye-malware-supply-chain.pdf
732013-01-1410c2d6c60b4a34422a12c7583624c4764b815ba6securelist.com-Red October Detailed Malware Description 3 Second Stage of Attackhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.01.14.Red_October_Campaign/securelist.com-Red%20October%20Detailed%20Malware%20Description%203%20Second%20Stage%20of%20Attack.pdf
742013-01-1489cfdc989240721e191029bc3636aabaddaa84b8securelist.com-Red October Detailed Malware Description 1 First Stage of Attackhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.01.14.Red_October_Campaign/securelist.com-Red%20October%20Detailed%20Malware%20Description%201%20First%20Stage%20of%20Attack.pdf
752013-01-149fd39a98ef48a12695acf4bc6e1c595055c471ebsecurelist.com-Red October Detailed Malware Description 5 Second Stage of Attackhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.01.14.Red_October_Campaign/securelist.com-Red%20October%20Detailed%20Malware%20Description%205%20Second%20Stage%20of%20Attack.pdf
762013-01-14b64a571a29d1c2cfc40b6b6cef50a95e6ce3b455Securelist_RedOctoberhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.01.14.Red_October_Campaign/Securelist_RedOctober.pdf
772013-01-14c38d19048cb7d66480d4e12c61fc0c3c8ebbc78dsecurelist.com-Red October Detailed Malware Description 4 Second Stage of Attackhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.01.14.Red_October_Campaign/securelist.com-Red%20October%20Detailed%20Malware%20Description%204%20Second%20Stage%20of%20Attack.pdf
782013-01-14caaf84ec5a1f8b12a1d849660e25bf304baec135securelist.com-Red October Diplomatic Cyber Attacks Investigationhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.01.14.Red_October_Campaign/securelist.com-Red%20October%20Diplomatic%20Cyber%20Attacks%20Investigation.pdf
792013-01-14e2b327a479a7e3c4fa7a3a34782bf7bca51f597dsecurelist.com-Red October Detailed Malware Description 2 Second Stage of Attackhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.01.14.Red_October_Campaign/securelist.com-Red%20October%20Detailed%20Malware%20Description%202%20Second%20Stage%20of%20Attack.pdf
802013-01-14f9e75ac3b51ec2dd195a2fd82743530f9534dd40Securelist_RedOctober_Detailhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.01.14.Red_October_Campaign/Securelist_RedOctober_Detail.pdf
812013-01-18b6217ea7fe6b4dd5e27b2a1b4b84432db2e1b2f3McAfee_Labs_Threat_Advisory_Exploit_Operation_Red_Octhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.01.18.Operation_Red_Oct/McAfee_Labs_Threat_Advisory_Exploit_Operation_Red_Oct.pdf
822013-02-12100df21fed6fcf08b0982cfdf55463608613a2e2Presentation_Targeted-Attacks_ENhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.02.12.Targeted-Attacks/Presentation_Targeted-Attacks_EN.pdf
832013-02-183974687624eb85cdcf1fc9ccfb68eea052971e84Mandiant_APT1_Reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.02.18.APT1/Mandiant_APT1_Report.pdf
842013-02-22349984643361273d5d3b638e369c45cbb409676ccomment_crew_indicators_of_compromisehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.02.22.Comment_Crew/comment_crew_indicators_of_compromise.pdf
852013-02-26712311f4cacd476100c7ef037e3accc740558920stuxnet_0_5_the_missing_linkhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.02.26.Stuxnet_0.5/stuxnet_0_5_the_missing_link.pdf
862013-02-272d3fb67fd870f192c38bd8e51344d45645794623miniduke_indicators_publichttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.02.27.MiniDuke_Indicators/miniduke_indicators_public.pdf
872013-02-27c6dff7f0864e36e3dcc1be12747d26fb8072b52cthemysteryofthepdf0-dayassemblermicrobackdoorhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.02.27.MiniDuke_Mystery/themysteryofthepdf0-dayassemblermicrobackdoor.pdf
882013-03-13e33abbd24c9cbb57b3b4a97df165766e1fb42eeb15-2013-youonlyclicktwicehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.03.13.FinFisher/15-2013-youonlyclicktwice.pdf
892013-03-17334b4ee90a30c9ab9dcc6e3596f15f0dcb02486dSafe-a-targeted-threathttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.03.17.Targeted_Threat/Safe-a-targeted-threat.pdf
902013-03-2057a17587785f54a103ea970277bd7c4cc179a82ctheteamspystory_final_t2https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.03.20.TeamSpy_Crew/theteamspystory_final_t2.pdf
912013-03-20c6ce890a544b01e5dafd4add9326b4178424c4e2dissecting-operation-troyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.03.20.Operation_Troy/dissecting-operation-troy.pdf
922013-03-21c0d85dfff9ce55913cea8ed1d04b0a7e17336636FTA 1008 - Darkseoul-Jokra Analysis and Recoveryhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.03.21.Darkseoul/FTA%201008%20-%20Darkseoul-Jokra%20Analysis%20and%20Recovery.pdf
932013-03-2726353a7703ce0b186450134a5321ac37d1405380RAP002_APT1_Technical_backstage.1.0https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.03.27.APT1_technical_backstage/RAP002_APT1_Technical_backstage.1.0.pdf
942013-03-28875abf02dad2a434d708e495ffc8afe4b2500aaetr-12-circl-plugx-analysis-v1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.03.28.TR-12_PlugX_malware/tr-12-circl-plugx-analysis-v1.pdf
952013-04-0185ef5daf99603da833a32245fd120028829a666fTrojan.APT.BaneChanthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.04.01.APT_BaneChant/Trojan.APT.BaneChant.pdf
962013-04-075ff5d49650b4fa5988f435f60434744a7bcaee48fireeye-wwc-reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.04.07_WORLD_WAR_C/fireeye-wwc-report.pdf
972013-04-07ba88d1caa77dba3b80228a524cdd60a872d0d06bfireeye-wwc-report_enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.04.07_WORLD_WAR_C/fireeye-wwc-report_en.pdf
982013-04-133a34d6152f2d287f58e67a03d96408b74d5c470ewinnti-more-than-just-a-game-130410https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.04.13.Winnti/winnti-more-than-just-a-game-130410.pdf
992013-04-21d88b186085918e2039514caa21a4017aafc556d1MiniDuke_Paper_Finalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.04.21.MiniDuke/MiniDuke_Paper_Final.pdf
1002013-05-16ac49429483d9005f38f5202b77e8bf79c524e22bwelivesecurity.com-Targeted information stealing attacks in South Asia use email signed binarieshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.05.16.targeted-threat-pakistan-india/welivesecurity.com-Targeted%20information%20stealing%20attacks%20in%20South%20Asia%20use%20email%20signed%20binaries.pdf
1012013-05-20aae01ca44ca11f33692bcfd9a20e36105ddfa2b9NS-Unveiling-an-Indian-Cyberattack-Infrastructure_FINAL_Webhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.05.20.Operation_Hangover/NS-Unveiling-an-Indian-Cyberattack-Infrastructure_FINAL_Web.pdf
1022013-05-20dd9dacb6b9bc34a2410f9c8fb3a5f04fdce77f29circl-analysisreport-miniduke-stage3-publichttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.05.20.Miniduke.Analysis/circl-analysisreport-miniduke-stage3-public.pdf
1032013-05-20e2631efe178d16691329f27a853a41a48387bfc4Norman_HangOver report_Executive Summary_042513https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.05.20.Operation_Hangover/Norman_HangOver%20report_Executive%20Summary_042513.pdf
1042013-05-20e380c69559eec4bdcef286fd56ebf86f35d640d1Unveiling_an_Indian_Cyberattack_Infrastructurehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.05.20.Operation_Hangover/Unveiling_an_Indian_Cyberattack_Infrastructure.pdf
1052013-05-20ffdfed40c5b1e08a6469c2f38e6a51347a37dd1bUnveiling an Indian Cyberattack Infrastructure - appendixeshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.05.20.Operation_Hangover/Unveiling%20an%20Indian%20Cyberattack%20Infrastructure%20-%20appendixes.pdf
1062013-06-0131d750b3565b65c43533a87bf7aa72c41258f9a02013-9https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.06.01.cyber_conflict_Oil_Gas/2013-9.pdf
1072013-06-044fd06d33aa1a087709277eb71d204e2fbf8b9243kaspersky-the-net-traveler-part1-finalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.06.04.NetTraveller/kaspersky-the-net-traveler-part1-final.pdf
1082013-06-079a2de0730e62aa24cdff1d1920b9535d1795be7eKeyBoy_Vietnam_Indiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.06.07.KeyBoy_APT/KeyBoy_Vietnam_India.pdf
1092013-06-18c6e80e76bca03538a2dfd2aac2e4120fdab6f4fcTrojan.APT.Seinuphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.06.18.APT_Seinup/Trojan.APT.Seinup.pdf
1102013-06-21283e853a69cddd4b59b35fcc2a75205b1deb9b6919-2013-acalltoharmhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.06.21.Syrian_Attack/19-2013-acalltoharm.pdf
1112013-06-28214daebe12ae36a91e13c83e820bb2e20b560828fta-1009---njrat-uncovered-1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.06.28.njRAT_Uncovered/fta-1009---njrat-uncovered-1.pdf
1122013-06-28d4c015f0cc390e3c632face2a66323cd7c4b3afeDark_Seoul_Cyberattackhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.00.00.Dark_Seoul_Cyber_Attack/Dark_Seoul_Cyberattack.pdf
1132013-07-0111b8d957363188bd334bd88b1f5630abc263523bkashifali.ca-Targeted Campaign Steals Credentials in Gulf States and Caribbeanhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.07.01.Gulf_States_APT/kashifali.ca-Targeted%20Campaign%20Steals%20Credentials%20in%20Gulf%20States%20and%20Caribbean.pdf
1142013-07-159a7978041e795b788d86c52a477160dae296413bPlugx_Smoalerhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.07.15.PlugX_Smoaler/Plugx_Smoaler.pdf
1152013-07-2514a7756b3080f5f71723cd1f49392f71f5cef4f1energy-at-riskhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.00.00.Energy_at_Risk/energy-at-risk.pdf
1162013-07-3105f1beceab73155d552a5ee919aebc4c8e92c609US-13-Yarochkin-In-Depth-Analysis-of-Escalated-APT-Attacks-Slideshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.07.31.Hunting_the_Shadows/US-13-Yarochkin-In-Depth-Analysis-of-Escalated-APT-Attacks-Slides.pdf
1172013-07-3186061f7d1994ebb7b8b7eb640b041fb1342adac5Secrets_of_the_Comfoo_Mastershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.07.31.ecrets_of_the_Comfoo_Masters/Secrets_of_the_Comfoo_Masters.pdf
1182013-08-02665c6ace0a9175735f6cdb656e79287f5a53e072India_Pak_Tranchulashttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.08.02.Smoke_Fire_South_Asian_Cyber_Espionage/India_Pak_Tranchulas.pdf
1192013-08-026b624d6d80b412a10260344f244ed93e3718e003Surtr_Malware_Tibetanhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.08.02.Surtr_Targeting_Tibetan/Surtr_Malware_Tibetan.pdf
1202013-08-06886b0ab831a5084de7d80355b7578a9a9999fc88Inside_Report_by_Infosec_Consortiumhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.00.00.APT_Attacks_on_Indian_Cyber_Space/Inside_Report_by_Infosec_Consortium.pdf
1212013-08-194b6cc1420b5d641564c9895882a5ba97d18137beByeBye_Shell_targethttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.08.19.ByeBye_Shell/ByeBye_Shell_target.pdf
1222013-08-210f1f4905addf483d71c42d0e59bd97f762559b80PIVY-Appendixhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.08.21.POISON_IVY/PIVY-Appendix.pdf
1232013-08-211b76c3788fd81d1f5acacb1cfb429e08cad98e1crpt-poison-ivyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.08.21.POISON_IVY/rpt-poison-ivy.pdf
1242013-08-239b5acf068da8b4a28ff995eaf542d798b58eabeffireeye.com-Operation Molerats Middle East Cyber Attacks Using Poison Ivyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.08.23.Operation_Molerats/fireeye.com-Operation%20Molerats%20Middle%20East%20Cyber%20Attacks%20Using%20Poison%20Ivy.pdf
1252013-09-0652d49ad4a638382c49d28dce427c5723ebd8abd3evasive-tactics-taidoor-3https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.09.06.EvasiveTactics_Taidoor/evasive-tactics-taidoor-3.pdf
1262013-09-1164f98d4c515e31f68c6e7fdf442753a6af8c0beeKimsukyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.09.11.Kimsuky_Operation/Kimsuky.pdf
1272013-09-17e4aa40ce1a865021e0b178a4c444126743335d32hidden_lynxhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.09.17.Hidden_Lynx/hidden_lynx.pdf
1282013-09-19f69e4d23674d06ee459d2abbecc5f3f4cbd580472q-report-on-targeted-attack-campaignshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.09.19.EvilGrab/2q-report-on-targeted-attack-campaigns.pdf
1292013-09-2121a5b79498a242f6869649cb808d02366dba6e89Operation_DeputyDoghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.09.21.Operation_DeputyDog/Operation_DeputyDog.pdf
1302013-09-25751d00dab0fac4c2b0d1c140e9897fb99a399be1icefoghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.09.25.ICEFROG_APT/icefog.pdf
1312013-10-24a899d6713da1b9da8aa77cb3db5360b4e8574b5cwp-fakem-rathttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.10.24.FakeM_RAT/wp-fakem-rat.pdf
1322013-10-259a4dcfa7178cccc6283a92bc768be1374eb347f9FireEye-Terminator_RAThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.10.25.Terminator_RAT/FireEye-Terminator_RAT.pdf
1332013-11-101bf6c5eaaf996f463b25837c15b400c895862419Operation_EphemeralHydrahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.11.10.Operation_Ephemeral_Hydra/Operation_EphemeralHydra.pdf
1342013-11-148a3a657ac02569c1324ade4cca562ae8c5781f94fireeye-china-chopper-reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.00.00.China_Chopper_Web_Shell/fireeye-china-chopper-report.pdf
1352013-12-02a8f9bc957ae0ee7e38a2cefb83afff0b1bd68422FTA 1010 - njRAT The Saga Continueshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.12.02.njRAT_Saga_Continues/FTA%201010%20-%20njRAT%20The%20Saga%20Continues.pdf
1362013-12-11902c5b2eb9cb486171b24ca60681aea5eecdb270NormanShark-MaudiOperationhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.06.00.Maudi_Surveillance_Operation/NormanShark-MaudiOperation.pdf
1372013-12-12b670b7a7904baded891a4c6e7afe692998989668fireeye-operation-ke3changhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.12.12.Operation_Ke3chang/fireeye-operation-ke3chang.pdf
1382013-12-20dc92b79b353eb0e47e71216f3fa1f0c6167e29e7ETSO_APT_Attacks_Analysishttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.12.20.ETSO/ETSO_APT_Attacks_Analysis.pdf
1392014-01-06c2858ffd02ad542ed014c93de03d1dda17a65ca9airbus-cyber-security.com-PlugX some uncovered pointshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.01.06.PlugX/airbus-cyber-security.com-PlugX%20some%20uncovered%20points.pdf
1402014-01-138421ef67d1e6dcc277f07f39f86e21fd89cf1d5atargeted_attacks_against_the_energy_sectorhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.01.13.Targeted_Attacks_Energy_Sector/targeted_attacks_against_the_energy_sector.pdf
1412014-01-143cf67c051ba29f706367860714b2c7ce56889ea6securelist.com-The Icefog APT Hits US Targets With Java Backdoorhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.01.14.Icefog_APT/securelist.com-The%20Icefog%20APT%20Hits%20US%20Targets%20With%20Java%20Backdoor.pdf
1422014-01-159767abff87b137695ab8481729ed7130499a0c80FTA 1001 FINAL 1.15.14https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.01.15.Sneakernet_Trojan/FTA%201001%20FINAL%201.15.14.pdf
1432014-01-21ec6771a81e830f50c2d54b26dc0f6a642439ee09h12756-wp-shell-crewhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.01.21.Shell_Crew/h12756-wp-shell-crew.pdf
1442014-01-31036b1154d4cc2de08dc647eb743c6b4c9d860902FTA 1011 Follow UPhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.01.31.Sneakernet_Trojan/FTA%201011%20Follow%20UP.pdf
1452014-02-111e4c8aef818d7d0e950974b6c9d2a792969e3a94unveilingthemask_v1.0https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.02.11_Careto_APT/unveilingthemask_v1.0.pdf
1462014-02-13114583db8690cd01c60d5758dbe2e2dc1e96fb25Operation_SnowManhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.02.13_Operation_SnowMan/Operation_SnowMan.pdf
1472014-02-19186d7913fe80c35a06e76a5c8fd08520f43b4246XtremeRAT_fireeyehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.02.19.XtremeRAT/XtremeRAT_fireeye.pdf
1482014-02-199b66a35bea35d963d1ff07cab2a3914b38e24257The_Monju_Incidenthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.02.19.Monju_Incident/The_Monju_Incident.pdf
1492014-02-204b2a0cb6ff2c622a8b31608757008a9a225cf796Mo' Shells Mo' Problems - Network Detection »https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.02.20.deep-panda-webshells/Mo%27%20Shells%20Mo%27%20Problems%20-%20Network%20Detection%20%C2%BB.pdf
1502014-02-2076a6ea858e3524682ad3ee30251003228db50fb3deep-panda-webshellshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.02.20.deep-panda-webshells/deep-panda-webshells.pdf
1512014-02-207bd2229f4908ae1cd6b4e19c21d709948c3616edMo' Shells Mo' Problems - Web Server Log Analysis »https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.02.20.deep-panda-webshells/Mo%27%20Shells%20Mo%27%20Problems%20-%20Web%20Server%20Log%20Analysis%20%C2%BB.pdf
1522014-02-20c7afca26feabcb0374cbbe2cee010696212d4f85Mo' Shells Mo' Problems - File List Stacking »https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.02.20.deep-panda-webshells/Mo%27%20Shells%20Mo%27%20Problems%20-%20File%20List%20Stacking%20%C2%BB.pdf
1532014-02-20e162b0015a753a6d85a13296e601c31271868b1fOperation_GreedyWonkhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.02.20.Operation_GreedyWonk/Operation_GreedyWonk.pdf
1542014-02-23d31648d83d04cc22669f21fa92ee48345e76e062FTA 1012 STTEAM Finalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.02.23.Operation_STTEAM/FTA%201012%20STTEAM%20Final.pdf
1552014-02-256337243d45dc72d75d01f74a699b6a240cbbc8f3french-connection-french-aerospace-focused-cve-2014-0322-attack-shares-similarities-2012https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.02.25.The_French_Connection/french-connection-french-aerospace-focused-cve-2014-0322-attack-shares-similarities-2012.pdf
1562014-02-28917691a4f8af50a09926f97bf1be2e0cb71f8c68GData_Uroburos_RedPaper_EN_v1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.02.28.Uroburos/GData_Uroburos_RedPaper_EN_v1.pdf
1572014-03-061e1f0c599eb1c22360cb9bf8bc30399050e3764bThe_Siesta_Campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.03.06.The_Siesta_Campaign/The_Siesta_Campaign.pdf
1582014-03-070849ce1f0272c4604d47e464ab56cad0b5b60263snake_whitepaperhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.03.07.Snake_Campaign/snake_whitepaper.pdf
1592014-03-0894d04c5da4ed33cd78d033ad371aa8472e53d701Reuters_Turlahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.03.08.Russian_spyware_Turla/Reuters_Turla.pdf
1602014-03-12ca792ed076f91a730d524c06b9224ee0c47908c0a-detailed-examination-of-the-siesta-campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.03.12.Detailed_Siesta_Campaign/a-detailed-examination-of-the-siesta-campaign.pdf
1612014-04-26829bf301061a9a6358c233ca5aa459439fc0aec8Op_Clandestine_Foxhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.04.26.Operation_Clandestine_Fox/Op_Clandestine_Fox.pdf
1622014-05-1341c3f02fe289ddb0d0c5a010f5865b58da939b1cfireeye-operation-saffron-rosehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.05.13.Operation_Saffron_Rose/fireeye-operation-saffron-rose.pdf
1632014-05-13e743ba5074212801ce09ee640730028ab8f41d48CrowdStrike_Flying_Kittenhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.05.13.Flying.Kitten/CrowdStrike_Flying_Kitten.pdf
1642014-05-2091c2cdb099060388dd93b0e440a3ff4dff5fd622Miniduke_twitterhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.05.20.Miniduke_Twitter_CnC/Miniduke_twitter.pdf
1652014-05-21b1e45b08bfa1db986e1e643291d250a0cda1988cFTA_1013_RAT_in_a_jarhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.05.21.Unrecom_Rat/FTA_1013_RAT_in_a_jar.pdf
1662014-05-2821b1c09cef5d6e3b56b8ffe97b7717075914ea4dnewscaster-iranian-threat-inside-social-mediahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.05.28.NewsCaster_An_Iranian_Threat_Within_Social_Networks/newscaster-iranian-threat-inside-social-media.pdf
1672014-05-28385401637a142e78aec0978f29971c6d35e74e97file-2581720763-pdfhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.05.28.NewsCaster_An_Iranian_Threat_Within_Social_Networks/file-2581720763-pdf.pdf
1682014-05-287dc9b7bbe8ba2d0ca2579d6ca1a60d84c1773a07Iranian Hackers Targeted US Officials in Elaborate Social Media Attack Operation _ SecurityWeekhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.05.28.NewsCaster_An_Iranian_Threat_Within_Social_Networks/Iranian%20Hackers%20Targeted%20US%20Officials%20in%20Elaborate%20Social%20Media%20Attack%20Operation%20_%20SecurityWeek.pdf
1692014-06-0651bb16ba51be3c144ac9e09a68732cbe0bb785d5ASERT-Threat-Intelligence-Brief-2014-07-Illuminating-Etumbot-APThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.06.06.Etumbot_APT_Backdoor/ASERT-Threat-Intelligence-Brief-2014-07-Illuminating-Etumbot-APT.pdf
1702014-06-09ddadffb91053c4d19590e2035c8eeed14fceca60putter-pandahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.06.09.Putter_Panda/putter-panda.pdf
1712014-06-20292359e869860f8308c2cf789986fe7c12502553Compromise_Greece_Beijinghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.06.20.Embassy_of_Greece_Beijing/Compromise_Greece_Beijing.pdf
1722014-06-301856b8232153c3cc879662288b34b4a660586a9aDragonfly_Threat_Against_Western_Energy_Suppliershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.06.30.Dragonfly/Dragonfly_Threat_Against_Western_Energy_Suppliers.pdf
1732014-07-071d53861aafea11d9a60e798b90d623c8e7c7b9e7AdversaryIntelligenceReport_DeepPanda_0https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.07.07.Deep_in_Thought/AdversaryIntelligenceReport_DeepPanda_0.pdf
1742014-07-07f9e86e04d2b5c8a28ec4e69ec9f8ea15c46892adDeep in Thought_ Chinese Targeting of National Security Think Tanks »https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.07.07.Deep_in_Thought/Deep%20in%20Thought_%20Chinese%20Targeting%20of%20National%20Security%20Think%20Tanks%20%C2%BB.pdf
1752014-07-107f3e46c42095721ba79b1a47e26e662eb7492057circl-tr25-analysis-turla-pfinet-snake-uroburoshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.07.10.Turla_Pfinet_Snake_Uroburos/circl-tr25-analysis-turla-pfinet-snake-uroburos.pdf
1762014-07-10bd1794d152f04add2aef937826a9cf949c4b25abTrapX_ZOMBIE_Report_Finalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.07.10.Zombie_Zero/TrapX_ZOMBIE_Report_Final.pdf
1772014-07-115526b79c5b9c4b25689cd3dcb8799a510d7e668eThe-Eye-of-the-Tiger2https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.07.11.Pitty_Tiger/The-Eye-of-the-Tiger2.pdf
1782014-07-11d5a6d2366c4973f06e95bb1201747d0175321952Pitty_Tiger_Final_Reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.07.11.Pitty_Tiger/Pitty_Tiger_Final_Report.pdf
1792014-07-20591cef00735f510079e0fe4bd0067ca0150fd004Sayad_Flying_Kitten_analysishttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.07.20.Flying_Kitten/Sayad_Flying_Kitten_analysis.pdf
1802014-07-2945dd6ce01a6507712481dd428663f5fad1753466group-3279-targets-the-video-game-industryhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.07.29.Threat_Group-3279_Targets_the_Video_Game_Industry/group-3279-targets-the-video-game-industry.pdf
1812014-07-31142d4447504e30012d98fea16831f2363c62c5caEB-YetiJuly2014-Publichttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.07.31.Energetic_Bear/EB-YetiJuly2014-Public.pdf
1822014-07-31a53ce340535461cc92e274f7c5bfb0d8653d5087Kaspersky_Lab_crouching_yeti_appendixes_eng_finalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.07.31.Energetic_Bear/Kaspersky_Lab_crouching_yeti_appendixes_eng_final.pdf
1832014-08-040e5301e830d7b19600b2d110115d7c0f0ab86b02fireeye-sidewinder-targeted-attackhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.08.04.Sidewinder_GoldenAge/fireeye-sidewinder-targeted-attack.pdf
1842014-08-052a38d54d1d345d079325d3180c5f0eb8f5d60f8aThreatConnect_Operation_Arachnophobia_Reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.08.05.Operation_Arachnophobia/ThreatConnect_Operation_Arachnophobia_Report.pdf
1852014-08-0673f54d632b5616db3a5977c1514640e19279c056Operation_Poisoned_Hurricanehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.08.06.Operation_Poisoned_Hurricane/Operation_Poisoned_Hurricane.pdf
1862014-08-0763e36939c3f90c4ca9d492b03cf04d9f03a4ec2fKL_Epic_Turla_Technical_Appendix_20140806https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.08.07.Epic_Turla_Operation_Appendix/KL_Epic_Turla_Technical_Appendix_20140806.pdf
1872014-08-07cecdff97a0dc514f5075029538a42f1cb4036210The_Epic_Turla_Operationhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.08.07.Epic_Turla_Operation_Appendix/The_Epic_Turla_Operation.pdf
1882014-08-125f17e7b886d2388ffc134157dd1b66aa65372b59NYTimes_Attackers_Evolve_Quicklyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.08.12.New_York_Times_Attackers/NYTimes_Attackers_Evolve_Quickly.pdf
1892014-08-1334c2b718869354a588ee602f41be77e553346c5dsec14-paper-blondhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.08.13.TargetAttack.NGO/sec14-paper-blond.pdf
1902014-08-13bd899a1e63cdbe03e2e42e4b3f8c91f426a1e2cdrpt-operation-saffron-rosehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.00.00.OPERATION_SAFFRON_ROSE/rpt-operation-saffron-rose.pdf
1912014-08-13fe2f8d32688a104ca4e6ba595f647dfa479ece44Targeted_Attacks_Lense_NGOhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.08.13.TargetAttack.NGO/Targeted_Attacks_Lense_NGO.pdf
1922014-08-16194656e774aaacb86ae2c48f0c894e82ec68a833HPSR SecurityBriefing_Episode16_NorthKoreahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.08.16.North_Korea_cyber_threat_landscape/HPSR%20SecurityBriefing_Episode16_NorthKorea.pdf
1932014-08-185ceee60079796aa518c5e490feaca4a0d78c031bKL_report_syrian_malwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.08.18.Syrian_Malware_House_of_Cards/KL_report_syrian_malware.pdf
1942014-08-18c37138f865175952f8b96ea057aa1c9a2cb207ccThe Syrian Malware House of Cards - Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.08.18.Syrian_Malware_House_of_Cards/The%20Syrian%20Malware%20House%20of%20Cards%20-%20Securelist.pdf
1952014-08-202bf418f3786cd274b9031a2297313f044054bdfdEl_Machetehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.08.20.El_Machete/El_Machete.pdf
1962014-08-2581af95b9c1e39a49440ea901f059dd19bbac158cblog.malwaremustdie.org-Another country-sponsored malware Vietnam APT Campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.08.25.Vietnam_APT/blog.malwaremustdie.org-Another%20country-sponsored%20malware%20Vietnam%20APT%20Campaign.pdf
1972014-08-27c264921f168c1cf344cd493d10aeebf92f80fb0cNetTraveler_Makeover_10th_Birthdayhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.08.27.NetTraveler/NetTraveler_Makeover_10th_Birthday.pdf
1982014-08-2828c56a1e795cd404308274424d10edcc3e9b4339Alienvault_Scanboxhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.08.28.Scanbox_Framework_Watering_Hole_Attack/Alienvault_Scanbox.pdf
1992014-08-29543e0df8b308a9383f86d4314d93b5a2e718bd42Syrian_Malware_Team_BlackWormhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.08.29.BlackWorm_Syrian/Syrian_Malware_Team_BlackWorm.pdf
2002014-08-30eda271027851f85761cc18cfc766b99e298a28d8rpt-china-chopperhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2013/2013.00.00.China_Chopper_Web_Shell/rpt-china-chopper.pdf
2012014-09-03c24ba893644a149a1f05432c392a716251dca72fDarwin_fav_APT_Grouphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.09.03.Darwin_APT/Darwin_fav_APT_Group.pdf
2022014-09-04850ce69b276f4726de382eabcffa8cb8d68cecfcChinese_MITM_Googlehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.09.04.Analysis_of_Chinese_MITM_on_Google/Chinese_MITM_Google.pdf
2032014-09-04b4c64e64f6309c0f424cdf0cdf449576f36cee16XSLCmd_OSXhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.09.04.XSLCmd_OSX/XSLCmd_OSX.pdf
2042014-09-04d78156c4a19f70d219ed76526769d4d5f141a4edGholee_Protective_Edge_themed_spear_phishing_campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.09.04.Gholee/Gholee_Protective_Edge_themed_spear_phishing_campaign.pdf
2052014-09-082cfbb7b89a5e220b21bbf64161dc880c1b644017sec14-paper-marczakhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.09.08.When_Governments_Hack_Opponents/sec14-paper-marczak.pdf
2062014-09-087aa450d7e2b43175590a1ee2c94f5342152cfc56sec14-paper-hardyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.09.08.Targeted_Threat_Index/sec14-paper-hardy.pdf
2072014-09-10bf937bb2315901541521f00abce8d441d272da16fireeye-operation-quantum-entanglementhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.09.10.Operation_Quantum_Entanglement/fireeye-operation-quantum-entanglement.pdf
2082014-09-1701805ba02d4a62aaa891260cf3f7f5f3704935e7SASC_Cyberreport_091714https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.09.17.Chinese_APT_defense_contractors/SASC_Cyberreport_091714.pdf
2092014-09-171f89e8ba75a9e4d5d957fadc71074bfe1d53b2a9armed-services.senate.gov-Press Release Press United States Commitee on Armed Serviceshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.09.17.Chinese_APT_defense_contractors/armed-services.senate.gov-Press%20Release%20%20Press%20%20United%20States%20Commitee%20on%20Armed%20Services.pdf
2102014-09-18f726486a5cc1e42d2030b07d56f87983814226c7cosmicduke_whitepaperhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.09.18.COSMICDUKE/cosmicduke_whitepaper.pdf
2112014-09-197fc85f6c70527da8b2c4e6a32e1d4e18c007fcb6th3bug_Watering_Hole_PoisonIvyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.09.19.th3bug_Poison_Ivy/th3bug_Watering_Hole_PoisonIvy.pdf
2122014-09-2683adcb352168b2d345155cf4ec7bbc876bb89849Aided_Frame_Aided_Directionhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.09.26.Aided_Frame_Aided_Direction/Aided_Frame_Aided_Direction.pdf
2132014-09-26efd7b3a3a2bf6e3976411347dc9101fea70c9405blackenergy_whitepaperhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.09.26.BlackEnergy_Quedagh/blackenergy_whitepaper.pdf
2142014-10-03bc4cef4cabbcf83dbc1c72f736acb6207b260216PAN_Nitrohttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.10.03.Nitro_APT/PAN_Nitro.pdf
2152014-10-099439561abc998b7f0f733142bc44f717b2615374Democracy_HongKong_Under_Attackhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.10.09.Democracy_Hong_Kong_Under_Attack/Democracy_HongKong_Under_Attack.pdf
2162014-10-1420dd2aaae24812d78cd1c5e32c68b7998e00e0caGroup_72https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.10.14.Group_72/Group_72.pdf
2172014-10-145c4415913a16a0331600816bb4cf8a1954e743ddHikit_Analysis-Finalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.10.14.Hikit_Preliminary_Analysis/Hikit_Analysis-Final.pdf
2182014-10-14cccc6053fa78cef9f8a28efdaa07c8cfa6a73cc2Sandworm_briefing2https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.10.14.Sandworm/Sandworm_briefing2.pdf
2192014-10-14d246e3075bbd31f04b2a6efb53ad7d9e9faa0e96Derusbi_Server_Analysis-Finalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.10.14.Derusbi_Analysis/Derusbi_Server_Analysis-Final.pdf
2202014-10-14d24ff42b2d02ba406d46f3912f1f7bd2d38b6113ZoxPNG_Full_Analysis-Finalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.10.14.ZoxPNG/ZoxPNG_Full_Analysis-Final.pdf
2212014-10-2013a055fe7be7e55dcce0035eaf1990fbe8406c98OrcaRAThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.10.20.OrcaRAT_tale/OrcaRAT.pdf
2222014-10-224ff4b93665664603623bc7001e3ca961b8b78b9fwp-operation-pawn-stormhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.10.22.Operation_Pawn_Storm/wp-operation-pawn-storm.pdf
2232014-10-22643c7e975121b4614156fc4f29de09b4fd1f0026tactical-intelligence-bulletin---sofacy-phishing-https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.10.22.Sofacy_Phishing/tactical-intelligence-bulletin---sofacy-phishing-.pdf
2242014-10-23c0708a3efcf32d02cfb5348f87fe140ae6f470e8Modified_Binaries_Torhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.10.23.Modified_Binaries/Modified_Binaries_Tor.pdf
2252014-10-23ffac1bcec0a990cdf9e995766efd19b473e4785aleviathansecurity.com-The Case of the Modified Binarieshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.10.23.Modified_Binaries/leviathansecurity.com-The%20Case%20of%20the%20Modified%20Binaries.pdf
2262014-10-244bd6fa0c0a85f9041cecd54d722decdb4e817fe0LeoUncia_OrcaRathttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.10.24.LeoUncia_and_OrcaRat/LeoUncia_OrcaRat.pdf
2272014-10-2720fa586304cbbfaf23453c1bbe7033de398bd9fbMicro-Targeted-Malvertising-WP-10-27-14-1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.10.27.Micro-Targeted_Malvertising/Micro-Targeted-Malvertising-WP-10-27-14-1.pdf
2282014-10-2750b165c213697facb2410591c3ddf772b95fc805ICS_Havex_backdoorshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.10.27.Havex_Trojans/ICS_Havex_backdoors.pdf
2292014-10-27c264d97adeb81f59b0642de9a782f6fe545ed062pwc_ScanBox_frameworkhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.10.27.ScanBox_framework/pwc_ScanBox_framework.pdf
2302014-10-28116309e7121bc8b0e66e4166c06f7b818e1d3629Group72_Opening_ZxShellhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.10.28.Group_72_ZxShell/Group72_Opening_ZxShell.pdf
2312014-10-281d9b39654f8c7678b3e2c30e378b2e14021b5d44apt28https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.10.28.APT28/apt28.pdf
2322014-10-3023f0de5e628eccdfc670412485653f3662ab5594sophos-rotten-tomato-campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.10.30.Rotten_Tomato_Campaign/sophos-rotten-tomato-campaign.pdf
2332014-10-3185fcdce7427c13906658f1835acaef7103c22ad3GDATA_TooHash_CaseStudy_102014_EN_v1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.10.31.Operation_TooHash/GDATA_TooHash_CaseStudy_102014_EN_v1.pdf
2342014-11-0315daf73d022246964c2938a889361aba40e7d08bBlackEnergy2_Plugins_Routerhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.11.03.BlackEnergy2_APT/BlackEnergy2_Plugins_Router.pdf
2352014-11-0340674e70c595d30f19b2c2636ed7d9dc6b146e8eOperation_Poisoned_Handoverhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.11.03.Operation_Poisoned_Handover/Operation_Poisoned_Handover.pdf
2362014-11-10abddcfeac71a991c480810c82d7e972c74251329darkhotelappendixindicators_klhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.11.10.Darkhotel/darkhotelappendixindicators_kl.pdf
2372014-11-10dc84757c3d42d2a384b2022e50addce8eb1dd0dfdarkhotelappendixindicators_kl_1.1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.11.10.Darkhotel/darkhotelappendixindicators_kl_1.1.pdf
2382014-11-10dfd64e9a601283c76ae3f28875166695dc354a21darkhotel_kl_07.11https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.11.10.Darkhotel/darkhotel_kl_07.11.pdf
2392014-11-1196173322b936132aa4cdc0328e4a247d40ae5152The_Uroburos_casehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.11.11.ComRAT/The_Uroburos_case.pdf
2402014-11-12b336dd349c5b4620f04d98b90282c7ae900a3a42Korplug_Afghanistan_Tajikistanhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.11.12.Korplug/Korplug_Afghanistan_Tajikistan.pdf
2412014-11-13a4520f8f85d13aa469ff3e1b6d333e4c9a290e7aOperation_CloudyOmega_Ichitarohttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.11.13.Operation_CloudyOmega/Operation_CloudyOmega_Ichitaro.pdf
2422014-11-149d116269da44e22cc6f1496570bb4d56f7cc277broaming_tiger_zeronights_2014https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.11.14.Roaming_Tiger/roaming_tiger_zeronights_2014.pdf
2432014-11-14c50a95070633ecc76898b9f16ded848414747156OnionDuke_Torhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.11.14.OnionDuke/OnionDuke_Tor.pdf
2442014-11-20814556f1a03e93364f4dc54555cb27549288e061EvilBunny_Suspect4_v1.0https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.11.20.EvilBunny/EvilBunny_Suspect4_v1.0.pdf
2452014-11-21e8fcb14805853185b36093119094085f0f7f86a2OperationDoubleTaphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.11.21.Operation_Double_Tap/OperationDoubleTap.pdf
2462014-11-2402be2ef6587e940656cde835354d0073c4dce232DEEP_PANDA_Sakulahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.11.24.Ironman/DEEP_PANDA_Sakula.pdf
2472014-11-2440f76477ba1f453b341743b53113ebd705c1bb75regin-analysishttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.11.24.Regin_Top-tier_espionage/regin-analysis.pdf
2482014-11-2450be553c398b512ddd9741a0ab0350dccd600a3bRegin_The_Intercepthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.11.24.Regin_TheIntercept/Regin_The_Intercept.pdf
2492014-11-245bbf6a633076473dc4b2afb6d166c8caa84463e4Kaspersky_Lab_whitepaper_Regin_platform_enghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.11.24.Regin_Platform/Kaspersky_Lab_whitepaper_Regin_platform_eng.pdf
2502014-11-246f37ce8764f92cb554d200a8cebfd5da1b8a4119ironman-deep-panda-uses-sakula-malware-target-organizations-multiple-sectorshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.11.24.Ironman/ironman-deep-panda-uses-sakula-malware-target-organizations-multiple-sectors.pdf
2512014-11-30e5e09d247f5d25d7c960a3ef3231cef9d59a2b61rpt-fin4https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.11.30.FIN4/rpt-fin4.pdf
2522014-12-02eab03ae476c002161e00411d136b311a6b434745Cylance_Operation_Cleaver_Reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.12.02.Operation_Cleaver/Cylance_Operation_Cleaver_Report.pdf
2532014-12-05741f2f131cf70bb62cd9ba3a4a298b12a5a74877blogs.blackberry.com-Operation Cleaver The Notepad Fileshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.12.05.Operation_Cleaver/blogs.blackberry.com-Operation%20Cleaver%20The%20Notepad%20Files.pdf
2542014-12-08dc20be49cbcecaf38bde2105a54580eb96605c25Turla_2_Penquinhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.12.08.Penquin_Turla/Turla_2_Penquin.pdf
2552014-12-09975c44773b456562f9ab5f9986c2102a21b618bdbcs_wp_InceptionReport_EN_v12914https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.12.09_The_Inception_Framework/bcs_wp_InceptionReport_EN_v12914.pdf
2562014-12-1062d5fdb316ad5b0c5e3afb5919785df4c557f25bw32_regin_stage_1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.12.10.W32_Regin/w32_regin_stage_1.pdf
2572014-12-10a9970d82d1b539ee63838619fcb9aaaae5f0c51dCloudAtlas_RedOctober_APThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.12.10.RedOctober_APT/CloudAtlas_RedOctober_APT.pdf
2582014-12-10c5355707644b6948069345e2e8bac429e39f882dw64_regin_stage_1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.12.10.W64_Regin/w64_regin_stage_1.pdf
2592014-12-10fefd7ff6b2b254bd2e05784b51758c5d90acc06fkorea_power_plant_wiperhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.12.10_South_Korea_MBR_Wiper/korea_power_plant_wiper.pdf
2602014-12-1292f526d9a5e14080fdbec90ba2385617bbf19a10FTA_1014_Bots_Machines_and_the_Matrixhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.12.12.Bots_Machines_and_the_Matrix/FTA_1014_Bots_Machines_and_the_Matrix.pdf
2612014-12-12ae90917c7abe0c38ae289be9589f04c6fa7184c0Vinself_steganographyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.12.12.Vinself/Vinself_steganography.pdf
2622014-12-17f7db20ae4b3f4784a3b4ac346424872858370a18Wiper_Malwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.12.17.Wiper_Malware_Deep_Dive/Wiper_Malware.pdf
2632014-12-18d0f24df94063d28e13c08fd2aeb9522034da3deaTargeting_Syrian_ISIS_Criticshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.12.18.Syrian_ISIS_Critics/Targeting_Syrian_ISIS_Critics.pdf
2642014-12-190e575c64a7603a1709b1ae37e286f420128d2096TA14-353A_wiperhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.12.19.Targeted_Destructive_Malware/TA14-353A_wiper.pdf
2652014-12-211a4508469960b248ba713cecf34653c59fd460f1operation-poisoned-helmandhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.12.21.Operation_Poisoned_Helmand/operation-poisoned-helmand.pdf
2662014-12-22c1b7c2bec86e8edf8bba650c6fa506319198e3c3Anunak_APT_against_financial_institutionshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2014/2014.12.22.Anunak_APT/Anunak_APT_against_financial_institutions.pdf
2672015-01-112aa6e47d8b9549b8ca2ea62db6384bb4db682bcfDTL-12012015-01https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.01.11.Hong_Kong_SWC_Attack/DTL-12012015-01.pdf
2682015-01-1228f35f4b95e66030cf2a330bae394bbf8805b34fSkeleton_Key_Analysishttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.01.12.skeleton-key-malware-analysis/Skeleton_Key_Analysis.pdf
2692015-01-15cde02057689886c29438815cbeed8ebe860a0ab2Agent.BTZ_to_ComRAThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.01.15.Evolution_of_Agent.BTZ_to_ComRAT/Agent.BTZ_to_ComRAT.pdf
2702015-01-20486a65ba17141147d3d9fff2a0c26109edf78fabInception_APT_Analysis_Bluecoathttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.01.20.Reversing_the_Inception_APT_malware/Inception_APT_Analysis_Bluecoat.pdf
2712015-01-206df16b7ff93a44fcbec3b656645631b864175bcfProject_Cobra_Analysishttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.01.20.Project_Cobra/Project_Cobra_Analysis.pdf
2722015-01-22247676579b83264faf32e171f9187bbdbb057c7fScarab_Russianhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.01.22.Scarab_attackers_Russian_targets/Scarab_Russian.pdf
2732015-01-22630eea3f1bc9158570c53d70fc70b31003305f5cRegin_Hopscotch_Legspinhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.01.22.Regin_Hopscotch_and_Legspin/Regin_Hopscotch_Legspin.pdf
2742015-01-22d6b2e4dba3b801252a62e0dade5c8ab71d2eefb1waterbug-attack-grouphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.01.22.Waterbug.group/waterbug-attack-group.pdf
2752015-01-2754c39c3b9a25c6fd9e4b8ed7ea672a095d2af31eComparing_Regin_Qwertyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.01.27.QWERTY_keylog_Regin_compare/Comparing_Regin_Qwerty.pdf
2762015-01-29c9a33400ab60741ff0c77a9829f3e04cfe39f2d2Backdoor.Winnti_Trojan.Skelkyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.01.29.Backdoor.Winnti_attackers/Backdoor.Winnti_Trojan.Skelky.pdf
2772015-01-29d2e17e228e02df878f807b112f78afdc13cc6bcaP2P_PlugX_Analysishttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.01.29.P2P_PlugX/P2P_PlugX_Analysis.pdf
2782015-02-024751fe686fb4e305ef49296f46ac33139114232brpt-behind-the-syria-conflicthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.02.02.behind-the-syria-conflict/rpt-behind-the-syria-conflict.pdf
2792015-02-044e645016b3627272cceb28a3b8bbba536eb9a6b4PawnStorm_iOShttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.02.04.Pawn_Storm_Update_iOS_Espionage/PawnStorm_iOS.pdf
2802015-02-1086f4a308b99a2a9cb335dc06457dd09399c05a29GlobalThreatIntelReporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.02.10.CrowdStrike_GlobalThreatIntelReport_2014/GlobalThreatIntelReport.pdf
2812015-02-162eaf12b4859972d4017f16086f98412e16da9c95blog_equation-the-death-starhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.02.16.equation-the-death-star/blog_equation-the-death-star.pdf
2822015-02-1641aa5bd1ed03d80650a89de3649d051f900b958bEquation_group_questions_and_answershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.02.16.equation-the-death-star/Equation_group_questions_and_answers.pdf
2832015-02-169134d57a818f98608a53b53dcfb520716d9eb1c3operation-arid-viper-whitepaper-enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.02.16.Operation_Arid_Viper/operation-arid-viper-whitepaper-en.pdf
2842015-02-1699af231600ee8fd83b4b4fb057429e60cd9d21c4Carbanak_APT_enghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.02.16.Carbanak.APT/Carbanak_APT_eng.pdf
2852015-02-170f4d8ba248dde47b514161014a57885aed084ce2The-Desert-Falcons-targeted-attackshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.02.17.Desert_Falcons_APT/The-Desert-Falcons-targeted-attacks.pdf
2862015-02-17b99e4faf6dc5b027f0dd9e649811c4bb5fe513d8A_Fanny_Equationhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.02.17.A_Fanny_Equation/A_Fanny_Equation.pdf
2872015-02-18c8f384ae75119626032d4b42f34e883269dbf2a4Elephantosishttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.02.18.Shooting_Elephants/Elephantosis.pdf
2882015-02-18e44dcd9329e0bb93b2daf2d3a0e77165ccc6f86024270-babar-espionage-software-finally-found-and-put-under-the-microscopehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.02.18.Babar/24270-babar-espionage-software-finally-found-and-put-under-the-microscope.pdf
2892015-02-24c73cbb8fa22e16920e3cbf51226f3fd8010d38bbcto-tib-20150223-01ahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.02.24.Deeper_Scanbox/cto-tib-20150223-01a.pdf
2902015-02-257c69db91f21ee20f7abcb4d95f21c4a17bfa6d17rpt-southeast-asia-threat-landscapehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.02.25.Southeast_Asia_Threat_Landscape/rpt-southeast-asia-threat-landscape.pdf
2912015-02-25fc1d350810c19c94b1f3642fa08f50bf914ab821plugx-goes-to-the-registry-and-indiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.02.25.PlugX_to_registry/plugx-goes-to-the-registry-and-india.pdf
2922015-02-27326f9133be497ec98132e9d6744ac26481a3d1c2The Anthem Hack_ All Roads Lead to China - ThreatConnect _ Enterprise Threat Intelligence Platformhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.02.27.The_Anthem_Hack_All_Roads_Lead_to_China/The%20Anthem%20Hack_%20All%20Roads%20Lead%20to%20China%20-%20ThreatConnect%20_%20Enterprise%20Threat%20Intelligence%20Platform.pdf
2932015-02-2740559d68f1a3d25639408209de18d8ee395ae08aAnthem_hack_all_roads_lead_to_Chinahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.02.27.The_Anthem_Hack_All_Roads_Lead_to_China/Anthem_hack_all_roads_lead_to_China.pdf
2942015-02-27476ebf5380941f81e9d22e9a012bae5638e1a985the-anthem-hack-all-roads-lead-to-chinahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.02.27.The_Anthem_Hack_All_Roads_Lead_to_China/the-anthem-hack-all-roads-lead-to-china.pdf
2952015-03-0512c4cc9d9a59aadcd01aa2282a6c99da8bcd18abcasper-malware-babar-bunny-another-espionage-cartoonhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.03.05.Casper_Malware/casper-malware-babar-bunny-another-espionage-cartoon.pdf
2962015-03-061b7639b4f1cff257684654926bd2a9b3c5a6d8e1Babar_or_Bunnyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.03.06.Babar_or_Bunny/Babar_or_Bunny.pdf
2972015-03-06e9498a24509614d88c38311f45c1550eff79f8f5Animals in the APT Farmhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.03.06.Animals_APT_Farm/Animals%20in%20the%20APT%20Farm.pdf
2982015-03-10d17fdf8935e094b2a34cde539abc85eec3533941Tibetan-Uprising-Day-Malware-Attacks_websitepdfhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.03.10.Tibetan_Uprising/Tibetan-Uprising-Day-Malware-Attacks_websitepdf.pdf
2992015-03-11a9a89dbd99ed439abcfced111affc69f9728fc7aInside_EquationDrug_Espionage_Platformhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.03.11.EquationDrug/Inside_EquationDrug_Espionage_Platform.pdf
3002015-03-1973a8169eff8f50cefe587c1097d67fb45e71a046wp-operation-woolen-goldfishhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.03.19.Goldfish_Phishing/wp-operation-woolen-goldfish.pdf
3012015-03-30b3ad6d13b10de19e232342610370c47ac9083d0d2015.03.30.crowdstrike.chopping-packets-decoding-china-chopper-web-shell-traffic-over-sslhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.03.30.Decoding_China_Chopper/2015.03.30.crowdstrike.chopping-packets-decoding-china-chopper-web-shell-traffic-over-ssl.pdf
3022015-03-317cd5b12fa38705e254296133991410754f1678abvolatile-cedar-technical-reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.03.31.Volatile_Cedar/volatile-cedar-technical-report.pdf
3032015-04-121b83984e2c9515c59885bc0078e3b1bed5d513b2rpt-apt30https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.04.12.APT30/rpt-apt30.pdf
3042015-04-153991aeb7aa51f81e0742f06b833b055aae662bf9The Chronicles of the Hellsing APT_ the Empire Strikes Back - Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.04.15.Hellsing_APT/The%20Chronicles%20of%20the%20Hellsing%20APT_%20the%20Empire%20Strikes%20Back%20-%20Securelist.pdf
3052015-04-155b22b494cfe329c352948530cb19b6dc5067ca44Indicators_of_Compormise_Hellsinghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.04.15.Hellsing_APT/Indicators_of_Compormise_Hellsing.pdf
3062015-04-183bd10169fc704a20a702c3fc61633d68843f195cOperation RussianDollhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.04.18.Operation_RussianDoll/Operation%20RussianDoll.pdf
3072015-04-20417a791693f2554ee1ec94564467168ea58e2cfbcto-tib-20150420-01ahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.04.20.Sofacy_II/cto-tib-20150420-01a.pdf
3082015-04-2146f4a7b1ec66e3aa1f6a93d64d9a4d3363621636The CozyDuke APT - Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.04.21.CozyDuke_APT/The%20CozyDuke%20APT%20-%20Securelist.pdf
3092015-04-227f0cdde2b33261a9a35446bb2cb51c310539fa50CozyDukehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.04.22.CozyDuke/CozyDuke.pdf
3102015-04-272babeca1ce5aff70f24684cd80ed45ef43ec9a17Attacks against Israeli & Palestinian interests - Cyber security updateshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.04.27.Attacks_Israeli_Palestinian/Attacks%20against%20Israeli%20%26%20Palestinian%20interests%20-%20Cyber%20security%20updates.pdf
3112015-05-05b6aec94a79b7af64566cf734ef2a703c3d670e1c1506306551185339https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.05.05.Targeted_attack_on_France_TV5Monde/1506306551185339.pdf
3122015-05-07c478f5c474609cc5401648c0a55213f3a7137344Dissecting-the-Krakenhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.05.07.Kraken/Dissecting-the-Kraken.pdf
3132015-05-123bda90269f9a49360befe7f9a00f832c57af89c2FSOFACYhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.05.12.Sofacy_root9B/FSOFACY.pdf
3142015-05-1282255ad9b0682b0a091f92d129c0aefd5b7d96cdR9b_FSOFACY_0https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.05.12.Sofacy_root9B/R9b_FSOFACY_0.pdf
3152015-05-132c19d922bfa84a0205d9142124caaa51dc2021f5Cylance SPEAR Team_ A Threat Actor Resurfaceshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.05.13.Spear_Threat/Cylance%20SPEAR%20Team_%20A%20Threat%20Actor%20Resurfaces.pdf
3162015-05-1493b3ec0cec9636d7815424be3030ae54c2eb79b5wp-operation-tropic-trooperhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.05.14.Operation_Tropic_Trooper/wp-operation-tropic-trooper.pdf
3172015-05-14af489e7e52483efe28d8f20f15be5d1dbae62a55The Naikon APT - Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.05.14.Naikon_APT/The%20Naikon%20APT%20-%20Securelist.pdf
3182015-05-18155c112f73a973ecf710fab5caa6434212275d81CmstarDownloader_Lurid_Enfal_Cousinhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.05.18.Cmstar/CmstarDownloader_Lurid_Enfal_Cousin.pdf
3192015-05-19538701feeead706e34d24cf2b831071ac2f600cboil-tanker-enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.05.19.Operation_Oil_Tanker/oil-tanker-en.pdf
3202015-05-217e03e711a841cd0eb1b6fc7446b2a069ada19f2aTheNaikonAPT-MsnMM1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.05.21.Naikon_APT/TheNaikonAPT-MsnMM1.pdf
3212015-05-21b91ed59b5aea02b712f1ea974fb4cf171ea8ba44TheNaikonAPT-MsnMM2https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.05.21.Naikon_APT/TheNaikonAPT-MsnMM2.pdf
3222015-05-26198195bf91a009bdf666d630230d86b7b1d60bb9Dissecting-LinuxMoosehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.05.26.LinuxMoose/Dissecting-LinuxMoose.pdf
3232015-05-2729ceb2ee71d540a7f3f2a496b2e726b2779f485bBlackEnergy-CyberX-Report_27_May_2015_FINALhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.05.27.BlackEnergy3/BlackEnergy-CyberX-Report_27_May_2015_FINAL.pdf
3242015-05-2734c0983b58ba25a4a3066ae9871b12b2958af506antiy.net-ANALYSIS ON APT-TO-BE ATTACK THAT FOCUSING ON CHINAS GOVERNMENT AGENCYhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.05.27.APT_to_be/antiy.net-ANALYSIS%20ON%20APT-TO-BE%20ATTACK%20THAT%20FOCUSING%20ON%20CHINAS%20GOVERNMENT%20AGENCY.pdf
3252015-05-2742917d2bb4535fc6369cdd68bf82b7e7d28ebadfANALYSIS-ON-APT-TO-BE-ATTACK-THAT-FOCUSING-ON-CHINAS-GOVERNMENT-AGENCY-https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.05.27.APT_to_be/ANALYSIS-ON-APT-TO-BE-ATTACK-THAT-FOCUSING-ON-CHINAS-GOVERNMENT-AGENCY-.pdf
3262015-05-284855ba957702d0393cb7ade531b46625426d9192Grabithttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.05.28.grabit-and-the-rats/Grabit.pdf
3272015-05-2998e849a6be7fb956f5b17a183a2e00048f3bab25OceanLotusReporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.05.29.OceanLotus/OceanLotusReport.pdf
3282015-06-03a0c391fec9b1faa80a0c713bd6aa37a7129adda7Thamar-Reservoirhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.06.03.thamar-reservoir/Thamar-Reservoir.pdf
3292015-06-04fee0f49a312915de5c41ebdd1eaf8aefacde1eafBlueTermite_Japanhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.06.04.Blue_Thermite_targeting_Japan/BlueTermite_Japan.pdf
3302015-06-0919c98e87f5cfd25fc91b0fbbd1c684e81a276c44OhFlorio-VB2015https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.06.09.Duqu_2.0_Win32k_Exploit_Analysis/OhFlorio-VB2015.pdf
3312015-06-106c4fcf640dfbedbdddb724e69d0ed84319b0cf6eduqu2_crysyshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.06.10.Duqu_2.0/duqu2_crysys.pdf
3322015-06-10f96b39177a6d371bbcc749781c9591738b4ac5d2Duqu_2_Yara_ruleshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.06.10.The_Mystery_of_Duqu_2_0/Duqu_2_Yara_rules.pdf
3332015-06-10fe05831d3dc661e418f969045f0087ba642fb27bThe_Mystery_of_Duqu_2_0_a_sophisticated_cyberespionage_actor_returnshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.06.10.The_Mystery_of_Duqu_2_0/The_Mystery_of_Duqu_2_0_a_sophisticated_cyberespionage_actor_returns.pdf
3342015-06-12355d59c0f3e480734acb72f26f16f717d2984e6cAfghan Government Compromise_ Browser Beware _ Volexity Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.06.12.Afghan_Government_Compromise/Afghan%20Government%20Compromise_%20Browser%20Beware%20_%20Volexity%20Blog.pdf
3352015-06-15154083bd059ac6bb001e247f7e03d6189fa93362Targeted-Attacks-against-Tibetan-and-Hong-Kong-Groups-Exploiting-CVE-2014-4114https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.06.15.Targeted-Attacks-against-Tibetan-and-Hong-Kong-Groups/Targeted-Attacks-against-Tibetan-and-Hong-Kong-Groups-Exploiting-CVE-2014-4114.pdf
3362015-06-163bcbddd61cc7df02fad5bdc692e956bac590fe98unit42-operation-lotus-blossomhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.06.16.operation-lotus-blossom/unit42-operation-lotus-blossom.pdf
3372015-06-228b870691f84547afc34c08c494f92a21f6d1dc3ewinnti_pharmaceuticalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.06.22.Winnti_targeting_pharmaceutical_companies/winnti_pharmaceutical.pdf
3382015-06-245414153144f453be553af09c69bb1300c7678f79UnFIN4ished_Business_pwdhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.06.24.unfin4ished-business/UnFIN4ished_Business_pwd.pdf
3392015-06-260aada2f7f4fb4955eb21b3f10cf6edf1523f1d0cOperation Clandestine Wolfhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.06.26.operation-clandestine-wolf/Operation%20Clandestine%20Wolf.pdf
3402015-06-26da36e8623013f441bc3dd841e695ceb1f03db496OperationClandestineWolfhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.06.26.operation-clandestine-wolf/OperationClandestineWolf.pdf
3412015-06-281199aef590d01265442e28cf5727240f2f37ae25DTL-06282015-01https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.06.28.APT_on_Taiwan/DTL-06282015-01.pdf
3422015-06-30fdf388b793a73c47a7caab35a5c4645c83c0931aDino the latest spying malware from an allegedly French espionage group analyzedhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.06.30.dino-spying-malware-analyzed/Dino%20%E2%80%93%20the%20latest%20spying%20malware%20from%20an%20allegedly%20French%20espionage%20group%20analyzed.pdf
3432015-07-08a73fcc0ce6923f3a6ce537ec8214cb7b539fe343WildNeutron_Economic_espionagehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.07.08.Wild_Neutron/WildNeutron_Economic_espionage.pdf
3442015-07-08d76a268a20027c5f56e67b2743ac747a466c257eAPT Group Wekby Leveraging Adobe Flash Exploit (CVE-2015-5119) _ Volexity Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.07.08.APT_CVE-2015-5119/APT%20Group%20Wekby%20Leveraging%20Adobe%20Flash%20Exploit%20%28CVE-2015-5119%29%20_%20Volexity%20Blog.pdf
3452015-07-09bf41e63f1493152c0d82f2b800099fc4170ea9f1butterfly-corporate-spies-out-for-financial-gainhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.07.09.Butterfly/butterfly-corporate-spies-out-for-financial-gain.pdf
3462015-07-103e337d629d17d73fd95d44b7e09777c4e59a5e4dapt.group.upshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.07.10.APT_Group_UPS_Targets_US_Government/apt.group.ups.pdf
3472015-07-13006d625ab23c5f9d849608506c77d45afec4c720Forkmeiamfamous_SeaDukehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.07.13.Forkmeiamfamous/Forkmeiamfamous_SeaDuke.pdf
3482015-07-13786d57e8532c1fcad5493bccd75e16f10cd45774Demonstrating_Hustlehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.07.13.Demonstrating_Hustle/Demonstrating_Hustle.pdf
3492015-07-142fd37e0616a93fb94131cddecbb40e976de62364an-in-depth-look-at-how-pawn-storms-java-zero-day-was-usedhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.07.14.How_Pawn_Storm_Java_Zero-Day_Was_Used/an-in-depth-look-at-how-pawn-storms-java-zero-day-was-used.pdf
3502015-07-14d2e6c0c6d2e8dc72677482b8b4271568a3b2a9b9MiniDionis_CozyCar_Seadukehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.07.14.tracking-minidionis-cozycars/MiniDionis_CozyCar_Seaduke.pdf
3512015-07-2013feea5bb8a1f837e3772daf151e343086061f6aWateringHole_Aerospace_CVE-2015-5122_IsSpacehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.07.20.IsSpace_Backdoor/WateringHole_Aerospace_CVE-2015-5122_IsSpace.pdf
3522015-07-204aa116bc762a0e2ac8ad635799c2a1acc49de6c4China_Peace_Palacehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.07.20.China_Peace_Palace/China_Peace_Palace.pdf
3532015-07-228ee4f88f4734adc592190027018a461471e8204aDuke_cloud_Linuxhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.07.22.Duke_APT_groups_latest_tools/Duke_cloud_Linux.pdf
3542015-07-2705763e7c36f1120b89cedba2c39ab4680b8ba28fapt29-hammertoss-stealthy-tactics-define-ahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.07.27.HAMMERTOSS/apt29-hammertoss-stealthy-tactics-define-a.pdf
3552015-07-28758520009778853bd186c8527b1cd73ee373ca36the-black-vine-cyberespionage-grouphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.07.28.Black_Vine/the-black-vine-cyberespionage-group.pdf
3562015-07-3018e19f0aa8caf36fbb424ab650f87bb192d3434aOperation-Potao-Express_final_v2https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.07.30.Operation-Potao-Express/Operation-Potao-Express_final_v2.pdf
3572015-07-301ca6b256b4926edad36b545b8809b2c64d917252bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.07.30.Operation-Potao-Express/blog.pdf
3582015-08-04e820638a0c4690636ebac596e0bbc040308aa040Terracotta-VPN-Report-Final-8-3https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.08.04.Terracotta_VPN/Terracotta-VPN-Report-Final-8-3.pdf
3592015-08-052e7bfba595146d0274eaf32479cb7ea8eebda153threat-group-3390-targets-organizations-for-cyberespionagehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.08.05.Threat_Group-3390/threat-group-3390-targets-organizations-for-cyberespionage.pdf
3602015-08-08a850834f5ff8253d70a709a3d18b3cbfc05ce27cThreat Analysis_ Poison Ivy and Links to an Extended PlugX Campaign CYINT Analysishttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.08.08.Poison_Ivy_and_Links_to_an_Extended_PlugX_Campaign/Threat%20Analysis_%20Poison%20Ivy%20and%20Links%20to%20an%20Extended%20PlugX%20Campaign%20%E2%80%93%20CYINT%20Analysis.pdf
3612015-08-10e92d19e7054c2d384d2afac5027e9fae5ea51596HTExploitTelemetryhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.08.10.The_Italian_Connection_An_analysis_of_exploit_supply_chains_and_digital_quartermasters/HTExploitTelemetry.pdf
3622015-08-1968f5e800be94213b5fec499754aef6fe60ef13feNew Internet Explorer zero-day exploited in Hong Kong attackshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.08.19.new-internet-explorer-zero-day-exploited-hong-kong-attacks/New%20Internet%20Explorer%20zero-day%20exploited%20in%20Hong%20Kong%20attacks.pdf
3632015-08-209035c1a0e8ec5b4eb632c0feb39a86600dce7d26ASERT Threat Intelligence Brief 2015-05 PlugX Threat Activity in Myanmarhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.08.20.PlugX_Threat_Activity_in_Myanmar/ASERT%20Threat%20Intelligence%20Brief%202015-05%20PlugX%20Threat%20Activity%20in%20Myanmar.pdf
3642015-08-209723b822bb83020963b2b2557da56ca1ba6e46f9new-activity-of-the-blue-termite-apthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.08.20.new-activity-of-the-blue-termite-apt/new-activity-of-the-blue-termite-apt.pdf
3652015-09-012674d8703caf59d5b8062acc90e403814ec94621wp-the-spy-kittens-are-backhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.09.01.Rocket_Kitten_2/wp-the-spy-kittens-are-back.pdf
3662015-09-089db00858876ae2129cd45a55d40b1b4521fc8659musical-chairs-multi-year-campaign-involving-new-variant-of-gh0st-malwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.09.08.Musical_Chairs_Gh0st_Malware/musical-chairs-multi-year-campaign-involving-new-variant-of-gh0st-malware.pdf
3672015-09-08f58b5c078576477b032cdf476cd1668268dc53faPaloAlto.musical-chairs-multi-year-campaign-involving-new-variant-of-gh0st-malwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.09.08.musical-chairs-multi-year-campaign-involving-new-variant-of-gh0st-malware/PaloAlto.musical-chairs-multi-year-campaign-involving-new-variant-of-gh0st-malware.pdf
3682015-09-091cc6d8e2ad98b3b816c39ef19da2c0eeb561050aShadow Force Uses DLL Hijacking, Targets South Korean Companyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.09.09.Shadow_Force/Shadow%20Force%20Uses%20DLL%20Hijacking%2C%20Targets%20South%20Korean%20Company.pdf
3692015-09-09320456d541590567eec647d887462186ba90e979Satellite Turla_ APT Command and Control in the Sky - Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.09.09.satellite-turla-apt/Satellite%20Turla_%20APT%20Command%20and%20Control%20in%20the%20Sky%20-%20Securelist.pdf
3702015-09-09e5ec56a71fc2cf4ac1381c6ae48cc86708cb3f8eSatellite-turla-apt-command-and-control-in-the-skyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.09.09.satellite-turla-apt/Satellite-turla-apt-command-and-control-in-the-sky.pdf
3712015-09-1511ce27412676f3584b8e9abefc629e2b90735056In Pursuit of Optical Fibers and Troop Intel_ Targeted Attack Distributes PlugX in Russia _ Proofpointhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.09.15.PlugX_in_Russia/In%20Pursuit%20of%20Optical%20Fibers%20and%20Troop%20Intel_%20Targeted%20Attack%20Distributes%20PlugX%20in%20Russia%20_%20Proofpoint.pdf
3722015-09-15328800f27b160b88263e7b1d2de48b35c5f25b8dPlugX-in-Russiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.09.15.PlugX_in_Russia/PlugX-in-Russia.pdf
3732015-09-168804946664547376b49229749d7c162df44e80e6The-Shadow-Knowshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.09.16.The-Shadow-Knows/The-Shadow-Knows.pdf
3742015-09-173e45a371a5d1ada49c0e193372e3e1fe12191049Operation Iron Tiger Appendixhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.09.17.Operation_Iron_Tiger/Operation%20Iron%20Tiger%20Appendix.pdf
3752015-09-175ee4cfb8802fd6a2dc6d936357a6ce16878778cfwp-operation-iron-tigerhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.09.17.Operation_Iron_Tiger/wp-operation-iron-tiger.pdf
3762015-09-17c02195e501548fc9b8e2e13673a7e12e1af9e207dukes_whitepaperhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.09.17.duke_russian/dukes_whitepaper.pdf
3772015-09-23dbd710751a6c32ba91401fb5e5623f46b4d2475fProject_CAMERASHY_ThreatConnect_Copyright_2015https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.09.23.CAMERASHY_ThreatConnect/Project_CAMERASHY_ThreatConnect_Copyright_2015.pdf
3782015-10-031116413c96b35c3c8f3d404bdabbec46b375eaaaCybereason-Labs-Analysis-Webmail-Sever-APThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.10.03.Webmail_Server_APT/Cybereason-Labs-Analysis-Webmail-Sever-APT.pdf
3792015-10-05980ab92472c6de302ade77423ce09abe58a258bcthreat-identificationhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.10.05.Proactive_Threat_Identification/threat-identification.pdf
3802015-10-1592d59c195d0c98a3ef1f583c7eee995a0e85e27fMapping FinFishers Continuing Proliferationhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.10.15.FinFisher_Continuing/Mapping%20FinFisher%E2%80%99s%20Continuing%20Proliferation.pdf
3812015-10-164e3ce763a2de0b448556aed46fdb89a361f38f532015.10.targeted-attacks-ngo-burmahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.10.16.NGO_Burmese_Government/2015.10.targeted-attacks-ngo-burma.pdf
3822015-11-044911b137926b6b17044141527980cdb9e4a9cb13cct-w08_evolving-threats-dissection-of-a-cyber-espionage-attackhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.11.04_Evolving_Threats/cct-w08_evolving-threats-dissection-of-a-cyber-espionage-attack.pdf
3832015-11-09523ae1be152df2a4d1de51ee2b3e7f23cad62628rocket-kitten-reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.11.09.Rocket_Kitten_A_Campaign_With_9_Lives/rocket-kitten-report.pdf
3842015-11-103133729b5af2ecd6657c814c0d7c73a3157427dbbookworm-trojan-a-model-of-modular-architecturehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.11.10.bookworm-trojan-a-model-of-modular-architecture/bookworm-trojan-a-model-of-modular-architecture.pdf
3852015-11-174da43deb6f7dede89080d4b4adaae53a2c371aa5rpt-witchcovenhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.11.17.Pinpointing_Targets_Exploiting_Web_Analytics_to_Ensnare_Victims/rpt-witchcoven.pdf
3862015-11-181ffa0aaf1e29ef02734e49bfab41c4ec18b3b839Russian financial cybercrime_ how it works - Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.11.18.Russian_financial_cybercrime_how_it_works/Russian%20financial%20cybercrime_%20how%20it%20works%20-%20Securelist.pdf
3872015-11-18abac715cbc6d033fdb588a36f3e9eaa9535d102bKaspersky_Lab_cybercrime_underground_report_eng_v1_0https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.11.18.Russian_financial_cybercrime_how_it_works/Kaspersky_Lab_cybercrime_underground_report_eng_v1_0.pdf
3882015-11-18d95f10b2f4711a2f0b410ad5218a49f0a80e8c13amballa-discovers-new-toolset-linked-to-destover-attackers-arsenal-helps-them-to-broaden-attack-surfacehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.11.18.Destover/amballa-discovers-new-toolset-linked-to-destover-attackers-arsenal-helps-them-to-broaden-attack-surface.pdf
3892015-11-18e204f491c98755fe0239112758a0938409dce32atdrop2-attacks-suggest-dark-seoul-attackers-returnhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.11.18.tdrop2/tdrop2-attacks-suggest-dark-seoul-attackers-return.pdf
3902015-11-18e3ecbc1fbfa46fc8d2b34639b831ea3b82110abasakula-reloadedhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.11.18.Sakula_Reloaded/sakula-reloaded.pdf
3912015-11-18fbb18bcb00080008184c6e99c378a8da721b43bfDamballa discovers new toolset linked to Destoverhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.11.18.Destover/Damballa%20discovers%20new%20toolset%20linked%20to%20Destover.pdf
3922015-11-194bfa7e0065fdcedaee712fcf08200bc0233aea09ecrypting-strings-in-emdivihttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.11.19.decrypting-strings-in-emdivi/ecrypting-strings-in-emdivi.pdf
3932015-11-197ac406637241a341e0130e3b485f1cc3b8e22a9620151028_codeblue_apt-enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.11.19.decrypting-strings-in-emdivi/20151028_codeblue_apt-en.pdf
3942015-11-231d72a50b38ee4b5f57684726cef957f61ae6d2f2GlassRAT-finalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.11.23.PEERING_INTO_GLASSRAT/GlassRAT-final.pdf
3952015-11-23551f1437e2589d5b0111a28db3fafa707822b759wp-prototype-nationhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.11.23.Prototype_Nation_The_Chinese_Cybercriminal_Underground_in_2015/wp-prototype-nation.pdf
3962015-11-2378f88b00380fd4e888325439ab2591babda98fccPrototype Nation_ The Chinese Cybercriminal Underground in 2015 - Security News - Trend Micro USAhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.11.23.Prototype_Nation_The_Chinese_Cybercriminal_Underground_in_2015/Prototype%20Nation_%20The%20Chinese%20Cybercriminal%20Underground%20in%202015%20-%20Security%20News%20-%20Trend%20Micro%20USA.pdf
3972015-11-238d0db1c4358b552084b1f8d504179651c6ceb1d2CopyKittenshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.11.23.CopyKittens_Attack_Group/CopyKittens.pdf
3982015-11-249d9a127ad42f4328a56d631d15816ba71e18f98cattack-campaign-on-the-government-of-thailand-delivers-bookworm-trojanhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.11.24.Attack_Campaign_on_the_Government_of_Thailand_Delivers_Bookworm_Trojan/attack-campaign-on-the-government-of-thailand-delivers-bookworm-trojan.pdf
3992015-11-30c27c1daaa60de3381a7cb11975bef88fa05c2449foxit-whitepaper_ponmocup_1_1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.11.30.Ponmocup/foxit-whitepaper_ponmocup_1_1.pdf
4002015-12-014b28cc1844c1f6218a71d3231c5f5e70d7c68709china.based.threathttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.12.01.China-based_Cyber_Threat_Group_Uses_Dropbox_for_Malware_Communications_and_Targets_Hong_Kong_Media_Outlets/china.based.threat.pdf
4012015-12-04ec90ba5cd623542dbdbce8d65095c2a27e64fb08sofacy-apt-hits-high-profile-targets-with-updated-toolsethttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.12.04.Sofacy_APT/sofacy-apt-hits-high-profile-targets-with-updated-toolset.pdf
4022015-12-07421d41eafe972ca46b53ba82a260817dd3599d11iran-based-attackers-use-back-door-threats-spy-middle-eastern-targetshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.12.07.Iran-based/iran-based-attackers-use-back-door-threats-spy-middle-eastern-targets.pdf
4032015-12-07924193affc6bcd25cc2d9b1b952a8c8dcf068669fin1-targets-boot-recordhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.12.07.Thriving_Beyond_The_Operating_System/fin1-targets-boot-record.pdf
4042015-12-080732f30d54b0bb6bd260dd3e34889bc6ec89c5ecPackrat_ Seven Years of a South American Threat Actorhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.12.08.Packrat/Packrat_%20Seven%20Years%20of%20a%20South%20American%20Threat%20Actor.pdf
4052015-12-081473bc708f2ad4a5e2402b2d343a51271fac6c0epackrat-reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.12.08.Packrat/packrat-report.pdf
4062015-12-138a5dd7e1cb4e277dbdf8323aeda0d79dce182249elise-security-through-obesity.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.12.13.ELISE/elise-security-through-obesity.html.pdf
4072015-12-157c3654eb098d9b484c2d342af5375580b6073594Newcomers-in-the-Derusbi-familyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.12.15.Newcomers_in_the_Derusbi_family/Newcomers-in-the-Derusbi-family.pdf
4082015-12-16227c9942df3a8902726be7eb618334e1253aa9d5operation-black-atlas-part-2-tools-and-malware-used-and-how-to-detect-themhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.12.16.Operation_Black_Atlas/operation-black-atlas-part-2-tools-and-malware-used-and-how-to-detect-them.pdf
4092015-12-16aae628909f813e344b30470fae5d2a26619c4706Operation Black Atlas_Indicators_of_Compromisehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.12.16.Operation_Black_Atlas/Operation%20Black%20Atlas_Indicators_of_Compromise.pdf
4102015-12-16bd57cd05f1940487913c3fc7f85d3d09710a9631operation-black-atlas-endangers-in-store-card-payments-and-smbs-worldwide-switches-between-blackpos-and-other-toolshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.12.16.Operation_Black_Atlas/operation-black-atlas-endangers-in-store-card-payments-and-smbs-worldwide-switches-between-blackpos-and-other-tools.pdf
4112015-12-16cd02ced2b0c1a7ed91e9d631ad45f001fa71a837Operation_Black Atlas_Technical_Briefhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.12.16.Operation_Black_Atlas/Operation_Black%20Atlas_Technical_Brief.pdf
4122015-12-16e10651d3a6223055e95464f0023b549cdf7ca00cFTA_1020_Fidelis_Inocnation_FINALhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.12.16.INOCNATION.Campaign/FTA_1020_Fidelis_Inocnation_FINAL.pdf
4132015-12-1778bb54f4e5308d18e178c64a6f3a54710fdb2ee3Bitdefender_In-depth_analysis_of_APT28__The_Political_Cyber-Espionagehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.12.17.APT28_Under_The_Scope/Bitdefender_In-depth_analysis_of_APT28__The_Political_Cyber-Espionage.pdf
4142015-12-18b2e67b0e7e9ca99cc9a37f0d1b7603fdf0365a53attack-on-french-diplomat-linked-to-operation-lotus-blossomhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.12.18.Attack_on_Frence_Diplomat_Linked_To_Operation_Lotus_Blossom/attack-on-french-diplomat-linked-to-operation-lotus-blossom.pdf
4152015-12-2057511f2a45c751e73814b4b9514a1bcc9e93ea72The_EPS_Awakens_Part_2https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.12.20.EPS_Awakens_Part_II/The_EPS_Awakens_Part_2.pdf
4162015-12-222f04db722b7a212df65723b9685e3dc6afaaa66cbbsrat-attacks-targeting-russian-organizations-linked-to-roaming-tigerhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2015/2015.12.22.BBSRAT_Roaming_Tiger/bbsrat-attacks-targeting-russian-organizations-linked-to-roaming-tiger.pdf
4172016-01-03da87ca80af9057fe2d153e11f3f4a372a86fc314blackenergy-sshbeardoor-details-2015-attacks-ukrainian-news-media-electric-industryhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.03.BlackEnergy_Ukrainian/blackenergy-sshbeardoor-details-2015-attacks-ukrainian-news-media-electric-industry.pdf
4182016-01-062a81d693b62fe82d6df0383996437c5d265e9527potential-sample-of-malware-from-the-ukrainian-cyber-attack-uncoveredhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.03.BlackEnergy_Ukrainian/Reference/potential-sample-of-malware-from-the-ukrainian-cyber-attack-uncovered.pdf
4192016-01-067a2059db840f1a3746ab3247e15a5ee1798f1f32LM3-LipovskyCherepanov.xmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.03.BlackEnergy_Ukrainian/Reference/LM3-LipovskyCherepanov.xml.pdf
4202016-01-0691fbf836bbacd644060ed694aa4931b03af7865dblackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industryhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.03.BlackEnergy_Ukrainian/Reference/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industry.pdf
4212016-01-06922b5960bc4dcc0dc784146b7882f79052ca510aback-in-blackenergy-2014https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.03.BlackEnergy_Ukrainian/Reference/back-in-blackenergy-2014.pdf
4222016-01-06a70f56b79c409eda422a519e3b6c81ec05c7e8d2uisgcon11_2015#pic-5https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.03.BlackEnergy_Ukrainian/Reference/uisgcon11_2015%23pic-5.pdf
4232016-01-06c3f1b24b4eb6691187cf923ba839b1c48393a6c7blackenergy-sshbeardoor-details-2015-attacks-ukrainian-news-media-electric-industryhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.03.BlackEnergy_Ukrainian/Reference/blackenergy-sshbeardoor-details-2015-attacks-ukrainian-news-media-electric-industry.pdf
4242016-01-074ad3de7edfcae1dee973b3e016c9145916591122operation-dustysky-noteshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.07.Operation_DustySky/operation-dustysky-notes.pdf
4252016-01-079b7bf2d6c4a10dac7483c618562e701f42c1dc32Operation DustySky_TLP_WHITEhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.07.Operation_DustySky/Operation%20DustySky_TLP_WHITE.pdf
4262016-01-07f34ec411f0ce10f854e5a8c4ca90c9569217409brigging-compromise.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.07.rigging-compromise/rigging-compromise.html.pdf
4272016-01-142b6972b475a33a12f66e069d490eccf8a5dd2990Cisco_haystack.2016.01.14https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.14_Cisco_Needles_in_a_Haystack/Cisco_haystack.pdf.2016.01.14.pdf
4282016-01-14db5431a5c9b6ac0af2d3d12e00a30b755fe6306fwaterbug-attack-grouphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.14.The.Waterbug.Attack.Group/waterbug-attack-group.pdf
4292016-01-191daa7fd401a37b65528f168a9818289fb214d1d1[CN]_2015.APT.Annual_Reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.19.360_APT_Report/%5BCN%5D_2015.APT.Annual_Report.pdf
4302016-01-1998ee40523e822c8aeeaffdf884edbad833549facnews_长期窃取我国敏感数据29个海外黑客组织被曝光_科技_中国网https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.19.360_APT_Report/news_%E9%95%BF%E6%9C%9F%E7%AA%83%E5%8F%96%E6%88%91%E5%9B%BD%E6%95%8F%E6%84%9F%E6%95%B0%E6%8D%AE%EF%BC%8C29%E4%B8%AA%E6%B5%B7%E5%A4%96%E9%BB%91%E5%AE%A2%E7%BB%84%E7%BB%87%E8%A2%AB%E6%9B%9D%E5%85%89_%E7%A7%91%E6%8A%80_%E4%B8%AD%E5%9B%BD%E7%BD%91.pdf
4312016-01-211cd7c6502a22702e4e05e1708ce2662534cb3e32NetTraveler Spear-Phishing Email Targets Diplomat of Uzbekistan - Palo Alto Networks BlogPalo Alto Networks Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.21.NetTraveler_Uzbekistan/NetTraveler%20Spear-Phishing%20Email%20Targets%20Diplomat%20of%20Uzbekistan%20-%20Palo%20Alto%20Networks%20BlogPalo%20Alto%20Networks%20Blog.pdf
4322016-01-21a1b9d5a178a30f272b3f420a9b2263eac2c73e35nettraveler-spear-phishing-email-targets-diplomat-of-uzbekistanhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.21.NetTraveler_Uzbekistan/nettraveler-spear-phishing-email-targets-diplomat-of-uzbekistan.pdf
4332016-01-24bab618563431881dd8cadb10c02ed3dbfc300526scarlet-mimic-years-long-espionage-targets-minority-activistshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.24_Scarlet_Minic/scarlet-mimic-years-long-espionage-targets-minority-activists.pdf
4342016-01-26a48cb6e2961d49d209196adbac1d95ebe21a5a56BlackEnergy3_WP_012716_1chttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.26.BlackEnergy3/BlackEnergy3_WP_012716_1c.pdf
4352016-01-274b1ca2728629ffb86d2ce7277859e25ed0986f93introducing-hi-zor-rat.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.27.Hi-Zor.RAT/introducing-hi-zor-rat.html.pdf
4362016-01-2868f5083717325073aaa3ef57a371aac9f30ef6fbblackenergy-apt-attacks-in-ukraine-employ-spearphishing-with-word-documentshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.28.BlackEnergy_APT/blackenergy-apt-attacks-in-ukraine-employ-spearphishing-with-word-documents.pdf
4372016-01-29547c04be6d9ef7f6c4df1bc978b101526a9948e4ICS-ALERT-14-281-01Bhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.28.BlackEnergy_APT/reference/ICS-ALERT-14-281-01B.pdf
4382016-01-295ff49fde7468addf7495dc60efc9406bde48504fmalicious-office-files-dropping-kasidet.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.29.Malicious_Office_files_dropping_Kasidet_and_Dridex/malicious-office-files-dropping-kasidet.html.pdf
4392016-01-2985cdd12f93381a1bd387a09fd7098f867582c3adbe2-extraordinary-plugins-siemens-targeting-dev-failshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.28.BlackEnergy_APT/reference/be2-extraordinary-plugins-siemens-targeting-dev-fails.pdf
4402016-01-299de94ac2dac8cd0497a39b89715ce97dcd44859fRight_Sectorhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.28.BlackEnergy_APT/reference/Right_Sector.pdf
4412016-01-29acfe355fe7c189c5e3ef42cdd17edced2f3c362cRFBUhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.28.BlackEnergy_APT/reference/RFBU.pdf
4422016-01-29ba23484ae4d43db724584427b5628802e827dd1cF5SOC_Tinbapore_Attack_January2016_29https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.29.Tinbapore_Attack/F5SOC_Tinbapore_Attack_January2016_29.pdf
4432016-01-29d466adab80818c8f035824081706038eceb8d04fblack_energy_2_3https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.28.BlackEnergy_APT/reference/black_energy_2_3.pdf
4442016-01-29ec503a9fa1206124e53d35eaba1c9d1a0d780202be2-custom-plugins-router-abuse-and-target-profileshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.28.BlackEnergy_APT/reference/be2-custom-plugins-router-abuse-and-target-profiles.pdf
4452016-01-29fdfff8084e578e20f5dd8528b04aa144e87b4719black-ddoshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.01.28.BlackEnergy_APT/reference/black-ddos.pdf
4462016-02-0180a3f2c1c1f9dec104874cb59b14207f35e806bcorganized-cybercrime-big-in-japan-urlzone-now-on-the-scenehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.02.01.URLzone_Team/organized-cybercrime-big-in-japan-urlzone-now-on-the-scene.pdf
4472016-02-0186b8c909afd63ec436249037400dd59428798f1dmassive-admedia-iframe-javascript-infection.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.02.01.Massive_Admedia_Adverting_iFrame_Infection/massive-admedia-iframe-javascript-infection.html.pdf
4482016-02-031f2eee38b44ad3e9fdd50b4845af7b9ec98c244cemissary-trojan-changelog-did-operation-lotus-blossom-cause-it-to-evolvehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.02.03.Emissary_Trojan_Changelog/emissary-trojan-changelog-did-operation-lotus-blossom-cause-it-to-evolve.pdf
4492016-02-04d5e47cedc99e7eafd495003e6bd0b79eb44d4f8dPaloAlto_t9000-advanced-modular-backdoor-uses-complex-anti-analysis-techniques.2016.02.04https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.02.04_PaloAlto_T9000-Advanced-Modular-Backdoor/PaloAlto_t9000-advanced-modular-backdoor-uses-complex-anti-analysis-techniques.2016.02.04.pdf
4502016-02-086cc38d03649b53205ea47fad7672a39480be93abICIT-Brief-Know-Your-Enemies-2.0https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.02.08.Know_Your_Enemies_2.0/ICIT-Brief-Know-Your-Enemies-2.0.pdf
4512016-02-091d8767400696eec436e4e8442643ba50311205dfposeidon-group-a-targeted-attack-boutique-specializing-in-global-cyber-espionagehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.02.09_Poseidon_APT_Boutique/poseidon-group-a-targeted-attack-boutique-specializing-in-global-cyber-espionage.pdf
4522016-02-0992ccadd2258b3a2801458db14b235035d89745df5165https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.02.09_Poseidon_APT_Boutique/5165.pdf
4532016-02-11f9e4f3da9e28916ef7b2493a6aa41768ec683831india-pakistan-cyber-rivalryhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.02.11.Hacktivism_India_vs_Pakistan/india-pakistan-cyber-rivalry.pdf
4542016-02-122e975acb1a64ea43e5079ee6ee89374392813786a-look-into-fysbis-sofacys-linux-backdoorhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.02.12.Fysbis_Sofacy_Linux_Backdoor/a-look-into-fysbis-sofacys-linux-backdoor.pdf
4552016-02-23606f656561781dba6fdef666ece6a0cc24709f01Op_Dust_Storm_Reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.02.23.Operation_Dust_Storm/Op_Dust_Storm_Report.pdf
4562016-02-23cd75c4d77910a44416d71df6ad3164120827b33aDust_Storm_Infographic_v4https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.02.23.Operation_Dust_Storm/Dust_Storm_Infographic_v4.pdf
4572016-02-24058540094f2591abb7de917954dcb886cc1697ceOperation-Blockbuster-Loaders-Installers-and-Uninstallers-Reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.02.24.Operation_Blockbuster/Operation-Blockbuster-Loaders-Installers-and-Uninstallers-Report.pdf
4582016-02-24297c9413278d615cf2ca7ded8a0f3ef10f739cacOperation-Blockbuster-Tools-Reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.02.24.Operation_Blockbuster/Operation-Blockbuster-Tools-Report.pdf
4592016-02-245a5139532e0fdcc76ed9b216d03e33fc27949bc5Operation-Blockbuster-Destructive-Malware-Reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.02.24.Operation_Blockbuster/Operation-Blockbuster-Destructive-Malware-Report.pdf
4602016-02-245f86309e6544994a45536b0450cf1f5adef67296Operation-Blockbuster-RAT-and-Staging-Reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.02.24.Operation_Blockbuster/Operation-Blockbuster-RAT-and-Staging-Report.pdf
4612016-02-245fe924adedb40c296bb2efc63473d10cd0a7d10fOperation-Blockbuster-Reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.02.24.Operation_Blockbuster/Operation-Blockbuster-Report.pdf
4622016-02-24edbc948346ecc8640bed0d82b2a64b0e859996c4Operation-Blockbuster-Ex-Summaryhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.02.24.Operation_Blockbuster/Operation-Blockbuster-Ex-Summary.pdf
4632016-02-2901fda1bcf39d3c6bc88434cca97aff08db32819bTA_Fidelis_Turbo_1602_0https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.02.29.Turbo_Campaign_Derusbi/TA_Fidelis_Turbo_1602_0.pdf
4642016-03-0180bc090bee98e2117da088598e03c075e679e21dproofpoint-operation-transparent-tribe-threat-insight-enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.03.01.Operation_Transparent_Tribe/proofpoint-operation-transparent-tribe-threat-insight-en.pdf
4652016-03-03a65f73c4e0e9d915526cf1c04db5714da4128e13blackenergy-malware-analysishttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.03.03.Shedding_Light_BlackEnergy/blackenergy-malware-analysis.pdf
4662016-03-08713d32d4ae8127bf6561c2a57889d4e52d035a0f[CN]Operation_OnionDoghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.03.08.OnionDog/%5BCN%5DOperation_OnionDog.pdf
4672016-03-08840c190b2e0b88ba64935b320a1b3162d6e264baonion-dog-a-3-year-old-apthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.03.08.OnionDog/onion-dog-a-3-year-old-apt.pdf
4682016-03-08df5f02460e3c9645924403b70b2a38154f58c506APT-C-03-enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.03.08.OnionDog/APT-C-03-en.pdf
4692016-03-098f6d47d7261f87a25b93801d2dc76b52358c6cf6wp-mandiant-matryoshka-mininghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.03.09.Operation_RussianDoll/wp-mandiant-matryoshka-mining.pdf
4702016-03-105be1878cef91b9f144933f3953afeaa2a17fc9f2shifting-tacticshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.03.10.shifting-tactics/shifting-tactics.pdf
4712016-03-1465fc9d406cde5d3458817e0c2da702ed7f7f4eaaproofpoint-threat-insight-carbanak-group-enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.03.14.Carbanak_cybercrime_group/proofpoint-threat-insight-carbanak-group-en.pdf
4722016-03-15e9ab559e5495f776e3ec2ffb46e648fa3b173a5csuckfly-revealing-secret-life-your-code-signing-certificateshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.03.15.Suckfly/suckfly-revealing-secret-life-your-code-signing-certificates.pdf
4732016-03-178aa740814d15ee3e321a86fcab71765e542794abtaiwant-election-targetting.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.03.17.Taiwan-election-targetting/taiwant-election-targetting.html.pdf
4742016-03-17b039fa56126220d8df26a5ad6853a884bd76581ePWC_Taiwan-Presidential-Election-A-Case-Study-on-Thematic-Targeting(Mar-17-2016)https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.03.17.Taiwan-election-targetting/PWC_Taiwan-Presidential-Election-A-Case-Study-on-Thematic-Targeting%28Mar-17-2016%29.pdf
4752016-03-188d21ac4f42533126c4449c10c3ae6f5709d319f2E-ISAC_SANS_Ukraine_DUC_5https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.03.18.Analysis_of_the_Cyber_Attack_on_the_Ukrainian_Power_Grid/E-ISAC_SANS_Ukraine_DUC_5.pdf
4762016-03-233e3f781f7abac6c9472b8aa4775bbed5957b715bIndian-military-personnel-targeted-by-information-theft-campaign-cmajorhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.03.23.Operation_C_Major/Indian-military-personnel-targeted-by-information-theft-campaign-cmajor.pdf
4772016-03-25e336a05540dd41d5eae8633116db965c10329f22unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.03.25.ProjectM/unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribe.pdf
4782016-04-128f9ced352ae35a97e06c0066ee2092b28b5f32d8Platinum feature article - Targeted attacks in South and Southeast Asia April 2016https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.04.12.PLATINUM_Targeted_attacks_in_South_and_Southeast_Asia/Platinum%20feature%20article%20-%20Targeted%20attacks%20in%20South%20and%20Southeast%20Asia%20April%202016.pdf
4792016-04-15b9edbab15b408d13e9e0847827122b76a311b016Detecting-and-Responding-to-Pandas-and-Bears-Christopher-Scott-CrowdStrike-and-Wendi-Whitmore-IBMhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.04.15.pandas_and_bears/Detecting-and-Responding-to-Pandas-and-Bears-Christopher-Scott-CrowdStrike-and-Wendi-Whitmore-IBM.pdf
4802016-04-1883c44bc6c5c139084cb2e734de308eb26a3c357ebetween-hong-kong-and-burmahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.04.18.UP007/between-hong-kong-and-burma.pdf
4812016-04-18b76678677495b10baf122ba531f6957e9dd0b292Between Hong Kong and Burma_ Tracking UP007 and SLServer Espionage Campaigns - The Citizen Labhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.04.18.UP007/Between%20Hong%20Kong%20and%20Burma_%20Tracking%20UP007%20and%20SLServer%20Espionage%20Campaigns%20-%20The%20Citizen%20Lab.pdf
4822016-04-2121e5175d1dd3c2c2b628898401956c7bf5bde38cteaching-an-old-rat-new-trickshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.04.21.Teaching_an_old_RAT_new_tricks/teaching-an-old-rat-new-tricks.pdf
4832016-04-21a119cd353c04867a79f19297b85442b17c8ca590unit42-new-poison-ivy-rat-variant-targets-hong-kong-pro-democracy-activistshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.04.21.New_Poison_Ivy_RAT_Variant_Targets_Hong_Kong/unit42-new-poison-ivy-rat-variant-targets-hong-kong-pro-democracy-activists.pdf
4842016-04-22f6b48254bf81462009a584a052101dfb6df596ceThe.Ghost.Dragon.-.Cylancehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.04.22.the-ghost-dragon/The.Ghost.Dragon.-.Cylance.pdf
4852016-04-2619a24110ffa0758f2a47a48d5bedb2d47851db29Cyber warfare_ Iran opens a new front - FThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.04.26.Iran_Opens_a_New_Front/Cyber%20warfare_%20Iran%20opens%20a%20new%20front%20-%20FT.pdf
4862016-04-266ac77c488da30f6bd13cdac0d70ce285148a3eecrecent-poison-ivhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.04.26.New_Poison_Ivy_Activity_Targeting_Myanmar_Asian_Countries/recent-poison-iv.pdf
4872016-04-2687d857d7ce1ab46f4ad8808067b2f7cd43ac8fb2New Poison Ivy Activity Targeting Myanmar, Asian Countrieshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.04.26.New_Poison_Ivy_Activity_Targeting_Myanmar_Asian_Countries/New%20Poison%20Ivy%20Activity%20Targeting%20Myanmar%2C%20Asian%20Countries.pdf
4882016-04-27f110830417b2cd564f2f0e00eedb20e43ea20d50Freezer Paper around Free Meat - Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.04.27.Repackaging_Open_Source_BeEF/Freezer%20Paper%20around%20Free%20Meat%20-%20Securelist.pdf
4892016-05-027a436c3b70a5cb5dcbc0112a8b2858e5ce3cefe4goznym-malwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.05.02.GOZNYM_MALWARE/goznym-malware.pdf
4902016-05-02a5b61e0e469c7dcdb6e359c1a03d927f35c43bb8prince-of-persia-infy-malware-active-in-decade-of-targeted-attackshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.05.02.Prince_of_Persia_Infy_Malware/prince-of-persia-infy-malware-active-in-decade-of-targeted-attacks.pdf
4912016-05-056a5001adf44feb6d08eb65ca04370476188965cdreport_jaku_analysis_of_botnet_campaign_en_0https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.05.05_Jaku_botnet_campaign/report_jaku_analysis_of_botnet_campaign_en_0.pdf
4922016-05-0631e6f8ce651cb77a2cf4250c7150e35aee99e76fexploring-cve-2015-2545-and-its-users.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.05.06_Exploring_CVE-2015-2545/exploring-cve-2015-2545-and-its-users.html.pdf
4932016-05-09ad88223032e7cb6b373a458e6472870a7ca69e372016_005_001_454247https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.05.09_ICS_Threat_Analysis/2016_005_001_454247.pdf
4942016-05-100b125a7674213282cbcfd782d7c8d3fdf0ac1e3dtinyPOS_tinyloaderhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.05.10.tinyPOS_tinyloader/tinyPOS_tinyloader.pdf
4952016-05-10d491a0602abb0061170b4170a0b74a3b71062a74tinypos-abaddonpos-ties-to-tinyloaderhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.05.10.tinyPOS_tinyloader/tinypos-abaddonpos-ties-to-tinyloader.pdf
4962016-05-17599a53807cd15839de2fcbc8e8a7ea75152a2383indian-organizations-targeted-suckfly-attackshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.05.17.Indian_organizations_targeted_in_Suckfly_attacks/indian-organizations-targeted-suckfly-attacks.pdf
4972016-05-17ffa66796bd7c7f077c31285e6563ccb522b7e9b1fox-it_mofang_threatreport_tlp-whitehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.05.17.Mofang/fox-it_mofang_threatreport_tlp-white.pdf
4982016-05-185938181ed1aec8281f229581f38f37f78eb24821Operation-Groundbaithttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.05.18.Operation_Groundbait/Operation-Groundbait.pdf
4992016-05-2209f34e4bf6d1b7503863ac6ae0c0a010e605a3b0targeted_attacksaga.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.05.22.Targeted_Attacks_Against_Banks_in_Middle_East/targeted_attacksaga.html.pdf
5002016-05-22d31c752ecc9b9369d410b5689060365bcbb65a42operation-ke3chang-resurfaces-with-new-tidepool-malwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.05.22.Operation_Ke3chang_Resurfaces_With_New_TidePool_Malware/operation-ke3chang-resurfaces-with-new-tidepool-malware.pdf
5012016-05-23dbee63b0f8cd29139b4d12b867e3a80de139c0dfReport_Ruag-Espionage-Casehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.05.23.APT_Case_RUAG/Report_Ruag-Espionage-Case.pdf
5022016-05-24d0791b89c61a793f6d07d7cccc098be64f4f3c73unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanismhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.05.24.New_Wekby_Attacks/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism.pdf
5032016-05-25d79781d4bad287b82dfa7e8cd6b3481c12df2c65cve-2015-2545-overview-of-current-threatshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.05.25.CVE-2015-2545/cve-2015-2545-overview-of-current-threats.pdf
5042016-05-26ff756612875a76ff69cdf480637f35ba45d94313the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoorhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.05.26.OilRig_Campaign/the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoor.pdf
5052016-05-278ed7f4f236b73e01de575bf7716453bcfcba7f91ixeshe-derivative-iheate-targets-users-americahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.05.27.IXESHE_Derivative_IHEATE_Targets_Users_in_America/ixeshe-derivative-iheate-targets-users-america.pdf
5062016-06-024251b34749fd27da6bd56898978f6e058da24c89TrendLabs Security Intelligence BlogFastPOS_ Quick and Easy Credit Card Theft - TrendLabs Security Intelligence Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.06.02.fastpos-quick-and-easy-credit-card-theft/TrendLabs%20Security%20Intelligence%20BlogFastPOS_%20Quick%20and%20Easy%20Credit%20Card%20Theft%20-%20TrendLabs%20Security%20Intelligence%20Blog.pdf
5072016-06-02e7b813995e0231585bdcb88b80a61b8278967292fastPOS-quick-and-easy-credit-card-theft (1)https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.06.02.fastpos-quick-and-easy-credit-card-theft/fastPOS-quick-and-easy-credit-card-theft%20%281%29.pdf
5082016-06-09a00dc576f03496351c6ec2989aac2a26891c4cffOperation-DustySky2_-6.2016_TLP_Whitehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.06.09.Operation_DustySky_II/Operation-DustySky2_-6.2016_TLP_White.pdf
5092016-06-162542ff73863727ad3151ca1feadc01d18024f9a3cf006cb4-316e-11e6-8ff7-7b6c1998b7a0_story.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.06.16.Threat_Group-4127_Targets_Hillary_Clinton_Presidential_Campaign/cf006cb4-316e-11e6-8ff7-7b6c1998b7a0_story.html.pdf
5102016-06-164266eae02e5de05ace3dd04bcc32516f087fb6a7bears-midst-intrusion-democratic-national-committeehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.06.16.DNC/bears-midst-intrusion-democratic-national-committee.pdf
5112016-06-16f3781f5c5f8fec7c251964019fe0fbf4465a020bthreat-group-4127-targets-hillary-clinton-presidential-campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.06.16.Threat_Group-4127_Targets_Hillary_Clinton_Presidential_Campaign/threat-group-4127-targets-hillary-clinton-presidential-campaign.pdf
5122016-06-16fece91ff2b729e25f30229b2c9fb43e4a4089dc3Bears in the Midst_ Intrusion into the Democratic National Committee »https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.06.16.DNC/Bears%20in%20the%20Midst_%20Intrusion%20into%20the%20Democratic%20National%20Committee%20%C2%BB.pdf
5132016-06-173342a5172b2ecde86762dd35f61057006dbb7448Operation Daybreakhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.06.17.Operation_Daybreak/Operation%20Daybreak.pdf
5142016-06-21572942e17d84b8ba92393deae0689d96f71a02bbrpt-china-espionagehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.06.21.Redline_Drawn_China_Recalculates_Its_Use_of_Cyber_Espionage/rpt-china-espionage.pdf
5152016-06-2198985054ab8d3b6c232132f1957fefc4ba01c7a6visiting_the_bear_den_recon_2016_calvet_campos_dupuy-1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.06.21.visiting_the_bear_den_recon_2016_calvet_campos_dupuy/visiting_the_bear_den_recon_2016_calvet_campos_dupuy-1.pdf
5162016-06-21a2b5632453fc7c70f07c1d331c54c610fa64c146the-curious-case-of-an-unknown-trojan-targeting-german-speaking-usershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.06.21.Unknown_Trojan_Targeting_German_Speaking_Users/the-curious-case-of-an-unknown-trojan-targeting-german-speaking-users.pdf
5172016-06-21ffa89bc1898a8f9569a69480d8f95ca59220d511the-curious-case-of-an-unknown-trojan-targeting-german-speaking-users_2https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.06.21.Unknown_Trojan_Targeting_German_Speaking_Users/the-curious-case-of-an-unknown-trojan-targeting-german-speaking-users_2.pdf
5182016-06-23ef8b8170c53ea9a06f702ff07684ec51e0bc8a40unit42-tracking-elirks-variants-in-japan-similarities-to-previous-attackshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.06.23.Tracking_Elirks_Variants_in_Japan/unit42-tracking-elirks-variants-in-japan-similarities-to-previous-attacks.pdf
5192016-06-2657b1fe8ffc1077abb782decf7a1a902338d17d8fthe-state-of-the-esilelotus-blossom-campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.06.26.The_State_of_the_ESILE_Lotus_Blossom_Campaign/the-state-of-the-esilelotus-blossom-campaign.pdf
5202016-06-266dec5ce81f1dbdbd7af97b4d5b1013422fc96534threat-update-nigerian-cybercriminals-target-high-impact-indian-industries-via-ponyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.06.26.Nigerian_Cybercriminals_Target_High_Impact_Industries_in_India/threat-update-nigerian-cybercriminals-target-high-impact-indian-industries-via-pony.pdf
5212016-06-2812a79e8f73c77e470971f742f420a4f2f604b02eunit42-prince-of-persia-game-overhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.06.28.prince-of-persia-game-over/unit42-prince-of-persia-game-over.pdf
5222016-06-284c492341f41d25aa5caff7ef05f20a75a77828earef_researchers-disrupt-iranian-cyberespionage-campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.06.28.prince-of-persia-game-over/ref_researchers-disrupt-iranian-cyberespionage-campaign.pdf
5232016-06-28a7d161c9d48d00ad93a8e6ad2a907e35619d59f520160628ac-ir_researchhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.06.28.Attack_Tool_Investigation/20160628ac-ir_research.pdf
5242016-06-30e23eeb26d7468c2ff516ac170bfea387aa75d396asruex-malware-infecting-through-shortcut-files.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.06.30.Asruex/asruex-malware-infecting-through-shortcut-files.html.pdf
5252016-07-016289dff2cbd2750c76517007989483922179fa40Bitdefender-Whitepaper-PAC-A4-en-EN1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.07.01.Bitdefender_Pacifier_APT/Bitdefender-Whitepaper-PAC-A4-en-EN1.pdf
5262016-07-018fdd96ab4d0e95802cac838cb8221b93da24d1f2espionage-toolkit-targeting-central-eastern-europe-uncoveredhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.07.01.SBDH_toolkit_targeting_Central_and_Eastern_Europe/espionage-toolkit-targeting-central-eastern-europe-uncovered.pdf
5272016-07-0338547a8c4e19d82f9ea9424f33b87de8d3b48fb6HummingBad-Research-report_FINAL-62916https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.07.03_From_HummingBad_to_Worse/HummingBad-Research-report_FINAL-62916.pdf
5282016-07-07727b9ed2242c7c62e18b721db3678c5d29df42e6Unveiling-Patchworkhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.07.07.UNVEILING_PATCHWORK/Unveiling-Patchwork.pdf
5292016-07-07c931257dcbda322fa1a28021d3454b1110aec308nettraveler-apt-targets-russian-european-interestshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.07.07.nettraveler-apt-targets-russian-european-interests/nettraveler-apt-targets-russian-european-interests.pdf
5302016-07-08ddbce0dd2907394801bd17ce8ecaf50ac0401ed2The Dropping Elephant actor - Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.07.08.The_Dropping_Elephant/The%20Dropping%20Elephant%20actor%20-%20Securelist.pdf
5312016-07-12a2d672d0e620a3060792ca67fecc5bfe2720df50nanhaishu_whitepaperhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.07.12.NanHaiShu_RATing_the_South_China_Sea/nanhaishu_whitepaper.pdf
5322016-07-1334a7432982599a2adcdf264e58e7a593213e1a92SFG_ Furtim's Parenthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.07.13.State-Sponsored_SCADA_Malware_targeting_European_Energy_Companies/SFG_%20Furtim%27s%20Parent.pdf
5332016-07-13807e0c662c79a8f4095d4934e004846d711d578esfg-furtims-parenthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.07.13.State-Sponsored_SCADA_Malware_targeting_European_Energy_Companies/sfg-furtims-parent.pdf
5342016-07-13b928b0a2e0c93ccfbb1590bc0f4460a9389089ceFurtim_ The Ultra-Cautious Malwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.07.13.State-Sponsored_SCADA_Malware_targeting_European_Energy_Companies/Furtim_%20The%20Ultra-Cautious%20Malware.pdf
5352016-07-2121b8768b4a631b50c13f20d5668f12e237835874(Chinese)rmshixdAPT-C-15-20160630https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.07.21.Sphinx_Targeted_cyber-attack_in_the_Middle_East/%28Chinese%29rmshixdAPT-C-15-20160630.pdf
5362016-07-21f47efbaa0ca27a61c1eb8801e50393ff2fc991a5tta1-f04_hide-and-seek-how-threat-actors-respond-in-the-face-of-public-exposurehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.07.21.Hide_and_Seek/tta1-f04_hide-and-seek-how-threat-actors-respond-in-the-face-of-public-exposure.pdf
5372016-07-21f6e55a0b55a2f10bd2de7c9b37882faf4b8fd568rmsxden20160721https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.07.21.Sphinx_Targeted_cyber-attack_in_the_Middle_East/rmsxden20160721.pdf
5382016-07-2637563d47952e48cc0223c8d8d1b84a24ba1f83b9unit-42-attack-delivers-9002-trojan-through-google-drivehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.07.26.Attack_Delivers_9002_Trojan_Through_Google_Drive/unit-42-attack-delivers-9002-trojan-through-google-drive.pdf
5392016-07-28172d40de660b80ca939daaacc2fafc6222768e71ICIT-Brief-China-Espionage-Dynastyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.07.28.China_Espionage_Dynasty/ICIT-Brief-China-Espionage-Dynasty.pdf
5402016-08-023939d4a4048e0ad0e4416e32763c8f69dc83af56Group5_ Syria and the Iranian Connection - The Citizen Labhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.08.02.group5-syria/Group5_%20Syria%20and%20the%20Iranian%20Connection%20-%20The%20Citizen%20Lab.pdf
5412016-08-02514d58015cd8abe0f9d65a85100dded872d707f8group5-syriahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.08.02.group5-syria/group5-syria.pdf
5422016-08-03cf6fad700146b469d54f47c1541a84bb0dc08bc6i-got-a-letter-from-the-governmenthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.08.03.i-got-a-letter-from-the-government/i-got-a-letter-from-the-government.pdf
5432016-08-04312cecf6f6b163671637a87ce08b2d6645c0c58eRunning for Office_ Russian APT Toolkits Revealedhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.08.04.russian-apt-toolkits/Running%20for%20Office_%20Russian%20APT%20Toolkits%20Revealed.pdf
5442016-08-061e76a31e0437eaf70fd8cb3408a6da8f07b76deb[CN]_APT-C-09_reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.08.06.APT-C-09/%5BCN%5D_APT-C-09_report.pdf
5452016-08-06fc24eb10e1af16744360738351528a688100844f[CN]_APT-C-09https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.08.06.APT-C-09/%5BCN%5D_APT-C-09.pdf
5462016-08-0720e3289035437c6b1465bb8b16da9b5795106a9astrider-cyberespionage-group-turns-eye-sauron-targetshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.08.07.Strider_Cyberespionage_group_turns_eye_of_Sauron_on_targets/strider-cyberespionage-group-turns-eye-sauron-targets.pdf
5472016-08-07a7a8df94dc6cbbd33eadbb9e39538aa6fe78e798Symantec_Remsec_IOCshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.08.07.Strider_Cyberespionage_group_turns_eye_of_Sauron_on_targets/Symantec_Remsec_IOCs.pdf
5482016-08-08684be4d1e962fbc2514e79dae62b9667b6fccc49ProjectSauron_ top level cyber-espionage platform covertly extracts encrypted government comms - Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.08.08.ProjectSauron/ProjectSauron_%20top%20level%20cyber-espionage%20platform%20covertly%20extracts%20encrypted%20government%20comms%20-%20Securelist.pdf
5492016-08-086c8608b8efbca2ab69d8406d7d561e67cd7f9df8The-ProjectSauron-APT_Technical_Analysis_KLhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.08.08.ProjectSauron/The-ProjectSauron-APT_Technical_Analysis_KL.pdf
5502016-08-08a510a638576efbbd0eb7b5fa7dbce838ddde290bThe-ProjectSauron-APT_research_KLhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.08.08.ProjectSauron/The-ProjectSauron-APT_research_KL.pdf
5512016-08-08b910f06ecd66d0a297e2043369b82a29cf770eeeforcepoint-security-labs-monsoon-analysis-reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.08.08.monsoon-analysis-apt-campaign/forcepoint-security-labs-monsoon-analysis-report.pdf
5522016-08-08bf2d4ed4b28658d9cb3d5f8787b264395d729961The-ProjectSauron-APT_IOCs_KLhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.08.08.ProjectSauron/The-ProjectSauron-APT_IOCs_KL.pdf
5532016-08-1112503011cfce27ed282658baa893fa8791d27965us-16-Guarnieri-Anderson-Iran-And-The-Soft-War-For-Internet-Dominance-paperhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.08.11.Iran-And-The-Soft-War-For-Internet-Dominance/us-16-Guarnieri-Anderson-Iran-And-The-Soft-War-For-Internet-Dominance-paper.pdf
5542016-08-1648fef28b947c6068d84cc19ce4148036da4543c7unit42-aveo-malware-family-targets-japanese-speaking-usershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.08.16.aveo-malware-family-targets-japanese/unit42-aveo-malware-family-targets-japanese-speaking-users.pdf
5552016-08-17f562ca8ebe092d83ce673dee5343f728da333782Operation Ghoul_ targeted attacks on industrial and engineering organizations - Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.08.17_operation-ghoul/Operation%20Ghoul_%20targeted%20attacks%20on%20industrial%20and%20engineering%20organizations%20-%20Securelist.pdf
5562016-08-191cb7f7b4f59a8f06892dfb692be6adf5366c1488Russian_Cyber_Operations_On_Steroidshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.08.19.fancy-bear-anti-doping-agency-phishing/Russian_Cyber_Operations_On_Steroids.pdf
5572016-08-24e7b604381d8c80c06acf01daef346539f9cc8e1emillion-dollar-dissident-iphone-zero-day-nso-group-uaehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.08.24.million-dollar-dissident-iphone-zero-day-nso-group-uae/million-dollar-dissident-iphone-zero-day-nso-group-uae.pdf
5582016-08-2599f8d948b133c10f03dc642ffdefc72ec6ef4cf5lookout-pegasus-technical-analysishttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.08.25.lookout-pegasus-technical-analysis/lookout-pegasus-technical-analysis.pdf
5592016-09-0158b20802df0d91b67bc29bce5ccb50a90b723cd0human-rights-impersonation-malwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.09.01.human-rights-impersonation-malware/human-rights-impersonation-malware.pdf
5602016-09-0636cc8f9d42465b2ac2681772862e21ecb2eaa137Buckeye.cyberespionage.group.shifts.gaze.from.US.to.Hong.Kong.-.Symantechttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.09.06.buckeye-cyberespionage-group-shifts-gaze-us-hong-kong/Buckeye.cyberespionage.group.shifts.gaze.from.US.to.Hong.Kong.-.Symantec.pdf
5612016-09-142f19f28899cc89c7b74a4b9c646a1b0d6d59e3dfmile-tea-cyber-espionage-campaign-targets-asia-pacific-businesses-and-government-agencieshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.09.14.MILE_TEA/mile-tea-cyber-espionage-campaign-targets-asia-pacific-businesses-and-government-agencies.pdf
5622016-09-18528e04eea263ae76084664f0c77f51ab500f50b3Hunting Libyan Scorpions _ Cyberkov _ Professional Cybersecurity & Consultation Firm_https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.09.18.Hunting-Libyan-Scorpions/Hunting%20Libyan%20Scorpions%20_%20Cyberkov%20_%20Professional%20Cybersecurity%20%26%20Consultation%20Firm_.pdf
5632016-09-189030bce0306febd7e94fd047d480512583889389Hunting-Libyan-Scorpions-ENhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.09.18.Hunting-Libyan-Scorpions/Hunting-Libyan-Scorpions-EN.pdf
5642016-09-18a46df8cb683eda75ffe801ea611ae44201f1bc71Hunting-Libyan-Scorpions-ARhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.09.18.Hunting-Libyan-Scorpions/Hunting-Libyan-Scorpions-AR.pdf
5652016-09-263f02cc3588ec839349ff8abd3eaa358f4f286580unit42-sofacys-komplex-os-x-trojanhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.09.26_Sofacy_Komplex_OSX_Trojan/unit42-sofacys-komplex-os-x-trojan.pdf
5662016-09-2885b30d108bfd5951bb93730c2656346a967cbe21Confucius Says...Malware Families Get Further By Abusing Legitimate Websiteshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.09.28.Confucius_Says/Confucius%20Says...Malware%20Families%20Get%20Further%20By%20Abusing%20Legitimate%20Websites.pdf
5672016-09-2886c06d806c6a2f7fc9e863098cbe616aab222773Russia Hacks Bellingcat MH17 Investigation _ ThreatConnecthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.09.28.russia-hacks-bellingcat-mh17-investigation/Russia%20Hacks%20Bellingcat%20MH17%20Investigation%20_%20ThreatConnect.pdf
5682016-09-297b989c73b32583b752456c92556d654d3b6ce1b8CS_organisation_CHINA_092016 (1)https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.09.29.China_and_Cyber_Attitudes_Strategies_Organisation/CS_organisation_CHINA_092016%20%281%29.pdf
5692016-10-03b0a928c9b7bb1c8dfb4da791e5e928550d521478On the StrongPity Waterhole Attacks - Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.10.03.StrongPity/On%20the%20StrongPity%20Waterhole%20Attacks%20-%20Securelist.pdf
5702016-10-0512ecd2809c35c574672cb2b1b22323aa9de1d69aBartholomew-GuerreroSaade-VB2016https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.10.05_Wave_Your_False_flag/Bartholomew-GuerreroSaade-VB2016.pdf
5712016-10-164812e3e7c965cf14148feb5c4b2cb583612972a8threatconnect-discovers-chinese-apt-activity-in-europehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.10.16.A_Tale_of_Two_Targets/threatconnect-discovers-chinese-apt-activity-in-europe.pdf
5722016-10-20aa59479dccb863926ace7d5a6d87e356eb9dad4aeset-sednit-part1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.10.20.En_Route_with_Sednit/eset-sednit-part1.pdf
5732016-10-2556fa70aae3ab16acfba094af1896d186038ad134Houdini.s.Magic.Reappearance.-.Palo.Alto.Networks.Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.10.25.Houdini_Magic_Reappearance/Houdini.s.Magic.Reappearance.-.Palo.Alto.Networks.Blog.pdf
5742016-10-256f1dfb7fc2367f5787b076deb44f37704a682caaeset-sednit-part-2https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.10.25.Lifting_the_lid_on_Sednit/eset-sednit-part-2.pdf
5752016-10-2619e5a53b85457ad6aef593e18e190a7d6bcaa704moonlight-middle-east-targeted-attackshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.10.26.Moonlight_Middle_East/moonlight-middle-east-targeted-attacks.pdf
5762016-10-272cd04b3b878180782e8467c2cbe69d301a0d98eceset-sednit-part3https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.10.27.En_Route_Part3/eset-sednit-part3.pdf
5772016-10-27bd52c0809e379a7dabdb35fcbb07d077f10a6edcBLACKGEAR.Espionage.Campaign.Evolves.-.Trend.Microhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.10.27.BLACKGEAR_Espionage_Campaign_Evolves/BLACKGEAR.Espionage.Campaign.Evolves.-.Trend.Micro.pdf
5782016-10-27c7f1af600ea574490820cb2d86c1585a4908623dTrendLabs Security Intelligence BlogBLACKGEAR Espionage Campaign Evolves, Adds Japan To Target List - TrendLabs Security Intelligence Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.10.27.BLACKGEAR_Espionage_Campaign_Evolves/TrendLabs%20Security%20Intelligence%20BlogBLACKGEAR%20Espionage%20Campaign%20Evolves%2C%20Adds%20Japan%20To%20Target%20List%20-%20TrendLabs%20Security%20Intelligence%20Blog.pdf
5792016-10-313773109fc3b0607f90b13d91f3c57da2b6aa618dEmissary Trojan Changelog_ Did Operation Lotus Blossom Cause It to Evolve_ - Palo Alto Networks Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.10.31.Emissary_Trojan_Changelog/Emissary%20Trojan%20Changelog_%20Did%20Operation%20Lotus%20Blossom%20Cause%20It%20to%20Evolve_%20-%20Palo%20Alto%20Networks%20Blog.pdf
5802016-10-3172b119031cde0a78ff6f778c6b8670f4d1f86b16emissary-trojan-changelog-did-operation-lotus-blossom-cause-it-to-evolvehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.10.31.Emissary_Trojan_Changelog/emissary-trojan-changelog-did-operation-lotus-blossom-cause-it-to-evolve.pdf
5812016-11-036a6ad533b71fd64fc9dd4948e920a0992f637302ukraine-report-when-the-lights-went-outhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.11.03.Ukraine_Cybersecurity_Threat_Briefing/ukraine-report-when-the-lights-went-out.pdf
5822016-11-090640ebb4e8649c9ae93cb0bba624deb30bbebc8eDown the H-W0rm Hole with Houdini's RAT - Threat Geekhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.11.09_down-the-h-w0rm-hole-with-houdinis-rat/Down%20the%20H-W0rm%20Hole%20with%20Houdini%27s%20RAT%20-%20Threat%20Geek.pdf
5832016-11-096c7dc24ad7b53bb6cf0d606ba7537b7360f9b727down-the-h-w0rm-hole-with-houdinis-rat.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.11.09_down-the-h-w0rm-hole-with-houdinis-rat/down-the-h-w0rm-hole-with-houdinis-rat.html.pdf
5842016-11-22ef9fb290ad2bef98cd50f966dd8228714d0f68a0tropic-trooper-targets-taiwanesehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.11.22.tropic-trooper-targets-taiwanese-government-and-fossil-fuel-provider-with-poison-ivy/tropic-trooper-targets-taiwanese.pdf
5852016-11-30c1bcbdc216cbfe9228a31997a2d5da6abdb27699nic-cyber-security-themed-spear-phishing-target-indian-government-organizationshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.11.30.nic-cyber-security-themed/nic-cyber-security-themed-spear-phishing-target-indian-government-organizations.pdf
5862016-12-13cce1f08c2f7f6a358b948a78a99be0f833563795rise-telebots-analyzing-disruptive-killdisk-attackshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.12.13.rise-telebots-analyzing-disruptive-killdisk-attacks/rise-telebots-analyzing-disruptive-killdisk-attacks.pdf
5872016-12-15d784a99302475c2a1bcc39fe42097d7d1908acc7Microsoft_Security_Intelligence_Report_Volume_21_Englishhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2016/2016.12.15.PROMETHIUM_and_NEODYMIUM/Microsoft_Security_Intelligence_Report_Volume_21_English.pdf
5882017-01-056cde19e1a9cff481845a16d962f1807c03d8fa1fIranian Fileless Attack Infiltrates Israeli Organizationshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.01.05.Iranian_Threat_Agent_OilRig/Iranian%20Fileless%20Attack%20Infiltrates%20Israeli%20Organizations.pdf
5892017-01-05bc1f173e272722c900afb3bbba0c7bd44f4c9a19Iranian Threat Agent OilRig Delivers Digitally Signed Malware, Impersonates University of Oxford _ ClearSky Cybersecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.01.05.Iranian_Threat_Agent_OilRig/Iranian%20Threat%20Agent%20OilRig%20Delivers%20Digitally%20Signed%20Malware%2C%20Impersonates%20University%20of%20Oxford%20_%20ClearSky%20Cybersecurity.pdf
5902017-01-09f4216af597c0aa584753043e1c6821a3fa668137unit42-second-wave-shamoon-2-attacks-identifiedhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.01.09.second-wave-shamoon-2-attacks-identified/unit42-second-wave-shamoon-2-attacks-identified.pdf
5912017-01-11f5eb271671c7a2def034329d77843ac296266b0cAPT28-Center-of-Storm-2017https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.01.11.apt28_at_the_center/APT28-Center-of-Storm-2017.pdf
5922017-01-123bd94e429da7b43099a2d041deb5b68e6d426ac3The “EyePyramid” Attacks - Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.01.12.EyePyramid.attacks/The%20%E2%80%9CEyePyramid%E2%80%9D%20Attacks%20-%20Securelist.pdf
5932017-01-15010660f48c09725d25425216de0d985a62837ff2[tr1adx]_ Intelhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.01.15.Bear_Spotting_Vol.1/%5Btr1adx%5D_%20Intel.pdf
5942017-01-18d24be75959478224c4010d195a3db784a9dc56caOperation Grand Marshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.01.18.Operation-Grand-Mars/Operation%20Grand%20Mars.pdf
5952017-01-191bc8aa72a26fa5236943b01a6a34704417419332Kashmir_Protest_Themedhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.01.19.uri-terror-attack/Kashmir_Protest_Themed.pdf
5962017-01-2548d86b7a5c92c445dc1903dcf9f20fceb9f49ca5etecting-threat-actors-in-recent-german-industrial-attacks-with-windows-defender-atphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.01.25.german-industrial-attacks/etecting-threat-actors-in-recent-german-industrial-attacks-with-windows-defender-atp.pdf
5972017-01-30b95f46cb8ba0cd021950a6afcd2599ce9ba370cdunit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governmentshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.01.30.downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments.pdf
5982017-02-020963171828af8106b91aab81cb9ed2006275f0e5APT-targets-russia-belarus-zerot-plugxhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.02.APT_Targets_Russia_and_Belarus_with_ZeroT_and_PlugX/APT-targets-russia-belarus-zerot-plugx.pdf
5992017-02-0374962bac9526b55dfcd0c6690b2980f7483e587bkingslayer-a-supply-chain-attackhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.03.kingslayer-a-supply-chain-attack/kingslayer-a-supply-chain-attack.pdf
6002017-02-03deeba3d9eb8775ebcbd74616bf4dce178fbf8b2fSeveral Polish banks hacked, information stolen by unknown attackers BadCyberhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.03.several-polish-banks-hacked/Several%20Polish%20banks%20hacked%2C%20information%20stolen%20by%20unknown%20attackers%20%E2%80%93%20BadCyber.pdf
6012017-02-107f8c3d1d34755bd52f850bad0bc2dc1db6783661AR-17-20045_Enhanced_Analysis_of_GRIZZLY_STEPPE_Activityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.10.Enhanced_Analysis_of_GRIZZLY_STEPPE/AR-17-20045_Enhanced_Analysis_of_GRIZZLY_STEPPE_Activity.pdf
6022017-02-10bb761cada9851eb8e5c157b11dabf4f79bb58067Cyber_Attack_Targeting_Indian_Navyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.10.cyber-attack-targeting-indian-navys-submarine-warship-manufacturer/Cyber_Attack_Targeting_Indian_Navy.pdf
6032017-02-129b1e2f1d16bae995ad260ee499f0836c601807eelazarus-watering-hole-attacks.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.12.lazarus-watering-hole-attacks/lazarus-watering-hole-attacks.html.pdf
6042017-02-140cf03f3cf71ebd7edc4aa9996fa43138624bd302Operation Kingphish_ Uncovering a Campaign of Cyber Attacks against Civil Society in Qatar and… Amnesty Insights Mediumhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.14.Operation_Kingphish/Operation%20Kingphish_%20Uncovering%20a%20Campaign%20of%20Cyber%20Attacks%20against%20Civil%20Society%20in%20Qatar%20and%E2%80%A6%20%E2%80%93%20Amnesty%20Insights%20%E2%80%93%20Medium.pdf
6052017-02-151997a46afb1d791a45ff71cce472b5c90b4631afthe-full-shamoon-how-the-devastating-malware-was-inserted-into-networkshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.15.the-full-shamoon/the-full-shamoon-how-the-devastating-malware-was-inserted-into-networks.pdf
6062017-02-155dc3430cb566bde8ba4dbd49b3b209b0a435e30dunit42-magic-hound-campaign-attacks-saudi-targetshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.15.magic-hound-campaign/unit42-magic-hound-campaign-attacks-saudi-targets.pdf
6072017-02-156eaba42a64f8c2e1868e6edf441fffe082a4959dDeep Dive on the DragonOK Rambo Backdoor _ Morphick Cyber Securityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.15.deep-dive-dragonok-rambo-backdoor/Deep%20Dive%20on%20the%20DragonOK%20Rambo%20Backdoor%20_%20Morphick%20Cyber%20Security.pdf
6082017-02-15b9a73685d0d59c0b8103e2890250b550c7ac2b96iranian-pupyrat-bites-middle-eastern-organizationshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.15.iranian-pupyrat-bites-middle-eastern-organizations/iranian-pupyrat-bites-middle-eastern-organizations.pdf
6092017-02-16a6c62ce04ae30424f380773023950d94455fc349Technical analysis of recent attacks against Polish banks BadCyberhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.16.Technical_analysis_Polish_banks/Technical%20analysis%20of%20recent%20attacks%20against%20Polish%20banks%20%E2%80%93%20BadCyber.pdf
6102017-02-1762d2eb6112d88baf0b14302e12e31425265ccb74chches-malware--93d6.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.17.chches-malware/chches-malware--93d6.html.pdf
6112017-02-209072321a018c8810d71002113c3b3f4a0873e676lazarus-false-flag-malware.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.20.Lazarus_False_Flag_Malware/lazarus-false-flag-malware.html.pdf
6122017-02-219bc78d8d0e54e6bed8370304f3ce4c81826f0edaadditional-insights-shamoon2https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.21.Additional_Insights_on_Shamoon2/additional-insights-shamoon2.pdf
6132017-02-2215a0e44be3330d20b64852a04cad695dc699bd8cspear_phishing_techn.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.22.Spear_Phishing_Mongolian_Government/spear_phishing_techn.html.pdf
6142017-02-23d206b485a42c611ed9fe6a0b1a3ed086e954bd30Bitdefender-Whitepaper-APT-Mac-A4-en-EN-webhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.23.APT28_Mac_OS_X_Payload/Bitdefender-Whitepaper-APT-Mac-A4-en-EN-web.pdf
6152017-02-277c7567206d222546376079a19c07b615d9538cf3The Gamaredon Group Toolset Evolution - Palo Alto Networks Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.27.gamaredon-group-toolset-evolution/The%20Gamaredon%20Group%20Toolset%20Evolution%20-%20Palo%20Alto%20Networks%20Blog.pdf
6162017-02-28841e63f842029a2a45047edee7312cae9a3e1353AtomBombing_ Brand New Code Injection for Windows - Breaking Malwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.28.dridexs-cold-war-enter-atombombing/AtomBombing_%20Brand%20New%20Code%20Injection%20for%20Windows%20-%20Breaking%20Malware.pdf
6172017-02-288b3ebc21903c070ac70264bd8dd7ecd681e9b78eDridex's Cold War_ Enter AtomBombinghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.28.dridexs-cold-war-enter-atombombing/Dridex%27s%20Cold%20War_%20Enter%20AtomBombing.pdf
6182017-02-288ffce0fd5ec946cbb5da03a5a0f2796525aa600aAtomBombing_ A Code Injection that Bypasses Current Security Solutionshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.02.28.dridexs-cold-war-enter-atombombing/AtomBombing_%20A%20Code%20Injection%20that%20Bypasses%20Current%20Security%20Solutions.pdf
6192017-03-0659a92a3bd0a359bb6353578ab1a241fc50529225Report_Shamoon_StoneDrill_finalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.03.06.from-shamoon-to-stonedrill/Report_Shamoon_StoneDrill_final.pdf
6202017-03-08f8e850c0d5b3db84e2271da13afb043d2c55819dTargeted Attack Campaigns with Multi-Variate Malware Observed in the Cloud - Netskopehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.03.08.Targeted_Attack_Campaigns/Targeted%20Attack%20Campaigns%20with%20Multi-Variate%20Malware%20Observed%20in%20the%20Cloud%20-%20Netskope.pdf
6212017-03-1473e541a765c5634ef9beb3ff02cbce03387eb322Operation_Electric_Powderhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.03.14.Operation_Electric_Powder/Operation_Electric_Powder.pdf
6222017-03-1561d6c5357eb7d3f894947eca04307396beb7d77fenglish-report-of-fhappi-freehostinghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.03.15.FHAPPI_Campaign/english-report-of-fhappi-freehosting.pdf
6232017-04-05b2f76581b1f81deb6f482301f120bf103dfee7feTargeted Attacks in the Middle East Using KASPERAGENT and MICROPSIA - Palo Alto Networks Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.04.05.KASPERAGENT_and_MICROPSIA/Targeted%20Attacks%20in%20the%20Middle%20East%20Using%20KASPERAGENT%20and%20MICROPSIA%20-%20Palo%20Alto%20Networks%20Blog.pdf
6242017-04-0621fa3482e808cc32ef762131560c8889b1bb641ecloud-hopper-report-final-v4https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.04.06.Operation_Cloud_Hopper/cloud-hopper-report-final-v4.pdf
6252017-04-06363c1f74cffd26d777fc13bc99276a8874da4828cloud-hopper-report-final-upda_72977https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.04.06.Operation_Cloud_Hopper/cloud-hopper-report-final-upda_72977.pdf
6262017-04-10d4ac9a7d29ae849228c231d4a329a0de75db03f5Longhorn_ Tools used by cyberespionage group linked to Vault 7https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.04.10_Longhorn/Longhorn_%20Tools%20used%20by%20cyberespionage%20group%20linked%20to%20Vault%207.pdf
6272017-04-11fc7f3b5e0274380f2dcbf1314e416156782749b2Unraveling the Lamberts Toolkithttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.04.11.Lamberts_Toolkit/Unraveling%20the%20Lamberts%20Toolkit.pdf
6282017-04-13749fcb8711afe06402e0a97903bfe2b4073bacc6callisto-grouphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.04.13.callisto-group/callisto-group.pdf
6292017-04-278e2d9ead7e25aea7ce175ae4ce6c753961695de2iranian-fileless-cyberattack-on-israelhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.04.27.iranian-fileless-cyberattack-on-israel-word-vulnerability/iranian-fileless-cyberattack-on-israel.pdf
6302017-05-03576a6743910be6c4f9ed71ab63e9d9f20665e1a7kazuarhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.05.03.kazuar-multiplatform-espionage-backdoor-api-access/kazuar.pdf
6312017-05-03ada599ed6529fb13552b715d63fc150dc439d2bdkonni-malware-under-radar-for-years.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.05.03.konni-malware-under-radar-for-years/konni-malware-under-radar-for-years.html.pdf
6322017-05-14f8e9e357ff59df2cdcb81b18271e8f544663cd0ecyber-espionage-apt32https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.05.14.cyber-espionage-apt32/cyber-espionage-apt32.pdf
6332017-05-24cffa0201901e5c88040f4b3688b60bb3a11c3f76operation-cobalt-kittyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.05.24.OPERATION_COBALT_KITTY/operation-cobalt-kitty.pdf
6342017-05-3063539ba31b08519f49476e7d509f0b1a9b2445d0Group-IB_Lazarushttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.05.30.Lazarus_Arisen/Group-IB_Lazarus.pdf
6352017-06-129e6f9b8b5b22c32c1ec5d53ed1992f8f83013140Win32_Industroyerhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.06.12.INDUSTROYER/Win32_Industroyer.pdf
6362017-06-12f86cc703b475135372a6639e12d4651121e23fffCrashOverride-01https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.06.12.CRASHOVERRIDE/CrashOverride-01.pdf
6372017-06-13975f32de446850319102be1462f9c232c9a9a716TA17-164Ahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.06.13.HIDDEN_COBRA/TA17-164A.pdf
6382017-06-146e20a79dbcbfb4449a38878bc5652538b6ac6c7fKASPERAGENThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.06.14.KASPERAGENT/KASPERAGENT.pdf
6392017-06-159d01db23f6ca3a44838c7ece1e023878807c9b35North Korea Is Not Crazyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.06.15.north-korea-cyber-activity/North%20Korea%20Is%20Not%20Crazy.pdf
6402017-06-184bae883feddc4e8b1c2593c848b7f434b125b6e4RECON-MTL-2017-evolution_of_pirpihttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.06.18.APT3_Uncovered_The_code_evolution_of_Pirpi/RECON-MTL-2017-evolution_of_pirpi.pdf
6412017-06-19259bf1dfeb4a1f9edec3b8fedc85bb07d74fa18bPoS Malware ShellTea PoSlurp_0https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.06.19.SHELLTEA_POSLURP_MALWARE/PoS%20Malware%20ShellTea%20PoSlurp_0.pdf
6422017-06-227c07a6c907e151bfdb785f4ada9de8e1e6d8d003TrendLabs Security Intelligence BlogFollowing the Trail of BlackTechs Cyber Espionage Campaigns - TrendLabs Security Intelligence Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.06.22.following-trail-blacktech-cyber-espionage-campaigns/TrendLabs%20Security%20Intelligence%20BlogFollowing%20the%20Trail%20of%20BlackTech%E2%80%99s%20Cyber%20Espionage%20Campaigns%20-%20TrendLabs%20Security%20Intelligence%20Blog.pdf
6432017-06-22d3b5aa6085c4ed0c90681c8cbd1d680cb5cff17aunit42-new-improved-macos-backdoor-oceanlotushttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.06.22.new-improved-macos-backdoor-oceanlotus/unit42-new-improved-macos-backdoor-oceanlotus.pdf
6442017-06-22df18330841082d967b74c11762561c16666ed9a2following-trail-blacktech-cyber-espionage-campaignshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.06.22.following-trail-blacktech-cyber-espionage-campaigns/following-trail-blacktech-cyber-espionage-campaigns.pdf
6452017-06-26d6bc0def8943d25eaef9486fd352eec104b6ea6cthreat-group-4127-targets-google-accountshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.06.26.Threat_Group-4127/threat-group-4127-targets-google-accounts.pdf
6462017-06-30a00e87b7c84b238136e6b7e03faa7032a1f1462bFrom BlackEnergy to ExPetr - Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.06.30.From_BlackEnergy_to_ExPetr/From%20BlackEnergy%20to%20ExPetr%20-%20Securelist.pdf
6472017-06-30e3f17c26a1e9baf918a27b23ed3e6b7e972f0fb1TeleBots are back_ supply-chain attacks against Ukrainehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.06.30.telebots-back-supply-chain/TeleBots%20are%20back_%20supply-chain%20attacks%20against%20Ukraine.pdf
6482017-07-058f18178e7e830fe97544869badff8d42441ac398Insider_Informationhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.07.05.insider-information/Insider_Information.pdf
6492017-07-06a732599e776cfca3ffcd998b07d4e2b489ca639boperation-desert-eagle.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.07.06.Operation_Desert_Eagle/operation-desert-eagle.html.pdf
6502017-07-102af1cf8ac72832ec56cd0f4b6de1e7c4ebb64709osx_dok-mac-malware-emmental-hijacks-user-network-traffichttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.07.10.osx_dok-mac-malware-emmental-hijacks-user-network-traffic/osx_dok-mac-malware-emmental-hijacks-user-network-traffic.pdf
6512017-07-11affa81ab17dd8a0e884e10a393b7027a4e6a580cwinnti-evolution-going-open-source.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.07.11.winnti-evolution-going-open-source/winnti-evolution-going-open-source.html.pdf
6522017-07-1839e53915de468512258066c3ae2875770bd68c45Bitdefender-Whitepaper-Inexsmar-A4-en-ENhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.07.18.Inexsmar/Bitdefender-Whitepaper-Inexsmar-A4-en-EN.pdf
6532017-07-184b6319176b1caca3eac47744e74716aafa8e7e3aRecent Winnti Infrastructure and Samples _ ClearSky Cybersecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.07.18.winnti/Recent%20Winnti%20Infrastructure%20and%20Samples%20_%20ClearSky%20Cybersecurity.pdf
6542017-07-185fe96500781232a5b174eaedd85e81a6bbcebebfblog Inexsmarhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.07.18.Inexsmar/blog%20Inexsmar.pdf
6552017-07-24511167edf95430fe5f3fb8ec664fd8c00ee5053cunit42-tick-group-continues-attackshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.07.24.Tick_group/unit42-tick-group-continues-attacks.pdf
6562017-07-2705208f1ec08dcce22f2e0a99eaa27310a108d869Operation_Wilted_Tulip (1)https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.07.27.Operation_Wilted_Tulip/Operation_Wilted_Tulip%20%281%29.pdf
6572017-07-274746babb3e6b979dac62ea0ecb213c93bd06b04dchessmaster-cyber-espionage-campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.07.27.chessmaster-cyber-espionage-campaign/chessmaster-cyber-espionage-campaign.pdf
6582017-07-27e09481571961cea9b0f3153c97c5c16038e1401dunit42-oilrig-uses-ismdoor-variant-possibly-linked-greenbug-threat-grouphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.07.27.oilrig-uses-ismdoor-variant-possibly-linked-greenbug-threat-group/unit42-oilrig-uses-ismdoor-variant-possibly-linked-greenbug-threat-group.pdf
6592017-07-27e93db24a29cac99be5fef3ba7cde258776b68eefAppendixhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.07.27.chessmaster-cyber-espionage-campaign/Appendix.pdf
6602017-08-016d975a5497a8214758417eadb9a5d2fb79e40cb1cobalt-group-2017-cobalt-strikes-back.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.08.01.cobalt-group-2017-cobalt-strikes-back/cobalt-group-2017-cobalt-strikes-back.html.pdf
6612017-08-086b92046c8fb69c2eba71325a808f9b5772e76ae7APT Trends report Q2 2017https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.08.08.APT_Trends_Report_2017Q2/APT%20Trends%20report%20Q2%202017.pdf
6622017-08-1196183f8abeab7d62d5db6f2d4761766d05ec4507apt28-targets-hospitality-sector.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.08.11.apt28-targets-hospitality-sector/apt28-targets-hospitality-sector.html.pdf
6632017-08-1518fcefcdc2861109df40b7d4f89c88f01153ebe6Notepad_and_Chthonichttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.08.15.Notepad_and_Chthonic/Notepad_and_Chthonic.pdf
6642017-08-17480311eaa22f578ef695b43791d9f76754f77af1Turla_APThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.08.17.turla-apt-actor-refreshes-kopiluwak-javascript-backdoor/Turla_APT.pdf
6652017-08-18c42879e3e3393f1cd6a716273d4eee1b023029bdRussian-Bank-Officeshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.08.18.Russian_Bank_Offices_Hit/Russian-Bank-Offices.pdf
6662017-08-25ee48407bd11f46dcc700d8d43e1eedfd49e8ef3doperation-rat-cook-chinese-apt-actors-use-fake-game-thrones-leaks-lureshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.08.25.operation-rat-cook/operation-rat-cook-chinese-apt-actors-use-fake-game-thrones-leaks-lures.pdf
6672017-08-302c5e1689900d6f92ec985be4f9f1df9f9b52de30eset-gazerhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.08.30.Gazing_at_Gazer/eset-gazer.pdf
6682017-08-30c6ae240fe72e85a0e413aefda3bd980ade0df153Introducing WhiteBear - Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.08.30.Introducing_WhiteBear/Introducing%20WhiteBear%20-%20Securelist.pdf
6692017-09-061ed7aca75422d01c464e9786e6a156d1fb6e7720Dragonfly_ Western energy sector targeted by sophisticated attack group _ Symantec Connect Communityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.09.06.dragonfly-western-energy-sector-targeted-sophisticated-attack-group/Dragonfly_%20Western%20energy%20sector%20targeted%20by%20sophisticated%20attack%20group%20_%20Symantec%20Connect%20Community.pdf
6702017-09-0629e1e27c9564c0a7b52481295a83b1b8482393dcblog Dragonfly 2https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.09.06.intelligence-games-in-the-power-grid-2016/blog%20Dragonfly%202.pdf
6712017-09-06cbcdc4cb1305cfea35df9364e347f2989cc435c9intelligence-games-in-the-power-grid-2016https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.09.06.intelligence-games-in-the-power-grid-2016/intelligence-games-in-the-power-grid-2016.pdf
6722017-09-124216dbf87e7728c248780b5abf6a455435562107zero-day-used-to-distribute-finspy.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.09.12.FINSPY_CVE-2017-8759/zero-day-used-to-distribute-finspy.html.pdf
6732017-09-18ad56b26eb6144508b32feb518a73707a99247c03CCleanuphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.09.18.CCleanup/CCleanup.pdf
6742017-09-18fa92c0e06a7469a3dab6a34d37528bc173d517ebAn (un)documented Word feature abused by attackers _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.09.18.Windows_branch_of_the_Cloud_Atlas/An%20%28un%29documented%20Word%20feature%20abused%20by%20attackers%20_%20Securelist.pdf
6752017-09-205180b9f4648bda9dbcecb6d60bcd1213a1ebf97cCCleaner_C2https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.09.20.CCleanup_C2/CCleaner_C2.pdf
6762017-09-20a39f0d00e020ea4eb9e104a3aeed959c01bf8306Insights into Iranian Cyber Espionage_ APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware « Threat Research Blog _ FireEye Inchttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.09.20.apt33-insights-into-iranian-cyber-espionage/Insights%20into%20Iranian%20Cyber%20Espionage_%20APT33%20Targets%20Aerospace%20and%20Energy%20Sectors%20and%20has%20Ties%20to%20Destructive%20Malware%20%C2%AB%20Threat%20Research%20Blog%20_%20FireEye%20Inc.pdf
6772017-09-20f5cadff536797504676152ebb92faeeb32539406Aurora_Operation_CCleanerhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.09.20.Aurora_Operation_CCleaner/Aurora_Operation_CCleaner.pdf
6782017-09-282de8ba6f7036c042204203b326a2d4b28596b5a4Threat Actors Target Government of Belarus Using CMSTAR Trojanhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.09.28.Belarus_CMSTAR_Trojan/Threat%20Actors%20Target%20Government%20of%20Belarus%20Using%20CMSTAR%20Trojan.pdf
6792017-10-0207798378a61e5b51e15ec24e0c28cdfba50fedf1Aurora_Operation_CCleaner_IIhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.10.02.Aurora_Operation_CCleaner_II/Aurora_Operation_CCleaner_II.pdf
6802017-10-10c11ac6a6b4d8b2e45afa90658104f92d3315d229TW SpiderLabs Advanced Brief_Post-Soviet Bank Heists_PDFhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.10.10.Post-Soviet-Bank-Heists/TW%20SpiderLabs%20Advanced%20Brief_Post-Soviet%20Bank%20Heists_PDF.pdf
6812017-10-12ca5db110c6eff4afde63016823a546599e49dba6bronze-butler-targets-japanese-businesseshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.10.12.BRONZE_BUTLER/bronze-butler-targets-japanese-businesses.pdf
6822017-10-160d98f0605864ff868915aebe136216db46d997d6Leviathan_Espionage_actorhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.10.16.Leviathan/Leviathan_Espionage_actor.pdf
6832017-10-160d9aab08a0ef223d0fba363b8c2ed4d0093ee291BAESytems_Taiwan-Heist-Lazarus-Tools-Ransomware(10-16-2017)https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.10.16.Taiwan-Heist/BAESytems_Taiwan-Heist-Lazarus-Tools-Ransomware%2810-16-2017%29.pdf
6842017-10-16ed0376c06e97bf7f9887dcbf789e165d52f70070BlackOasishttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.10.16.BlackOasis_APT/BlackOasis.pdf
6852017-10-1967d5b56d384ebc3eff678ca4a3544fcbcfd48e6eBitdefender-Business-2017-WhitePaper-PZCHAO-crea2452-en-EN-GenericUsehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.10.19.Operation_PZCHAO/Bitdefender-Business-2017-WhitePaper-PZCHAO-crea2452-en-EN-GenericUse.pdf
6862017-10-242d3ca80570c9425fec0b86e8788672b51c05d798Greenbughttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.10.24.greenbug/Greenbug.pdf
6872017-10-27a7aeb82c38c24d916f743f63d8dd3a44245f8824bellingcat - Bahamut Revisited, More Cyber Espionage in the Middle East and South Asia - bellingcathttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.10.27.bahamut-revisited/bellingcat%20-%20Bahamut%20Revisited%2C%20More%20Cyber%20Espionage%20in%20the%20Middle%20East%20and%20South%20Asia%20-%20bellingcat.pdf
6882017-10-308fa264721c32e66ec94ceb77645c22edbffc9259Gaza Cybergang - updated activity in 2017_ - Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.10.30.Gaza_Cybergang/Gaza%20Cybergang%20-%20updated%20activity%20in%202017_%20-%20Securelist.pdf
6892017-10-31c88964f86dee3dddad544afaa958f19d5b078700Night_of_the_Devilhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.10.31.MBR-ONI.Japan/Night_of_the_Devil.pdf
6902017-11-023e8197de6b5d3ee28900addba58d37693ab48c35New Insights into Energetic Bear's Attacks on Turkish Critical Infrastructurehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.11.02.Energetic_Bear_on_Turkish_Critical_Infrastructure/New%20Insights%20into%20Energetic%20Bear%27s%20Attacks%20on%20Turkish%20Critical%20Infrastructure.pdf
6912017-11-027cc47ac6e2afeaccc7f6b81e7aee36a98b2fcc08LeetMX - a Yearlong Cyber-Attack Campaign Against Targets in Latin America - ClearSky Cyber Securityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.11.02.LeetMX/LeetMX%20-%20a%20Yearlong%20Cyber-Attack%20Campaign%20Against%20Targets%20in%20Latin%20America%20-%20ClearSky%20Cyber%20Security.pdf
6922017-11-028a525f0a9399a4c2a02e14d9bdaa98992be9c07dRecent InPage Exploits Lead to Multiple Malware Familieshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.11.02.InPage_Exploits/Recent%20InPage%20Exploits%20Lead%20to%20Multiple%20Malware%20Families.pdf
6932017-11-02f7b0f598b3b294086661de8ff38a25cffd626845The KeyBoys are back in townhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.11.02.KeyBoys_are_back/The%20KeyBoys%20are%20back%20in%20town.pdf
6942017-11-067c2f93f1fbe764ff94de5e5d5f29daea4a512956chessmasters-new-strategy-evolving-tools-tacticshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.11.06.ChessMaster_New_Strategy/chessmasters-new-strategy-evolving-tools-tactics.pdf
6952017-11-06b14204853e9ec3f569a4783e38ce7edc945a9eafoceanlotus-blossomshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.11.06.oceanlotus-blossoms/oceanlotus-blossoms.pdf
6962017-11-071df3af6ed515b55238da5e596ff5b0aa4b6e3a82Threat_Group_APT28_Slips_Office_Malwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.11.07.APT28_Slips_Office_Malware/Threat_Group_APT28_Slips_Office_Malware.pdf
6972017-11-0754217b0c066f77f19aeb47d323c9606ece22ffabsowbug-cyber-espionage-grouphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.11.07.sowbug-cyber-espionage-group-targets/sowbug-cyber-espionage-group.pdf
6982017-11-1002a66278756c7c3a068d5eff9bc05f3ae9a836cdunit42-new-malware-with-ties-to-sunorcal-discoveredhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.11.10.New_Malware_with_Ties_to_SunOrcal_Discovered/unit42-new-malware-with-ties-to-sunorcal-discovered.pdf
6992017-11-14f9210ad09b22553ea32f550d032385a6a93a6214muddying-the-water-targeted-attackshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.11.14.Muddying_the_Water/muddying-the-water-targeted-attacks.pdf
7002017-11-22391659a97773a0330bafdee3af6fdbcfeaa11280muddywater-apt-targeting-middle-easthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.11.22.MuddyWater_APT/muddywater-apt-targeting-middle-east.pdf
7012017-12-043b669818816e3d888b2546bc75ac0f44782f7fafpaper_the-shadows-of-ghosts-carbanak-reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.12.04.The_Shadows_of_Ghosts/paper_the-shadows-of-ghosts-carbanak-report.pdf
7022017-12-04bb99d7c51232dc5abfdad6c5771ce784405d95d7blog_anatomy-of-an-attack-carbanakhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.12.04.The_Shadows_of_Ghosts/blog_anatomy-of-an-attack-carbanak.pdf
7032017-12-05bba8af0fe4254863c86aafeedb7d86f7af7b0e99Charming_Kitten_2017https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.12.05.Charming_Kitten/Charming_Kitten_2017.pdf
7042017-12-074e20c78a1ab7fbd0140472388e206f0efbee8c26targeted-attack-in-middle-east-by-apt34.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.12.07.New_Targeted_Attack_in_the_Middle_East_by_APT34/targeted-attack-in-middle-east-by-apt34.html.pdf
7052017-12-117a57e05aab003604657afa1bb06af954004215c7Group-IB_MoneyTaker_reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.12.11.MoneyTaker/Group-IB_MoneyTaker_report.pdf
7062017-12-11a6d08e61d4a12fe4914671ba3550e95ad61691f2appendix-untangling-the-patchwork-cyberespionage-grouphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.12.11.Patchwork_APT/appendix-untangling-the-patchwork-cyberespionage-group.pdf
7072017-12-11dafed0f2a46c513004287c96588d3be3b7ae513atech-brief-untangling-the-patchwork-cyberespionage-grouphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.12.11.Patchwork_APT/tech-brief-untangling-the-patchwork-cyberespionage-group.pdf
7082017-12-14a6c087f2a4264e891068021c52dc954aba7c64b3attackers-deploy-new-ics-attack-framework-triton.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.12.14.attackers-deploy-new-ics-attack-framework-triton/attackers-deploy-new-ics-attack-framework-triton.html.pdf
7092017-12-178a146c79ec045eee3b72971c2285b63f28ec4407Operation_Dragonfly_Analysishttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.12.17.operation-dragonfly-analysis-suggests-links-to-earlier-attacks/Operation_Dragonfly_Analysis.pdf
7102017-12-19ce6ea1a9d82cec62a78fbaa5a04afe54c0167101bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.12.19.North_Korea_Bitten_by_Bitcoin_Bug/blog.pdf
7112017-12-19d8ba9a371c7dc7e6608b92e8a671b82191d6c67apfpt-us-wp-north-korea-bitten-by-bitcoin-bughttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.12.19.North_Korea_Bitten_by_Bitcoin_Bug/pfpt-us-wp-north-korea-bitten-by-bitcoin-bug.pdf
7122018-01-044f9469a732dd8c2d32c8a2b017e9378e95e40611Iran_Cyber_Final_Full_v2https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.04.Iran_Cyber_Threat_Carnegie/Iran_Cyber_Final_Full_v2.pdf
7132018-01-06891959666596264d8f2bd7b309e8321b67d86844Malicious Document Targets Pyeongchang Olympics _ McAfee Blogshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.06.malicious-document-targets-pyeongchang-olympics/Malicious%20Document%20Targets%20Pyeongchang%20Olympics%20_%20McAfee%20Blogs.pdf
7142018-01-09345ecd81d3f862caf8de882514c6c4e01ddcc048bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.09.Turla_Mosquito/blog.pdf
7152018-01-0964ee9966b41640d4a8477e2bf5ad288422dd0829ESET_Turla_Mosquitohttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.09.Turla_Mosquito/ESET_Turla_Mosquito.pdf
7162018-01-11612116140e5b452ec1053a6017401f125a8c9375North_Korean_Defectors_and_Journalists_Targetedhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.11.North_Korean_Defectors_and_Journalists_Targeted/North_Korean_Defectors_and_Journalists_Targeted.pdf
7172018-01-1271cf247af339cad51681bf1b3e5ad9702b92d676Pawn_Storm_Update_2018.Janhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.12.update-pawn-storm-new-targets-politically/Pawn_Storm_Update_2018.Jan.pdf
7182018-01-15ee187d05c2c5fc97fd78d9dbd18477c3eed8702bNew_killdiskhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.15.new-killdisk-variant-hits-financial-organizations-in-latin-america/New_killdisk.pdf
7192018-01-1612c62600afe97d1309bc920524391e9ab9f4b01eAPT3_Adversary_Emulation_Planhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2017/2017.09.XX.APT3_Adversary_Emulation_Plan/APT3_Adversary_Emulation_Plan.pdf
7202018-01-16586b976b5f81e93b76cf48534c9da8ec239e7b0bkorea-in-crosshairs.htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.16.korea-in-crosshairs/korea-in-crosshairs.html.pdf
7212018-01-16691670cb4b4edb4b77c1215538a4a88c9933182dcta-2018-0116https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.16.north-korea-cryptocurrency-campaign/cta-2018-0116.pdf
7222018-01-16910813be6275d9db2a482a92c26eddae3786bc34Skygofree_appendix_enghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.16.skygofree/Skygofree_appendix_eng.pdf
7232018-01-16a72a88d6a9cc5739aad7802ffb6b29f63af16bc4Skygofree_ Following in the footsteps of HackingTeam - Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.16.skygofree/Skygofree_%20Following%20in%20the%20footsteps%20of%20HackingTeam%20-%20Securelist.pdf
7242018-01-18a91289e835991b389e01254492d0fe84aeb21752Turla Neuron Malware Updatehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.18.Turla_group_update_Neuron_malware/Turla%20Neuron%20Malware%20Update.pdf
7252018-01-18d5c605fd42adb5312d17a54d246d8178a6a9094cLookout_Dark-Caracal_srr_20180118_us_v.1.0https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.18.Dark_Caracal/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf
7262018-01-2484890f780369eac214755f96faa225aa8d855a4cLazarus_Campaign_Targeting_Cryptocurrencieshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.24.lazarus-campaign-targeting-cryptocurrencies/Lazarus_Campaign_Targeting_Cryptocurrencies.pdf
7272018-01-2515ca73fd7d7d91a93d1d31c372977ded81ce4098unit42-oilrig-uses-rgdoor-iis-backdoor-targets-middle-easthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.25.oilrig_Middle_East/unit42-oilrig-uses-rgdoor-iis-backdoor-targets-middle-east.pdf
7282018-01-268c10db53c54a7b7fd8644cfd7e2bc8da4edb4d37unit42-the-tophat-campaign-attacks-within-the-middle-east-region-using-popular-third-party-serviceshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.26.TopHat_Campaign/unit42-the-tophat-campaign-attacks-within-the-middle-east-region-using-popular-third-party-services.pdf
7292018-01-2770fae1539b2e714ac6876d64dacbead9671fc003Accenture-Security-Dragonfish-Threat-Analysishttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.27.DRAGONFISH/Accenture-Security-Dragonfish-Threat-Analysis.pdf
7302018-01-290bece4337b4372e52cf6b23dd4f9da12f8175fa7VERMIN_ Quasar RAT and Custom Malware Used In Ukrainehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.29.VERMIN_Quasar_RAT_and_Custom_Malware_Used_In_Ukraine/VERMIN_%20Quasar%20RAT%20and%20Custom%20Malware%20Used%20In%20Ukraine.pdf
7312018-01-29bde5a789f1778ea6abc0c03231e448bdac2e378fPoriewSpy.Indiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.29.PoriewSpy.India/PoriewSpy.India.pdf
7322018-01-30a98b3a495b906d5e966dd4afa536b736030aaa35apt32-continues-asean-targetinghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.30.APT32_Continues_ASEAN_Targeting/apt32-continues-asean-targeting.pdf
7332018-01-31a2425e6cac6127d7c43e5135ede2b9cc7fdb2543unit42-comnie-continues-target-organizations-east-asiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.01.31.Comnie_Continues_to_Target_Organizations_in_East_Asia/unit42-comnie-continues-target-organizations-east-asia.pdf
7342018-02-0243d4c021682681ff6061a74b794744f74ef5bea2Gold_Dragon_Olympicshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.02.02.gold-dragon-widens-olympics-malware/Gold_Dragon_Olympics.pdf
7352018-02-076a573fc0b111b0a65146d74cd956ecea94561f6dTargeted-attackshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.02.07.targeted-attacks-in-middle-east_VBS_CAMPAIGN/Targeted-attacks.pdf
7362018-02-131a0cdfb6c8a5518e7e5f24a70f125e7bc0442e9fdeciphering-confuciushttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.02.13.deciphering-confucius/deciphering-confucius.pdf
7372018-02-13c38fc4d7de7c5546e9395c0399ea02441da355b2Lotus Blossom Continues ASEAN Targetinghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.02.13.Lotus-Blossom-Continues/Lotus%20Blossom%20Continues%20ASEAN%20Targeting.pdf
7382018-02-200e701c174ea21495258d3070c2092ae2c1071ab3APT37.bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.02.20.APT37/APT37.blog.pdf
7392018-02-2064b4473af2ffaf520043f90f688735a53e8860b7A Slice of 2017 Sofacy Activity - Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.02.20.a-slice-of-2017-sofacy-activity/A%20Slice%20of%202017%20Sofacy%20Activity%20-%20Securelist.pdf
7402018-02-208742755080062ec87eb6ae0059fd7925cde83a9brpt_APT37https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.02.20.APT37/rpt_APT37.pdf
7412018-02-20ba3b8e6a764ce36c0826bbc39a5012caf7048ecbMusical Chairs Playing Tetrishttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.02.20.musical-chairs-playing-tetris/Musical%20Chairs%20Playing%20Tetris.pdf
7422018-02-2119b2258d841699869a494c3752d0f7ec9b1ba3d2Avast tracks down Tempting Cedar Spywarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.02.21.Tempting_Cedar/Avast%20tracks%20down%20Tempting%20Cedar%20Spyware.pdf
7432018-02-2868ea1b735d59a6f13e33b91b7c43d399919d9d69Chafer_ Latest Attacks Reveal Heightened Ambitions _ Symantec Blogshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.02.28.Chafer_Latest_Attacks_Reveal/Chafer_%20Latest%20Attacks%20Reveal%20Heightened%20Ambitions%20_%20Symantec%20Blogs.pdf
7442018-02-28c8e577f6df534895f4b9e25a8da67a7b32d381afSofacy Attacks Multiple Government Entitieshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.02.28.sofacy-attacks-multiple-government-entities/Sofacy%20Attacks%20Multiple%20Government%20Entities.pdf
7452018-03-013aa1366f97a1345531af82567897baeef7624dd3MuddyWater's Recent Activityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.01.a-quick-dip-into-muddywaters-recent/MuddyWater%27s%20Recent%20Activity.pdf
7462018-03-021948c9c82dd21358b57d1bcf962fe704bbac6b20Operation_Honeybeehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.02.Operation_Honeybee/Operation_Honeybee.pdf
7472018-03-05991be81293e8d94a7cd79741bf18005158ff319bNew_ComboJack_Steal_Cryptocurrencyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.05.New_ComboJack_Malware/New_ComboJack_Steal_Cryptocurrency.pdf
7482018-03-0642bc3ed806d32f12e7fcb224aa184abfda49d079The-Slingshot-APT_report_ENG_finalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.06.The-Slingshot-APT/The-Slingshot-APT_report_ENG_final.pdf
7492018-03-07128ea779dec6b3799b81e1536db23b51dbab67cepatchwork-continues-deliver-badnewshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.07.patchwork-continues-deliver-badnews-indian-subcontinent/patchwork-continues-deliver-badnews.pdf
7502018-03-08a6a5420dfb31ba77269ecf7fec57c2524308f131Donot Team in South Asiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.08.donot-team-leverages-new-modular/Donot%20Team%20in%20South%20Asia.pdf
7512018-03-08d103eb6b97caa34ba67ed9ed9eb588acb7409e1eukatemicrysys_territorialdisputehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.08.Territorial_Dispute/ukatemicrysys_territorialdispute.pdf
7522018-03-08e742065989523b8a47ec060eeb8337b3ecb6695dolympicdestroyerhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.08.olympicdestroyer-is-here-to-trick-the-industry/olympicdestroyer.pdf
7532018-03-08f73b8c4566e4f8c356e28c091e4eb5956ef7172ahidden-cobra-targets-turkish-financial-sector-new-bankshot-implanthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.08.hidden-cobra-targets-turkish-financial/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant.pdf
7542018-03-092ce1536757accf7b76da6cc2900300e702ac7f3aNew tools uncovered from hacking group APT15https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.09.APT15_is_alive_and_strong/New%20tools%20uncovered%20from%20hacking%20group%20APT15.pdf
7552018-03-0957eb61b0d2d2e8b62ea44f6ce4e108e85d9facb6BAD TRAFFIC_ Sandvines PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads_https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.09.Sandvine_PacketLogic_Devices_APT/BAD%20TRAFFIC_%20Sandvine%E2%80%99s%20PacketLogic%20Devices%20Used%20to%20Deploy%20Government%20Spyware%20in%20Turkey%20and%20Redirect%20Egyptian%20Users%20to%20Affiliate%20Ads_.pdf
7562018-03-097dcaea7c97091bd953bfb58e83ee329c92ba04d6new-traces-hacking-team-wildhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.09.new-traces-hacking-team-wild/new-traces-hacking-team-wild.pdf
7572018-03-09f4024179748d1abc9e6bfe6e2f0536fc42003b91An analysis of RoyalCli and RoyalDNShttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.09.APT15_is_alive_and_strong/An%20analysis%20of%20RoyalCli%20and%20RoyalDNS.pdf
7582018-03-09fb43da79eb861c4678fb04c4614436d73db8deebmasha-and-these-bearshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.09.masha-and-these-bears/masha-and-these-bears.pdf
7592018-03-12723fc308e141c4e6ea7b1b4d1730a4de4eae19d0MuddyWater_Middle_East_and_Central_Asiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.12.MuddyWater_Middle_East_and_Central_Asia/MuddyWater_Middle_East_and_Central_Asia.pdf
7602018-03-131229852bbb049d1ed9c63e41a02d089b288328cfiranian-threat-group-updates-ttps-in-spear-phishing-campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.13.Iranian-threat-group/iranian-threat-group-updates-ttps-in-spear-phishing-campaign.pdf
7612018-03-1381a85270e8e412603a86d7226cbd9407306d0a2cBlackTDShttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.13.BlackTDS/BlackTDS.pdf
7622018-03-1386b083b7b5a796325b9d99291fbece2c71bf2b70therapeutic_postmortem_of_connected_medicinehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.13.A_therapeutic_postmortem_of_connected_medicine/therapeutic_postmortem_of_connected_medicine.pdf
7632018-03-13cc77d1604a80c26bfb1846a84a27dea99278242bESET_OceanLotushttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.13.OceanLotus_Old_techniques_new_backdoor/ESET_OceanLotus.pdf
7642018-03-144965ed073067deeb6e8d354301e6f9923fb2687eTropic Troopers New Strategyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.14.tropic-trooper-new-strategy/Tropic%20Trooper%E2%80%99s%20New%20Strategy.pdf
7652018-03-14740dfa57dee188f7e1e086b5ba87ddef5460ce4eInception Framework_ Alive and Well, and Hiding Behind Proxies _ Symantec Blogshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.14.Inception_Framework/Inception%20Framework_%20Alive%20and%20Well%2C%20and%20Hiding%20Behind%20Proxies%20_%20Symantec%20Blogs.pdf
7662018-03-151b0b1d53362b0a5210164197a7132e4ae3aa5749Russian_Government_Cyber_Activityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.15.Russian_Government_Cyber_Activity_TA18-074A/Russian_Government_Cyber_Activity.pdf
7672018-03-235e759d952b6255cad781503243d2dc75cba479f9Tech_Report_Malicious_Hancomhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.23.Targeted_Attacks_on_South_Korean_Organizations/Tech_Report_Malicious_Hancom.pdf
7682018-03-27077153aaf5a20fe602dad41b71b2602183f81849Panda Banker Zeroshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.27.panda-banker-zeros-in-on-japanese-targets/Panda%20Banker%20Zeros.pdf
7692018-03-295afff604991deb7f3ab7d035f5b4090011c4a10cChessMaster Adds Updated Tools to Its Arsenalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.29.ChessMaster_Adds_Updated_Tools/ChessMaster%20Adds%20Updated%20Tools%20to%20Its%20Arsenal.pdf
7702018-03-31f3aa0853f78397774f0a44b0fec343256c3c9567NavRAThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.03.31.NavRAT_Uses_US-North_Korea_Summit_As_Decoy/NavRAT.pdf
7712018-04-041f4fb94a88d7ad303157e3a5ce3d5ec33833a3bfMacOS_Backdoor_OceanLotushttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.04.04.MacOS_Backdoor_OceanLotus/MacOS_Backdoor_OceanLotus.pdf
7722018-04-12f0d3b63788e00dc8682feae721a4df8d7471fc85Operation-Parliamenthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.04.12.operation-parliament/Operation-Parliament.pdf
7732018-04-1736f3657d3cc0cf94d1287e49874008e839c9151anccgroup.trust-Decoding network data from a Gh0st RAT varianthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.04.17.Iron_Tiger_Gh0st_RAT_variant/nccgroup.trust-Decoding%20network%20data%20from%20a%20Gh0st%20RAT%20variant.pdf
7742018-04-23059fd3de304083e79ca083605aff7cf58d9b17cbenergetic-bear-crouchinghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.04.23.energetic-bear-crouching-yeti/energetic-bear-crouching.pdf
7752018-04-2395344b8198280e7ccdf0f148a812f3a6afa0ffa4orangeworm-targets-healthcare-us-europe-asiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.04.23.New_Orangeworm/orangeworm-targets-healthcare-us-europe-asia.pdf
7762018-04-23ca851ce01b6f9c123af07bd5c41d267b5f0c49ceAccenture-Hogfish-Threat-Analysishttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.04.23.HOGFISH_REDLEAVES_CAMPAIGN/Accenture-Hogfish-Threat-Analysis.pdf
7772018-04-244e0284460cc68c0fdf80a26c55a9f54d790e0432sednit-update-analysis-zebrocy_https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.04.24.sednit-update-analysis-zebrocy/sednit-update-analysis-zebrocy_.pdf
7782018-04-246470021efdeb316fd19cb16537ce9102ed7e59d1operation-ghostsecrethttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.04.24.Operation_GhostSecret/operation-ghostsecret.pdf
7792018-04-249e3057bfa16352f56a7d026fac330e3a1487b861metamorfo-campaign-targeting-brazilian-users_htmlhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.04.24.metamorfo-campaign/metamorfo-campaign-targeting-brazilian-users_html.pdf
7802018-04-26e135ed30a2ce96d99b5227e77e0ed65fb2655158GravityRAThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.04.26.GravityRAT/GravityRAT.pdf
7812018-04-27251139b66d8a6e68a38000d1e05befd26bf535ca[CN]_OceanLotus_new_malwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.04.27.OceanLotus_new_malware/%5BCN%5D_OceanLotus_new_malware.pdf
7822018-05-03149418e27ac9b1965b9ab713c26dc4671a207e70Red_Eyes_Hacking_Group_Reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.05.03.Red_Eyes_Hacking_Group/Red_Eyes_Hacking_Group_Report.pdf
7832018-05-0365dbdb2c06922707a0979295c9645c71cf0d296320180503_Burning_Umbrellahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.05.03.Burning_Umbrella/20180503_Burning_Umbrella.pdf
7842018-05-038a8e334f804ece05996db6dbe8c055991cca013eZooPark_for_public_final_edithttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.05.03.whos-who-in-the-zoo/ZooPark_for_public_final_edit.pdf
7852018-05-03dbc9026e9f8f76b9cac91b86dd97780f81d8e9aeblog_whos-who-in-the-zoohttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.05.03.whos-who-in-the-zoo/blog_whos-who-in-the-zoo.pdf
7862018-05-095d18ef46d4a6927bdfd56840ec2ed1fc29bf22dfcta-2018-0509https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.05.09.Iran_Hacker_Hierarchy_Exposed/cta-2018-0509.pdf
7872018-05-095ebc5e943ec07f77f1c8bd72772cb77f96fac565blogs_360_cn_blog_cve-2018-8174-en_https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.05.09.APT-C-06_CVE-2018-8174/blogs_360_cn_blog_cve-2018-8174-en_.pdf
7882018-05-2204146a1e3e7dd4d5e3e2fbd5b0fe8f06720a6a6bturla-mosquito-shift-towards-generic-toolshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.05.22.Turla_Mosquito/turla-mosquito-shift-towards-generic-tools.pdf
7892018-05-226fa8f171b0c54e32f84947822529ec3577304030The_destruction_of_APT3https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.05.22.The_destruction_of_APT3/The_destruction_of_APT3.pdf
7902018-05-233935d58c55bf257dff7b3c263f60e35ea2ab736cVPNFilterhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.05.23.New_VPNFilter/VPNFilter.pdf
7912018-05-23c49e6365631d1feafe04dcbfdc7baac5c049d43fConfucius_Updatehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.05.23.Confucius_Update/Confucius_Update.pdf
7922018-05-29879ec150de81d3f3408badccc873146e9722c828iron-cybercrime-group-under-the-scope-2https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.05.29.iron-cybercrime-group/iron-cybercrime-group-under-the-scope-2.pdf
7932018-06-062691cc0a9f42e4f472935f28a6606b4f9f2345b4vpnfilter-updatehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.06.06.vpnfilter-update/vpnfilter-update.pdf
7942018-06-062add24d5de90473d4953c4634e8c06e4d96194c1operation-prowli-traffic-manipulation-cryptocurrency-mininghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.06.06.OPERATION_PROWLI/operation-prowli-traffic-manipulation-cryptocurrency-mining.pdf
7952018-06-06897566b9fcbdf30e026ba61172ccb56766948a4asofacy-groups-parallel-attackshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.06.06.sofacy-groups-parallel-attacks/sofacy-groups-parallel-attacks.pdf
7962018-06-0736c8db6ae5dbc1534364202bd3dafe4f812d5ab7adobe-flash-zero-day-targeted-attackhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.06.07.dobe-flash-zero-day-targeted-attack/adobe-flash-zero-day-targeted-attack.pdf
7972018-06-07c58320595990b936d91523bd64c8b40fe6869d5dpatchwork-apt-group-targets-us-think-tankshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.06.07.patchwork-apt-group-targets-us-think-tanks/patchwork-apt-group-targets-us-think-tanks.pdf
7982018-06-07d721478a2354fb695d2f066e276e69ad5d1eaf73totally-tubular-treatise-on-triton-and-tristationhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.06.07.Totally_Tubular_Treatise_on_TRITON_TriStation/totally-tubular-treatise-on-triton-and-tristation.pdf
7992018-06-13035f7ce343df0a51728acb98c5fd196fad498092luckymouse-hits-national-data-centerhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.06.13.LuckyMouse/luckymouse-hits-national-data-center.pdf
8002018-06-1430247dcb727eaa945d77ffc1f1daf9304691a849miragefox-apt15-resurfaces-with-new-tools-based-on-old-oneshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.06.14.MirageFox_APT15/miragefox-apt15-resurfaces-with-new-tools-based-on-old-ones.pdf
8012018-06-14ed2e653577bfc48e3354a65f006bce987454a0a2another-potential-muddywater-campaign-uses-powershell-based-prb-backdoorhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.06.14.another-potential-muddywater-campaign/another-potential-muddywater-campaign-uses-powershell-based-prb-backdoor.pdf
8022018-06-15411a7ffe8c11fbe9edd49575bcf4e94270e3b7beMustang Panda _ Threat Actor Profile _ CrowdStrikehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.06.15.Mustang_Panda/Mustang%20Panda%20_%20Threat%20Actor%20Profile%20_%20CrowdStrike.pdf
8032018-06-19267c3ec477cc853b163bb41a8fd82cdf6c51f4dbolympic-destroyerhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.06.19.olympic-destroyer-is-still-alive/olympic-destroyer.pdf
8042018-06-200e8b74584de702a9c0fa48f65e3f19b97537642ethrip-hits-satellite-telecoms-defense-targetshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.06.20.thrip-hits-satellite-telecoms-defense-targets/thrip-hits-satellite-telecoms-defense-targets.pdf
8052018-06-22dd16552805b96e7cafc27d7edcd05e15014e4091Tick Group Weaponized Secure USB Drives to Target Air-Gapped Critical Systemshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.06.22.Iick.Group-weaponized-secure-usb/Tick%20Group%20Weaponized%20Secure%20USB%20Drives%20to%20Target%20Air-Gapped%20Critical%20Systems.pdf
8062018-06-23ef3dd05bee369a7cfb633d03e0545097845a73bc[AhnLab]Andariel_a_Subgroup_of_Lazarus (3)https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.06.23.Andariel_Group/%5BAhnLab%5DAndariel_a_Subgroup_of_Lazarus%20%283%29.pdf
8072018-06-25b4e7f944cadd35119444c6c346a5ab01023bfd43[KR]_ASEC_REPORT_vol.91https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.06.xx.Operation_Red_Gambler/%5BKR%5D_ASEC_REPORT_vol.91.pdf
8082018-06-26dc7912fdc23452e38d28768ce42a18c17f17ebcerancor-targeted-attacks-south-east-asia-using-plaintee-ddkong-malware-families_https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.06.26.RANCOR/rancor-targeted-attacks-south-east-asia-using-plaintee-ddkong-malware-families_.pdf
8092018-07-081ef1ae557b1ed60177dc52891e7248e714a6fa68apt-attack-middle-east-big-banghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.07.08.Big_Bang/apt-attack-middle-east-big-bang.pdf
8102018-07-08af6cf2581e3ae03234ddda2ad04cc1065498279ehussarini---targeted-cyber-attack-in-the-philippineshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.07.08.Hussarini/hussarini---targeted-cyber-attack-in-the-philippines.pdf
8112018-07-09f53aa3d8c7b6f9185fd3d7957aeb4d6cd1192ffbcertificates-stolen-taiwanese-techhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.07.09.certificates-stolen-taiwanese-tech-companies-plead-malware-campaign/certificates-stolen-taiwanese-tech.pdf
8122018-07-12032acfce8fe08469434ef3752263665844e620e6MDM_Indiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.07.12.Advanced_Mobile_Malware_Campaign_in_India/MDM_India.pdf
8132018-07-13e5a45010194433a959766fec55f99aed226abb5920180713_CSE_APT28_X-Agent_Op-Roman Holiday-Report_v6_1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.07.13.Operation_Roman_Holiday/20180713_CSE_APT28_X-Agent_Op-Roman%20Holiday-Report_v6_1.pdf
8142018-07-169ec73a98fdbceb783f5061a0da13d34e1c5a5745new-andariel-reconnaissance-tactics-hint-at-next-targetshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.07.16.new-andariel/new-andariel-reconnaissance-tactics-hint-at-next-targets.pdf
8152018-07-23840074e9139ef478efa15583e254af3d947577e120180723_CSE_APT27_Syria_v1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.07.23_APT27_Syria/20180723_CSE_APT27_Syria_v1.pdf
8162018-07-27e8a3316d1aa5c9c81aa0fe685014ac3a3f6c66a2New Threat Actor Group DarkHydrus Targets Middle East Governmenthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.07.27.DarkHydrus/New%20Threat%20Actor%20Group%20DarkHydrus%20Targets%20Middle%20East%20Government.pdf
8172018-07-3106a70ab2849fb7fe98adf961d33e8e419dc5f81fbisonal-malware-used-attacks-russia-south-koreahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.07.31.bisonal-malware-used-attacks-russia-south-korea/bisonal-malware-used-attacks-russia-south-korea.pdf
8182018-07-312036f6c6c100cf783e8bf0e95046196e5ba188c1malicious-document-targets-vietnamese-officialshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.07.31.APT_SideWinder_Malicious_Doc/malicious-document-targets-vietnamese-officials.pdf
8192018-08-014fe9b6b9623341caa9ef78300626c8d15758955dMalicious document targets Vietnamese officialshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.08.01.Vietnamese_officials_Targets/Malicious%20document%20targets%20Vietnamese%20officials.pdf
8202018-08-0240aa0ef5a5f3a7318de9208871684cfa5f188c70Goblin_Panda_against_Bearshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.08.02.Goblin_Panda/Goblin_Panda_against_Bears.pdf
8212018-08-024a22ceafcbdd3e8b7a349e8c80792be8377ff4d2The Gorgon Group Slithering Between Nation State and Cybercrimehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.08.02.Gorgon_Group/The%20Gorgon%20Group%20Slithering%20Between%20Nation%20State%20and%20Cybercrime.pdf
8222018-08-0275e144bb2f67929f91e7565ad9a75464d2fba7f7Accenture-Goldfin-Security-Alert-1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.08.02.Goldfin_Security_Alert/Accenture-Goldfin-Security-Alert-1.pdf
8232018-08-09b2c6738adde90a2abbbb24a07102e46bc8f26b2eexamining-code-reuse-reveals-undiscovered-links-among-north-koreas-malware-familieshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.08.09.north-koreas-malware-families/examining-code-reuse-reveals-undiscovered-links-among-north-koreas-malware-families.pdf
8242018-08-16330121e6427cfb64f61b8494eb8cdce572b57698cta-2018-0816https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.08.16.Chinese_Cyberespionage_Tsinghua_University/cta-2018-0816.pdf
8252018-08-2157849370296edd38929812a6832edeacaf56685esupply-chain-attack-operation-red-signature-targets-south-korean-organizationshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.08.21.Operation_Red_Signature/supply-chain-attack-operation-red-signature-targets-south-korean-organizations.pdf
8262018-08-21c2ec1036a969d9b8e470e0b1bcaf88069a058b98Eset-Turla-Outlook-Backdoorhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.08.21.Turla.Outlook.Backdoor/Eset-Turla-Outlook-Backdoor.pdf
8272018-08-231efa2d8bbe61fed9c3f97f5dbdb65566f3e2024dOperation_AppleJeushttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.08.23.Operation_AppleJeus/Operation_AppleJeus.pdf
8282018-08-28ecc2daeb3c747d13f4f94c6058df8564a1474ca3ceidpagelock-a-chinese-rootkithttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.08.28.CeidPageLock/ceidpagelock-a-chinese-rootkit.pdf
8292018-08-291614224bb566bb4c8e82501440d26fb707108757The Urpage Connection to Bahamut Confucius and Patchworkhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.08.29.Bahamut_Confucius_Patchwork/The%20Urpage%20Connection%20to%20Bahamut%20Confucius%20and%20Patchwork.pdf
8302018-08-29b6c547c6d2911413cd04f4e8a5f218097c6b3a28Appendix-TheUrpageConnectiontoBahamutConfuciusandPatchworkhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.08.29.Bahamut_Confucius_Patchwork/Appendix-TheUrpageConnectiontoBahamutConfuciusandPatchwork.pdf
8312018-08-300e7109f06710132f6e6db736a9628fd394412204Two Birds One STONE PANDAhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.08.30.Stone_Panda/Two%20Birds%20One%20STONE%20PANDA.pdf
8322018-08-303a8b95623bfbca0404372fe5d4a9fa89dbfa3aa8In the Trails of WINDSHIFT APThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.08.30.WINDSHIFT_APT/In%20the%20Trails%20of%20WINDSHIFT%20APT.pdf
8332018-08-30b36210fbdd48447cc39ec77e317f1f3ec43b8ae6Reversing malware in a custom format_ Hidden Bee elementshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.08.30.Hidden_Bee_Custom_format/Reversing%20malware%20in%20a%20custom%20format_%20Hidden%20Bee%20elements.pdf
8342018-08-30b6d1d7e93428e9ee1d8ce9ca8d21cad84c983077Double the Infection Double the Funhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.08.30.Cobalt_Group_Fun/Double%20the%20Infection%20Double%20the%20Fun.pdf
8352018-09-04a5209b418cad0bcc8212683bef7ee75db512b59boilrig-targets-middle-eastern-government-adds-evasion-techniques-oopsiehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.09.04.OilRig_Targets_Middle_Eastern/oilrig-targets-middle-eastern-government-adds-evasion-techniques-oopsie.pdf
8362018-09-04ab329ec81cc6bbc20a38b69ae91c1327a390ecd5silence_moving-into-the-darksidehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.09.04.Silence/silence_moving-into-the-darkside.pdf
8372018-09-0705ded0be2899badb166a94ef2855569121c60a82Targeted Attack on Indian Ministry of External Affairs using Crimson RAThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.09.07.indian-ministry_crimson-rat/Targeted%20Attack%20on%20Indian%20Ministry%20of%20External%20Affairs%20using%20Crimson%20RAT.pdf
8382018-09-075cd0e57ee8d76d9ee8e08467a2811b888b20bbb5Goblin_Panda_targets_Cambodiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.09.07.Goblin_Panda_targets_Cambodia/Goblin_Panda_targets_Cambodia.pdf
8392018-09-076bc74c0f6105d807ef6fa586a562f016460a802fDomestic Kitten An Iranian Surveillance Operationhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.09.07.Domestic_Kitten/Domestic%20Kitten%20An%20Iranian%20Surveillance%20Operation.pdf
8402018-09-1002a54821df905cc36b4d7433febead45a7881633LuckyMousehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.09.10.LuckyMouse/LuckyMouse.pdf
8412018-09-13cd622003433b7744a621fc95a1902e3df81c3059APT10 Targeting Japanese Corporations Using Updated TTPshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.09.13.APT10_Targeting_Japanese/APT10%20Targeting%20Japanese%20Corporations%20Using%20Updated%20TTPs.pdf
8422018-09-19d46f8f9f955dae7486b9c9b96c533ebb56a739b920180919https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.09.19.Green_Spot_APT/20180919.pdf
8432018-09-20667f1379170388a9984c24154da1507f02b5fd19CN_APT-C-01https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.09.20.Poison_Trumpet_Vine_Operation/CN_APT-C-01.pdf
8442018-09-27c1d45e9e295ef68265aaab4d84c14f89109ea3cdESET-LoJaxhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.09.27.LoJax/ESET-LoJax.pdf
8452018-10-0337e523977a82a5bf0f8cff84b5b183efc266d133rpt-apt38-2018-web_v4https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.10.03.APT38/rpt-apt38-2018-web_v4.pdf
8462018-10-10cd799bccd0560735d3c5bb4efb7b95bcdc392ad1MuddyWater expands operationshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.10.10.MuddyWater_expands/MuddyWater%20expands%20operations.pdf
8472018-10-11d26e508ee0247d9cb909e0fe9cd542488c0396faGallmaker New Attack Group Eschews Malware to Live off the Landhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.10.11.Gallmaker/Gallmaker%20New%20Attack%20Group%20Eschews%20Malware%20to%20Live%20off%20the%20Land.pdf
8482018-10-1586b482a16690c51947f30b16dbe692dba2850897Russian-language actor exploits hype over Telegram ban in Central Asiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.10.15.Octopus_Central_Asia/Russian-language%20actor%20exploits%20hype%20over%20Telegram%20ban%20in%20Central%20Asia.pdf
8492018-10-17279f5467a697ab8ea2ecc9a896ac005b7f525721blog_GreyEnergy_Updatedhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.10.17.GreyEnergy/blog_GreyEnergy_Updated.pdf
8502018-10-173b2d947a0db2be931e548b29e8f0604494cc4766SpyRATsofOceanLotusMalwareWhitePaperhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.10.17.OceanLotus_SpyRATs/SpyRATsofOceanLotusMalwareWhitePaper.pdf
8512018-10-174bb6d80c828654e3bff8610397c39d440371cbf3MartyMcFly Malware_ Targeting Naval Industryhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.10.17_MartyMcFly_Targeting_Naval_Industry/MartyMcFly%20Malware_%20Targeting%20Naval%20Industry.pdf
8522018-10-17b8a1f025fec78996380d3e1045fea11c877610e2Cyber-Espionage Campaign Targeting the Naval Industry MartyMcFlyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.10.17.Targeting_the_Naval_Industry/Cyber-Espionage%20Campaign%20Targeting%20the%20Naval%20Industry%20MartyMcFly.pdf
8532018-10-17e374781848bd51add20e73f9dab3e0559e4db342ESET_GreyEnergyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.10.17.GreyEnergy/ESET_GreyEnergy.pdf
8542018-10-181bf64f3fe87c916e250e3c9058d7de553e1cbbd2rp-operation-oceansalthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.10.18.Operation_Oceansalt/rp-operation-oceansalt.pdf
8552018-10-189867f20bf345ae417068e4e248f3ca610679ab67Tracking Tick Through Recent Campaigns Targeting East Asiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.10.18.Datper_Bronze_Butler/Tracking%20Tick%20Through%20Recent%20Campaigns%20Targeting%20East%20Asia.pdf
8562018-10-18ad122d87969c575dd5e33baa8fb1d9c81ba87a37APT Sidewinder changes theirs TTPs to install their backdoorhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.10.18.APT_Sidewinder_changes/APT%20Sidewinder%20changes%20theirs%20TTPs%20to%20install%20their%20backdoor.pdf
8572018-10-19f6d34d11a7ff08fe70d0597bc5c9170c6bd0d1a0DarkPulsarhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.10.19.DarkPulsar/DarkPulsar.pdf
8582018-11-01e484a67cc8eea37971aca97bbd9b4a82f33d6867Perl-Based Shellbot Looks to Target Organizations via C&C - TrendLabs Security Intelligence Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.11.01_Outlaw_group/Perl-Based%20Shellbot%20Looks%20to%20Target%20Organizations%20via%20C%26C%20-%20TrendLabs%20Security%20Intelligence%20Blog.pdf
8592018-11-05edb93a3ba0243acaaff29dc0534fcd8c51485210Inception Attackers Target Europe with Year-old Office Vulnerabilityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.11.05.Inception_Attackers_Target_Europe/Inception%20Attackers%20Target%20Europe%20with%20Year-old%20Office%20Vulnerability.pdf
8602018-11-0828bff667e0ace1f45ae14494dc87eb0bec7706b1FASTCash How the Lazarus Group is Emptying Millions from ATMshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.11.08.FASTCash/FASTCash%20How%20the%20Lazarus%20Group%20is%20Emptying%20Millions%20from%20ATMs.pdf
8612018-11-13e1df7c52e9fd6492e4f03cfbc92c38e8cfbab629cta-2018-1113https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.11.13.China.TEMP.Periscope.Using.Russian_APT/cta-2018-1113.pdf
8622018-11-19ad4a68888093e0ce4d64f65aa14740dae5e72267not-so-cozy-an-uncomfortable-examination-of-a-suspected-apt29-phishing-campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.11.19.APT29_Phishing/not-so-cozy-an-uncomfortable-examination-of-a-suspected-apt29-phishing-campaign.pdf
8632018-11-20132278dbc802a2ada7f65716e8838627bee0e34eblog.trendmicro.com-Lazarus Continues Heists Mounts Attacks on Financial Organizations in Latin Americahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.11.20.lazarus-in-latin-america/blog.trendmicro.com-Lazarus%20Continues%20Heists%20Mounts%20Attacks%20on%20Financial%20Organizations%20in%20Latin%20America.pdf
8642018-11-26c10757263570d6941a5f0ca2b5b6923271b54eb83ve_google_whiteops_whitepaper_final_nov_2018https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.11.The_Hunt_for_3ve/3ve_google_whiteops_whitepaper_final_nov_2018.pdf
8652018-11-275217218444c642545031eaaabe9a0dd0f8dc4644DNSpionage Campaign Targets Middle Easthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.11.27.dnspionage-campaign-targets-middle-east/DNSpionage%20Campaign%20Targets%20Middle%20East.pdf
8662018-11-2831a8d8375950c344cb78209108b22421c173c360MuddyWater-Operations-in-Lebanon-and-Omanhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.11.28.MuddyWater-Operations-in-Lebanon-and-Oman/MuddyWater-Operations-in-Lebanon-and-Oman.pdf
8672018-11-2835e08265a41e32c77ebe08160d03ce089538a540Tropic_Trooper_microsofthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.11.28.Tropic_Trooper_microsoft/Tropic_Trooper_microsoft.pdf
8682018-11-29acc670862c4fc12a28385b0c4438d1e32fd917edEN_versionhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.11.29.Attack_Pakistan_By_Exploiting_InPage/EN_version.pdf
8692018-11-29eeb029f9c371d643f873c820de334e46f7bf65b1CN_versionhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.11.29.Attack_Pakistan_By_Exploiting_InPage/CN_version.pdf
8702018-11-3023c0a1812535edbe41637784380ff52e7f9fb777PowerShell-based Backdoor Found in Turkey Strikingly Similar to MuddyWater Toolshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.11.30.MuddyWater_Turkey/PowerShell-based%20Backdoor%20Found%20in%20Turkey%20Strikingly%20Similar%20to%20MuddyWater%20Tools.pdf
8712018-12-11a8dce1d441f06cebb3143ab16b50b4e227334433Poking the Bear Three-Year Campaign Targets Russian Critical Infrastructurehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.12.11.Poking_the_Bear/Poking%20the%20Bear%20Three-Year%20Campaign%20Targets%20Russian%20Critical%20Infrastructure.pdf
8722018-12-122998cd09a78c8243fbeea94dc6735e8fef7a81f4Donot_Grouphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.12.12.Donot_Group/Donot_Group.pdf
8732018-12-1247f5e50b6f18b96f012420b536a1ff120f74c45frp-operation-sharpshooterhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.12.12.Operation_Sharpshooter/rp-operation-sharpshooter.pdf
8742018-12-1326d05e39aa461719fe2b2cf00ac510e976374624The Return of The Charming Kittenhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.12.13.Charming_Kitten_Return/The%20Return%20of%20The%20Charming%20Kitten.pdf
8752018-12-139aaded6d8c889c00bb1f185c511815ecdaba7c29Shamoon 3 Targets Oil and Gas Organizationhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.12.13.Shamoon_3/Shamoon%203%20Targets%20Oil%20and%20Gas%20Organization.pdf
8762018-12-13e0e24015e1791320e5e81cd74aa57d88d4f5ef08tech-brief-tildeb-analyzing-the-18-year-old-implant-from-the-shadow-brokers-leakhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.12.13.Tildeb_Shadow_Brokers/tech-brief-tildeb-analyzing-the-18-year-old-implant-from-the-shadow-brokers-leak.pdf
8772018-12-18eb626a52cbeb7c4a61000db8969ff6b7b0b3fdb4URSNIF, EMOTET, DRIDEX and BitPaymer Gangs Linked by a Similar Loaderhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.12.18.ursnif-emotet-dridex-and-bitpaymer-gangs/URSNIF%2C%20EMOTET%2C%20DRIDEX%20and%20BitPaymer%20Gangs%20Linked%20by%20a%20Similar%20Loader.pdf
8782018-12-203e599de2f9e4fcf383811d108da149e929ac811eanalyzing WindShift implant OSX.WindTailhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.12.20.WindShift_Middle_East/analyzing%20WindShift%20implant%20OSX.WindTail.pdf
8792018-12-27758d6fbdac76f237dea044f336fc70cdadc5ccdcThe Enigmatic Roma225 Campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.12.27.Roma225_Campaign/The%20Enigmatic%20Roma225%20Campaign.pdf
8802018-12-282373a41ce9dd7c86d4491d978fddf887d9a1fc87Goblin Panda changes the dropper and reuses the old infrastructurehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2018/2018.12.28.Goblin_Panda/Goblin%20Panda%20changes%20the%20dropper%20and%20reuses%20the%20old%20infrastructure.pdf
8812019-01-07bf6386b0b06d481f5a8ae83e4147602a801a722aThe APT Chronicles_December 2018nbspeditionhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/2019.01.07.APT_chronicles_december_2018_edition/The%20APT%20Chronicles_December%202018nbspedition.pdf
8822019-01-09962b31ff9078b4fee4cc8c01a10526e9880942272018 APT Summary Report CN versionhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/2019.01.09.360_APT_Summary_report_2018_CN_Version/2018%20APT%20Summary%20Report%20CN%20version.pdf
8832019-01-15ac2bcbe0818c394ec66612060f81d4f6860ade302018_ A Year of Cyber Attacks HACKMAGEDDONhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/2019.01.15.2018-a-year-of-cyber-attacks/2018_%20A%20Year%20of%20Cyber%20Attacks%20%E2%80%93%20HACKMAGEDDON.pdf
8842019-01-15d6591e1135863c0b593212b46cd3886c794313712018 Master Tablehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/2019.01.15.2018-a-year-of-cyber-attacks/2018%20Master%20Table.pdf
8852019-01-16ca53a7cbf0df4fedcd284d8879c1b04273b46371darkhydruns-group-against-middle-east-cnhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.01.16.DarkHydruns/darkhydruns-group-against-middle-east-cn.pdf
8862019-01-16d1eece026635773310f0aa00e05898db7853dab0darkhydruns-group-against-middle-east-enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.01.16.DarkHydruns/darkhydruns-group-against-middle-east-en.pdf
8872019-01-17878dfa6ec75c711215f74a8761c62bd1fbbcf130Malware Used by Rocke Group Evolves to Evade Detection by Cloud Security Productshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.01.17.Rocke_Group/Malware%20Used%20by%20Rocke%20Group%20Evolves%20to%20Evade%20Detection%20by%20Cloud%20Security%20Products.pdf
8882019-01-183dfeb09452c6e80bcde7e900ed00034245bc7e98DarkHydrus delivers new Trojan that can use Google Drive for C2 communicationshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.01.18.DarkHydrus/DarkHydrus%20delivers%20new%20Trojan%20that%20can%20use%20Google%20Drive%20for%20C2%20communications.pdf
8892019-01-189242d06642b234904eae8d1d9535e8b97a7ac902[Lab52] WIRTE Group attacking the Middle Easthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.01.18.WIRTE_Group_attacking_the_Middle_East/%5BLab52%5D%20WIRTE%20Group%20attacking%20the%20Middle%20East.pdf
8902019-01-244873e2465fc56fca681074f5069788baa80841fbGandCrab and Ursnif Campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.01.24.GandCrab_and_Ursnif/GandCrab%20and%20Ursnif%20Campaign.pdf
8912019-01-2464827e1bc8da8e53ee871703e5844d4e7e36a504ENISA_Threat_Landscape_2018https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/ENISA/ENISA_Threat_Landscape_2018.pdf
8922019-01-306d3e9e4aedd2b19d03cec69e62ea1a21dfc109c2dragos.com-Webinar Summary Uncovering ICS Threat Activity Groupshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/2019.01.30.Uncovering_ICS_Threat_Activity_Groups/dragos.com-Webinar%20Summary%20Uncovering%20ICS%20Threat%20Activity%20Groups.pdf
8932019-01-3078015d4cfa050ab7bb0c91c85832826ad622c699dragosactivitygroupswebinarfinal-190122171111https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/2019.01.30.Uncovering_ICS_Threat_Activity_Groups/dragosactivitygroupswebinarfinal-190122171111.pdf
8942019-01-309707e48b8b7bdca8d17e74292142a5a4dd344f64Chafer used Remexi malware to spy on Iran-based foreign diplomatic entitieshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.01.30.Chafer_APT_Spy_Iran/Chafer%20used%20Remexi%20malware%20to%20spy%20on%20Iran-based%20foreign%20diplomatic%20entities.pdf
8952019-01-30bcbf65db4d9ef65d3e835ba3ad2823bac5116cd7New Campaign delivers orcus rathttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.01.30.ORCUS_RAT/New%20Campaign%20delivers%20orcus%20rat.pdf
8962019-01-30ed0a08898e6dbfeda9f312589c6fbb3e8cdd6d8cOperation_Kitty_Phishinghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.01.30.Operation_Kitty_Phishing/Operation_Kitty_Phishing.pdf
8972019-02-0131aeff98e5ecc985d570f5b88204900aba65a6cdOceanLotus_KerrDownhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.02.01.OceanLotus_KerrDown/OceanLotus_KerrDown.pdf
8982019-02-02dc4c90680a3172d00bf5ec6c025aab587c55f7b2Threat_Intel_Reads_January_2019https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/2019.02.02.Threat_Intel_Reads_January_2019/Threat_Intel_Reads_January_2019.pdf
8992019-02-05b8827637dc77db1c5fbe8b5f83ca0e517cfe6742Analyzing Digital Quartermasters in Asia Do Chinese and Indian APTs Have a Shared Supply Chainhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.02.05.China_India_APT_shared/Analyzing%20Digital%20Quartermasters%20in%20Asia%20%20Do%20Chinese%20and%20Indian%20APTs%20Have%20a%20Shared%20Supply%20Chain.pdf
9002019-02-0606cd0e5cf1092f8950dd6736f684ad5d4c9c4d63APT10 Targeted Norwegian MSP and US Companies in Sustained Campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.02.06.APT10_Sustained_Campaign/APT10%20Targeted%20Norwegian%20MSP%20and%20US%20Companies%20in%20Sustained%20Campaign.pdf
9012019-02-0687f5158d77ea898b705d34760578696818ed5ad8cta-2019-0206https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.02.06.APT10_Sustained_Campaign/cta-2019-0206.pdf
9022019-02-120f2ab054007a34b73bcaa8f0fffe93d0854903ea2019.01.03.Tencent_APT_Summary_report_2018_CN_Versionhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/Tencent/2019.01.03.Tencent_APT_Summary_report_2018_CN_Version.pdf
9032019-02-14b5eb1493e06e786d1bb670970292444aca01b0ebsuspected-molerats-new-attack-in-the-middle-east-cnhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.02.14.Molerats_APT/suspected-molerats-new-attack-in-the-middle-east-cn.pdf
9042019-02-14d0b189531bfd952480d2453dc52fae166f5e2d38suspected-molerats-new-attack-in-the-middle-east-enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.02.14.Molerats_APT/suspected-molerats-new-attack-in-the-middle-east-en.pdf
9052019-02-18e92cedebb135ec0a3c3eb63be47e1b1ac7684868apt-c-36-continuous-attacks-targeting-colombian-government-institutions-and-corporations-enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.02.18.APT-C-36.Colombian/apt-c-36-continuous-attacks-targeting-colombian-government-institutions-and-corporations-en.pdf
9062019-02-2043107b5d8f5782f17154718c9ba4de0487bcfc8eLAZARUS GROUP DIRECTED TO ORGANIZATIONS IN RUSSIA_google_translatehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.02.20.LAZARUS_to_RUSSIA/LAZARUS%20GROUP%20DIRECTED%20TO%20ORGANIZATIONS%20IN%20RUSSIA_google_translate.pdf
9072019-02-20ac9f460fc3837cd78ae7f801a5879186e0fe486dSE IDENTIFICÓ ATAQUES DEL GRUPO CIBERCRIMINAL LAZARUS DIRIGIDOS A ORGANIZACIONES EN RUSIAhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.02.20.LAZARUS_to_RUSSIA/SE%20IDENTIFIC%C3%93%20ATAQUES%20DEL%20GRUPO%20CIBERCRIMINAL%20LAZARUS%20DIRIGIDOS%20A%20ORGANIZACIONES%20EN%20RUSIA.pdf
9082019-02-25e8da32324db0d8ffd0eefdaf2b3e68ed75920bd4Defeating Compiler-Level Obfuscations Used in APT10 Malwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.02.25.APT10_Defeating_Compiler_Level/Defeating%20Compiler-Level%20Obfuscations%20Used%20in%20APT10%20Malware.pdf
9092019-02-26ed64dc87623be86dd2022c5e54468c28ba346579The Arsenal Behind the Australian Parliament Hackhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.02.26.Australian_Parliament_Hack/The%20Arsenal%20Behind%20the%20Australian%20Parliament%20Hack.pdf
9102019-02-27fe1ecb3fe582b44e53db1af17692b656a85e7a71A Peek into BRONZE UNIONs Toolboxhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.02.27.BRONZE_UNION_Toolbox/A%20Peek%20into%20BRONZE%20UNION%E2%80%99s%20Toolbox.pdf
9112019-02-281e1e10f905ed8c228a9f2d12da860c7f7defa1f1Ransomware, Trojan and Miner together against “PIK-Group”https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.02.28_RIK_Group/Ransomware%2C%20Trojan%20and%20Miner%20together%20against%20%E2%80%9CPIK-Group%E2%80%9D.pdf
9122019-03-037b5e4cedebc4e632266e8ecfcd590e44472600f2rpt-mtrends-2019https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/FireEye/rpt-mtrends-2019.pdf
9132019-03-046c3b0f70362d993f6d48d87bcb2013a237ab4dc0APT40 Examining a China-Nexus Espionage Actor APT40 Examining a China-Nexus Espionage Actorhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.03.04.APT40/APT40%20Examining%20a%20China-Nexus%20Espionage%20Actor%20%20APT40%20Examining%20a%20China-Nexus%20Espionage%20Actor.pdf
9142019-03-0685447c9971470c2e679bb3d87d2244d1e75bf208Whitefly_ Espionage Group has Singapore in Its Sightshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.03.06.Whitefly/Whitefly_%20Espionage%20Group%20has%20Singapore%20in%20Its%20Sights.pdf
9152019-03-06b458794cf9d35847c92bd2b231e52e85eb228ae2taidoor_analysis_jphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.03.06_Taidoor_Analysis/taidoor_analysis_jp.pdf
9162019-03-06fc4dc028e5a66d4b050a04ab4216843f0c4ee2f2Operation_Pistacchiettohttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.03.06.Operation_Pistacchietto/Operation_Pistacchietto.pdf
9172019-03-07ad73a0c600d6ad86f41a78f57fd76aa2d62192f4security-report-2019https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/2019.02.Targeted_Attacks/security-report-2019.pdf
9182019-03-07d5fb10e16b4f2346fe2fcbeac9f8f2beccc914e3New SLUB Backdoor Uses GitHub Communicates via Slackhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.03.07.SLUB_Backdoor/New%20SLUB%20Backdoor%20Uses%20GitHub%20Communicates%20via%20Slack.pdf
9192019-03-08edbd146351a40f307247b887b8f95e625cb62336Supply Chain The Major Target of Cyberespionage Groupshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.03.08.Supply_Chain_Groups/Supply%20Chain%20%E2%80%93%20The%20Major%20Target%20of%20Cyberespionage%20Groups.pdf
9202019-03-11ad4f0b93e90f4b08ed4fd3087fcee922b799caf9Gaming-Industry.Asiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.03.11.Gaming-Industry.Asia/Gaming-Industry.Asia.pdf
9212019-03-120a2d87f6690cff2fee583b3cdb44a2bf10c0dd6aOperation_Comandohttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.03.12.Operation_Comando/Operation_Comando.pdf
9222019-03-130402511221158a29056e8ec6f9337fe40fec18c7Operation_Sheephttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.03.13.Operation_Sheep/Operation_Sheep.pdf
9232019-03-1333b3a24e5f3bbb9d99289fa01f2cdab26d21b7a6DMSniff_POS_Malwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.03.13.DMSniff_POS_Malware/DMSniff_POS_Malware.pdf
9242019-03-136180b9b0b136037f8cc95d9d536cd7d3aaecf9c9GlitchPOS_New_Pos_Malwre_for_salehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.03.13.GlitchPOS_POS_Malware/GlitchPOS_New_Pos_Malwre_for_sale.pdf
9252019-03-137a817b1dd112b073102b2ca818c1b5ffb66dd6a2Report2019GlobalThreatReporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/CrowdStrike/Report2019GlobalThreatReport.pdf
9262019-03-22ea7913a00bfc6a4a9e71a5a3c2f251f67fe8c423LUCKY ELEPHANT Campaign Masqueradinghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.03.22.LUCKY_ELEPHANT/LUCKY%20ELEPHANT%20Campaign%20Masquerading.pdf
9272019-03-2549542f14b3ca6ec343864ac390278b879c443272Operation ShadowHammerhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.03.25.Operation_ShadowHammer/Operation%20ShadowHammer.pdf
9282019-03-276feab33a7a268f5e3b6facf38d46d0db42cfb664Elfin Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and UShttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.03.27.Elfin/Elfin%20Relentless%20Espionage%20Group%20Targets%20Multiple%20Organizations%20in%20Saudi%20Arabia%20and%20US.pdf
9292019-03-2804a318c39f4453a0ccab6901c8558035fb28c88eDesktop, Mobile Phishing Campaign Targets South Korean Websites, Steals Credentials Via Watering Holehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.03.28.Desktop_Mobile_Phishing_Campaign/Desktop%2C%20Mobile%20Phishing%20Campaign%20Targets%20South%20Korean%20Websites%2C%20Steals%20Credentials%20Via%20Watering%20Hole.pdf
9302019-03-28a402f58c3fec03e316f0a32a06f8d27e1139e91fAbove+Us+Only+Starshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.03.28.Exposing_GPS_Spoofing_in_Russia_and_Syria/Above%2BUs%2BOnly%2BStars.pdf
9312019-03-28bc9559486d50da1b8b146b9e79eac54a3f687ad9Threat Actor Group using UAC Bypass Module to run BAT Filehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.03.28.UAC_Bypass_BAT_APT/Threat%20Actor%20Group%20using%20UAC%20Bypass%20Module%20to%20run%20BAT%20File.pdf
9322019-03-29b65c2bd1f50ac2172ba00b59e1dc08750f7d7089Group-IB_js-sniffershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/Group-IB/Group-IB_js-sniffers.pdf
9332019-04-026645296c925133446d4e213a547235692761d5c2OceanLotus-Steganography-Malware-Analysis-White-Paperhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.04.02.OceanLotus_Steganography/OceanLotus-Steganography-Malware-Analysis-White-Paper.pdf
9342019-04-103480bf45d133f7d3ba136459a553b7e31d0a7945ASEC_REPORT_vol.94_ENGhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/AhnLab/ASEC_REPORT_vol.94_ENG.pdf
9352019-04-106b072f25aa4a4e3071a95d5a0fd24db526982ab5Gaza Cybergang Group1 operation SneakyPasteshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.04.10.Operation_SneakyPastes/Gaza%20Cybergang%20Group1%20operation%20SneakyPastes.pdf
9362019-04-10c3cd4cdd06ff5b16a71e70b7553ccf9f8e6b7398Project TajMahalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.04.10.Project_TajMahal/Project%20TajMahal.pdf
9372019-04-10dbc6091818e127de82037d85aacb7c481c4f5cf9The Muddy Waters of APT Attackshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.04.10.Muddy_Waters/The%20Muddy%20Waters%20of%20APT%20Attacks.pdf
9382019-04-1763d59610f60df26243e333a3b55f0b24e4b277ceDNS Hijacking Abuses Trust In Core Internet Servicehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.04.17.Operation_Sea_Turtle/DNS%20Hijacking%20Abuses%20Trust%20In%20Core%20Internet%20Service.pdf
9392019-04-1785bcaafddb3ff5885c24b6c80dbb6a400225c7e7Aggah Campaign_ Bit.ly, BlogSpot, and Pastebin Used for C2 in Large Scale Campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.04.17.Aggah_Campaign/Aggah%20Campaign_%20Bit.ly%2C%20BlogSpot%2C%20and%20Pastebin%20Used%20for%20C2%20in%20Large%20Scale%20Campaign.pdf
9402019-04-190acc6bd7228fe5a1b059de2ba51e76cbe9717fc4Funky malware format found in Ocean Lotus samplehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.04.19.Funky_malware_format/Funky%20malware%20format%20found%20in%20Ocean%20Lotus%20sample.pdf
9412019-04-220a977831b7d744518f28166129f70d575f59c706FINTEAM Trojanized TeamViewer Against Government Targetshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.04.22.FINTEAM/FINTEAM%20Trojanized%20TeamViewer%20Against%20Government%20Targets.pdf
9422019-04-23abc7a05c68aa39ac904c0f59a30c583f7c379da0Operation ShadowHammerhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.04.23.Operation_ShadowHammer/Operation%20ShadowHammer.pdf
9432019-04-24caac870b8cbd272994634d3816596b7cffaf3a65CyberInt_Legit Remote Access Tools Turn Into Threat Actors' Tools_Reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.04.24.TA505_Abusing_Legit_Remote_Admin_Tool/CyberInt_Legit%20Remote%20Access%20Tools%20Turn%20Into%20Threat%20Actors%27%20Tools_Report.pdf
9442019-04-30ebffba8a872949b48dfccc012ab5ddb43e72ec32SectorB06 using Mongolian language in lure documenthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.04.30.SectorB06_Mongolian/SectorB06%20using%20Mongolian%20language%20in%20lure%20document.pdf
9452019-05-032a4e1461e95a6686cc8674c594d657864af2fdd4ZooPark_for_public_final_editedhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.05.03.ZooPark/ZooPark_for_public_final_edited.pdf
9462019-05-072a04fb97ff89595bc49dd71a7246402e3b355cc6ATMitch_ New Evidence Spotted In The Wildhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.05.07.ATMitch/ATMitch_%20New%20Evidence%20Spotted%20In%20The%20Wild.pdf
9472019-05-0744ea6ae12ca986a5d64d3207c7aa4fb3cf33559fESET-LightNeuronhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.05.07.Turla_LightNeuron/ESET-LightNeuron.pdf
9482019-05-07cc79d68f7bbad680581f53cc4a797e27ff7f2d6dBuckeye_ Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leakhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.05.07.Buckeye/Buckeye_%20Espionage%20Outfit%20Used%20Equation%20Group%20Tools%20Prior%20to%20Shadow%20Brokers%20Leak.pdf
9492019-05-0830c64f7061efd41ebb2621201ff7bcda966b9bf4FIN7.5_ the infamous cybercrime rig “FIN7” continues its activitieshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.05.08.Fin7.5/FIN7.5_%20the%20infamous%20cybercrime%20rig%20%E2%80%9CFIN7%E2%80%9D%20continues%20its%20activities.pdf
9502019-05-08619395650b3c940cb49565b2d3ec3f720aab829cOceanLotus Attacks to Indochinese Peninsulahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.05.08.OceanLotus/OceanLotus%20Attacks%20to%20Indochinese%20Peninsula.pdf
9512019-05-09ce32030f97d19ef396191e8fe995c48d22e5d345Iranian-Nation-State-APT-Leak-Analysis-and-Overviewhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.05.09.Iranian_APT_Leak/Iranian-Nation-State-APT-Leak-Analysis-and-Overview.pdf
9522019-05-1141c70ebe7812a4294dd57b68c88f759a5e0ce383Chineses Actor APT target Ministry of Justice Vietnamesehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.05.11.Chinese_APT_Vietnamese/Chineses%20Actor%20APT%20target%20Ministry%20of%20Justice%20Vietnamese.pdf
9532019-05-139d46bb706eb0d5d43dc905423023e9aff6991c55ScarCruft continues to evolve, introduces Bluetooth harvester _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.05.13.ScarCruft_Bluetooth/ScarCruft%20continues%20to%20evolve%2C%20introduces%20Bluetooth%20harvester%20_%20Securelist.pdf
9542019-05-13bde94f1f14bf4eab0c2e31a11b49fe9876052b8bAPT_trends_report_Q1_2019_Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/Kaspersky/APT_trends_report_Q1_2019_Securelist.pdf
9552019-05-1562d22fd778d5bf335028f9386e92f8b9aa9811a3Winnti_ More than just Windows and Gateshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.05.15.Winnti_More/Winnti_%20More%20than%20just%20Windows%20and%20Gates.pdf
9562019-05-188dd85d0b058d6c9b1690bf6fb27664580cb3bf8aOperation_BlackLion_CN_Versionhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.05.18.Operation_BlackLion/Operation_BlackLion_CN_Version.pdf
9572019-05-19c8ff7fe5837302a788e0d7f6c3fa24c05085399fHiddenWasp Malware Stings Targeted Linux Systemshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.05.19.HiddenWasp_Linux/HiddenWasp%20Malware%20Stings%20Targeted%20Linux%20Systems.pdf
9582019-05-22292a82b4d699244f339dfa66e7e8d0f7661a2c8fA journey to Zebrocy landhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.05.22.Zebrocy_Land/A%20journey%20to%20Zebrocy%20land.pdf
9592019-05-24fe7fcff34a36daaf1e988c0f20d828109848738fUncovering New Activity By APT10https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.05.24_APT10_New_Activity/Uncovering%20New%20Activity%20By%20APT10.pdf
9602019-05-272efff1ec551ea165c19822b678c4d3368f066159APT-C-38_cnhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.05.27.APT-C-38/APT-C-38_cn.pdf
9612019-05-273c39c3b63249d38e1637d2d0a47edb52c25276bfAPT-C-38_en_google_translatehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.05.27.APT-C-38/APT-C-38_en_google_translate.pdf
9622019-05-289ddcf2053edf7a3ec8fb74ab679878d82c6641e7Emissary Panda Attacks Middle East Government Sharepoint Servershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.05.28.Emissary_Panda/Emissary%20Panda%20Attacks%20Middle%20East%20Government%20Sharepoint%20Servers.pdf
9632019-05-293aaa08c08ae5f7adadadc35a1e4302dc943be6c2TA505 is Expanding its Operationshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.05.29.TA505/TA505%20is%20Expanding%20its%20Operations.pdf
9642019-05-29a6ba7a30e00dec1c0341a901572825a60753e53bA dive into Turla PowerShell usagehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.05.29.Turla_PowerShell/A%20dive%20into%20Turla%20PowerShell%20usage.pdf
9652019-05-3076e14cfaa39d05af8d921b02aab1016b5d998f1aTalos Blog __ Cisco Talos Intelligence Group - Comprehensive Threat Intelligence_ 10 years of virtual dynamite_ A high-level retrospective of ATM malwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.05.30.10_Years_ATM_Malware/Talos%20Blog%20__%20Cisco%20Talos%20Intelligence%20Group%20-%20Comprehensive%20Threat%20Intelligence_%2010%20years%20of%20virtual%20dynamite_%20A%20high-level%20retrospective%20of%20ATM%20malware.pdf
9662019-06-037a66214339c20e72e3fe442504e81a8b552f6a2bZebrocy Multilanguage Malware Saladhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.06.03.Zebrocy/Zebrocy%20Multilanguage%20Malware%20Salad.pdf
9672019-06-041d2a2587e69517b4af1af2aca67f3048e624583cAn-APT-Blueprint-Gaining-New-Visibility-into-Financial-Threats-interactivehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.06.04.APT_Blueprint/An-APT-Blueprint-Gaining-New-Visibility-into-Financial-Threats-interactive.pdf
9682019-06-05da5367c9a88967ac55d056236f865d9f220995bescattered-canaryhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.06.05.Scattered_Canary/scattered-canary.pdf
9692019-06-1065d6629d404ee56e787d34e1220ebb9fc59e3733Threat Spotlight_ MenuPass_QuasarRAT Backdoorhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.06.10.MenuPass_QuasarRAT_Backdoor/Threat%20Spotlight_%20MenuPass_QuasarRAT%20Backdoor.pdf
9702019-06-10ae3f5f3ef2ca2f5e90c1909b47566255452291edwp_new_muddywater_findings_uncoveredhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.06.10.MuddyWater_Resurfaces/wp_new_muddywater_findings_uncovered.pdf
9712019-06-10f09b15eefe23d664f889c7ffcfd4fb1be6667ff7blog_new_muddywater_findings_uncoveredhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.06.10.MuddyWater_Resurfaces/blog_new_muddywater_findings_uncovered.pdf
9722019-06-11400e04bf19bcfa10af7df51240f27bab15f12644The Discovery of Fishwrap_ A New Social Media Information Operation Methodologyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.06.11.Fishwrap_Group/The%20Discovery%20of%20Fishwrap_%20A%20New%20Social%20Media%20Information%20Operation%20Methodology.pdf
9732019-06-11e9a48a1a62bc4d489aad6ebc74effcd32185c39acta-2019-0612https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.06.11.Fishwrap_Group/cta-2019-0612.pdf
9742019-06-12995f3a4bce373530924a55e84cc574ee6d3fcfbfThreat Group Cardshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.06.12.Threat_Group_Cards/Threat%20Group%20Cards.pdf
9752019-06-202b11ea5b0277264f527bfaff62e4ae5510b7521aOceanLotushttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.06.20.OceanLotus_New_Approaches/OceanLotus.pdf
9762019-06-2159a715d0a7248235ea9291d0ff374cc9036ce956Waterbug_ Espionage Group Rolls Out Brand-New Toolset in Attacks Against Governmentshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.06.21.Waterbug/Waterbug_%20Espionage%20Group%20Rolls%20Out%20Brand-New%20Toolset%20in%20Attacks%20Against%20Governments.pdf
9772019-06-25a2c44d6f87fc6ec9067b543489eda3e5212a92f6MuddyC3https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.06.25.MuddyC3/MuddyC3.pdf
9782019-06-25fa04b0ea75e68099ee012da02872f9138b6362c0Operation Soft Cell_ A Worldwide Campaign Against Telecommunications Providershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.06.25.Operation_Soft_Cell/Operation%20Soft%20Cell_%20A%20Worldwide%20Campaign%20Against%20Telecommunications%20Providers.pdf
9792019-06-2634e9bd7aa78ee059a78b0575dfe21ef50cc8714aASEC_REPORT_vol.95_ENGhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/AhnLab/ASEC_REPORT_vol.95_ENG.pdf
9802019-06-26de735ed34de84f6101fb2a90f36d69f0fd90ba6ecta-2019-0626https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.06.26.Iranian_to_Saudi/cta-2019-0626.pdf
9812019-06-27f48dd456559ef8f158786535e70c8fb86f193086ShadowGate Returns to Worldwide Operations With Evolved Greenflash Sundown Exploit Kithttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.06.27.ShadowGate_Returns/ShadowGate%20Returns%20to%20Worldwide%20Operations%20With%20Evolved%20Greenflash%20Sundown%20Exploit%20Kit.pdf
9822019-07-01ac7434961a98d0994f352e917c30b1bf118cbb7fNew Network Vermin from OceanLotushttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.07.01.OceanLotus_Ratsnif/New%20Network%20Vermin%20from%20OceanLotus.pdf
9832019-07-01af54e77fd3be3089a4cb100c87b57243eeb33c5cOperation Tripoli https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.07.01.Operation_Tripoli/Operation%20Tripoli%20.pdf
9842019-07-03b2d41d9df27085f0362d6ce402bd438191e44611Multiple Chinese Threat Groups Exploiting CVE-2018-0798 Equation Editor Vulnerability Since Late 2018https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.07.03.Chinese_APT_CVE-2018-0798/Multiple%20Chinese%20Threat%20Groups%20Exploiting%20CVE-2018-0798%20Equation%20Editor%20Vulnerability%20Since%20Late%202018.pdf
9852019-07-0404da12e4c212bd727bc80d7fd34b99a99fbc01f0Twas the night beforehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.07.04.NewsBeef_APT/Twas%20the%20night%20before.pdf
9862019-07-0464aaf1f5805a05b764dce466e56b95d949384d3dLatest Spam Campaigns from TA505 Now Using New Malware Tools Gelup and FlowerPippihttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.07.04.TA505_Gelup_FlowerPippi/Latest%20Spam%20Campaigns%20from%20TA505%20Now%20Using%20New%20Malware%20Tools%20Gelup%20and%20FlowerPippi.pdf
9872019-07-04a082ec5024c8f285011e9287fa2b4c65dc13f784Tech-Brief-Latest-Spam-Campaigns-from-TA505-Now-Using-New-Malware-Tools-Gelup-and-FlowerPippihttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.07.04.TA505_Gelup_FlowerPippi/Tech-Brief-Latest-Spam-Campaigns-from-TA505-Now-Using-New-Malware-Tools-Gelup-and-FlowerPippi.pdf
9882019-07-04ca8b92328e1e85f3aa6e210d755b2304a7ac92c5Appendix-Latest-Spam-Campaigns-from-TA505-Now-Using-New-Malware-Tools-Gelup-and-FlowerPippihttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.07.04.TA505_Gelup_FlowerPippi/Appendix-Latest-Spam-Campaigns-from-TA505-Now-Using-New-Malware-Tools-Gelup-and-FlowerPippi.pdf
9892019-07-09395d694e53af9f7d880ea552184d73da10113932Sea Turtle keeps on swimming, finds new victims, DNS hijacking techniqueshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.07.09.SeaTurtle_swimming/Sea%20Turtle%20keeps%20on%20swimming%2C%20finds%20new%20victims%2C%20DNS%20hijacking%20techniques.pdf
9902019-07-1193a54e05256a696ca20d04ad96cac47ff217fe46Buhtrap group uses zeroday in latest espionage campaignshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.07.11.Buhtrap_Group/Buhtrap%20group%20uses%20zero%E2%80%91day%20in%20latest%20espionage%20campaigns.pdf
9912019-07-15f70124b7928375bd7bcfaacfc82a3ce0c2f915b9Comprehensive Threat Intelligence_ SWEED_ Exposing years of Agent Tesla campaignshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.07.15.SWEED/Comprehensive%20Threat%20Intelligence_%20SWEED_%20Exposing%20years%20of%20Agent%20Tesla%20campaigns.pdf
9922019-07-1655126780b716d34c5c6008e532a90033d711b9ceSLUB Gets Rid of GitHub, Intensifies Slack Usehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.07.16.SLUB/SLUB%20Gets%20Rid%20of%20GitHub%2C%20Intensifies%20Slack%20Use.pdf
9932019-07-17d7d64b499ca32d365e725759c7954e2402245243Newly identified StrongPity operations _ AT&T Alien Labshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.07.17.StrongPity_operations/Newly%20identified%20StrongPity%20operations%20_%20AT%26T%20Alien%20Labs.pdf
9942019-07-17e5e69cfd5429be15882d043f1938318d889b9f13EvilGnome_ Rare Malware Spying on Desktop Usershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.07.17.EvilGnome/EvilGnome_%20Rare%20Malware%20Spying%20on%20Desktop%20Users.pdf
9952019-07-180dad2641edd25884332561da5c6f489ad7f03287Appendix_Spam_Campaign_Targets_Colombian_Entities_with_Custom_made_Proyecto_RAT_Uses_Email_Service_YOPmail_for_C&Chttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.07.18.Proyecto_RAT_Colombian/Appendix_Spam_Campaign_Targets_Colombian_Entities_with_Custom_made_Proyecto_RAT_Uses_Email_Service_YOPmail_for_C%26C.pdf
9962019-07-18358d09240838bd7382a6ee58371630ba664417f3ESET_Okrum_and_Ketricanhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.07.18.Okrum/ESET_Okrum_and_Ketrican.pdf
9972019-07-18ab5a3d917c59c67a94fde5589a312a8e6ad8226bHard Pass_ Declining APT34s Invite to Join Their Professional Networkhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.07.18.APT34_Hard_Pass/Hard%20Pass_%20Declining%20APT34%E2%80%99s%20Invite%20to%20Join%20Their%20Professional%20Network.pdf
9982019-07-18d1a406b5f3f4da0e835a7a2615a75c39dc97625eSpam Campaign Targets Colombian Entities with Custom-made Proyecto RAThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.07.18.Proyecto_RAT_Colombian/Spam%20Campaign%20Targets%20Colombian%20Entities%20with%20Custom-made%20Proyecto%20RAT.pdf
9992019-07-241ed4d23f831d5a39400067baba7180048ed14bccChinese_APT_Operation_LagTime_IThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.07.24.Operation_LagTime_IT/Chinese_APT_Operation_LagTime_IT.pdf
10002019-07-24a5d4f0b2aee94d71881c40b25ef7e195397c1238Winnti_ Attacking the Heart of the German Industryhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.07.24.Winnti_German/Winnti_%20Attacking%20the%20Heart%20of%20the%20German%20Industry.pdf
10012019-07-24e4772882fe35af3650068b0665a2d12c24999e51Resurgent Iron Liberty Targeting Energy Sectorhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.07.24.Resurgent_Iron_Liberty/Resurgent%20Iron%20Liberty%20Targeting%20Energy%20Sector.pdf
10022019-08-05652b8faba79ef2ce0319b32a248f5119df2beceaMACHETE_JUST_GOT_SHARPERhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.05.Sharpening_the_Machete/MACHETE_JUST_GOT_SHARPER.pdf
10032019-08-05c7a8c2597269ab369b4f0527056f9bb13c65a2a6blog_Sharpening the Machetehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.05.Sharpening_the_Machete/blog_Sharpening%20the%20Machete.pdf
10042019-08-05fd101f08963e1a83893fb0b6d4c9a87fa767366fLatest Trickbot Campaign Delivered via Highly Obfuscated JS File https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.05.Trickbot_Obfuscated_JS/Latest%20Trickbot%20Campaign%20Delivered%20via%20Highly%20Obfuscated%20JS%20File%20.pdf
10052019-08-07019a477a367638a85bdbe72d36a1b44c227f5311report_APT41https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.07.APT41/report_APT41.pdf
10062019-08-07b8d1d27753e223c940bd1e4e3da2ceaa9aa5c798blog_APT41https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.07.APT41/blog_APT41.pdf
10072019-08-088941ac19c6806e460c52e06bca9091a528747bfeAPT_trends_report_Q2_2019_Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/Kaspersky/APT_trends_report_Q2_2019_Securelist.pdf
10082019-08-089ec45ba171c3e3e0553aa587c0ea245ee641e624Suspected BITTER APT Continues Targeting Government of China and Chinese Organizations _ Anomalihttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.08.BITTER_APT/Suspected%20BITTER%20APT%20Continues%20Targeting%20Government%20of%20China%20and%20Chinese%20Organizations%20_%20Anomali.pdf
10092019-08-1224908852ae8e0ddf8bd67d2357d3666c12a5cf65Recent Cloud Atlas activity _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.12.Cloud_Atlas_activity/Recent%20Cloud%20Atlas%20activity%20_%20Securelist.pdf
10102019-08-1436044243987dace8e439a54a8d4fce6f3508126aIn the Balkans, businesses are under fire from a doublebarreled weaponhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.14.Balkans_Campaign/In%20the%20Balkans%2C%20businesses%20are%20under%20fire%20from%20a%20double%E2%80%91barreled%20weapon.pdf
10112019-08-1967440565b692e876ec56665cf26abff2be2a9019Cybersecurity-threatscape-2019-Q1-enghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/PTSecurity/Cybersecurity-threatscape-2019-Q1-eng.pdf
10122019-08-201480230e06960862b7e019f750647ddc9d5d9954CyberThreatIntel_Malware analysis 20-08-19.md at master · StrangerealIntel_CyberThreatIntelhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.20.unknown_Chinese_APT/CyberThreatIntel_Malware%20analysis%2020-08-19.md%20at%20master%20%C2%B7%20StrangerealIntel_CyberThreatIntel.pdf
10132019-08-2149745a6ffd7b522f125c3fd57068a6071f3ddb98Cybersecurity-threatscape-2019-Q2-enghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/PTSecurity/Cybersecurity-threatscape-2019-Q2-eng.pdf
10142019-08-21bb4b9c2d558621a3feee2b00f4edcec0448646edsilence_2.0.going_globalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.21.Silence_2.0/silence_2.0.going_global.pdf
10152019-08-21cfaa2dfdf88f75f5a6d8587bbb80d8080290e999The Gamaredon Group_ A TTP Profile Analysishttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.21.Gamaredon_Group/The%20Gamaredon%20Group_%20A%20TTP%20Profile%20Analysis.pdf
10162019-08-228e6ded91de2f0755c2dabc9576cbd97d62535c68Operation-Taskmasters-2019-enghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.22.Operation_TaskMasters/Operation-Taskmasters-2019-eng.pdf
10172019-08-266f061c5514738986949d75a81905dc4556e27605APT-C-09https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.26.APT-C-09/APT-C-09.pdf
10182019-08-2707056592eb633d1fb9a42b38da28d3fd2fcc5c95China Chopper still active 9 years laterhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.27.China_Chopper/China%20Chopper%20still%20active%209%20years%20later.pdf
10192019-08-27588b19b571321e82e811aaf1179803da45f8c6cfCyber Threat Group LYCEUM Takes Center Stage in Middle East Campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.27.LYCEUM_threat_group/Cyber%20Threat%20Group%20LYCEUM%20Takes%20Center%20Stage%20in%20Middle%20East%20Campaign.pdf
10202019-08-279ced6cf135cc62446e18b0fb170b3b6fe8441047TA505 At It Again_ Variety is the Spice of ServHelper and FlawedAmmyyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.27.TA505_Again/TA505%20At%20It%20Again_%20Variety%20is%20the%20Spice%20of%20ServHelper%20and%20FlawedAmmyy.pdf
10212019-08-27b9e9c9068ccf57ff43360db27a1e992a313c7514Malware analysis about sample of APT Patchworkhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.27.Patchwork_Malware_Analysis/Malware%20analysis%20about%20sample%20of%20APT%20Patchwork.pdf
10222019-08-2961ab7b454558c8b432bda47f784667aa11f5a074SectorJ04 Groups Increased Activity in 2019https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.29.SectorJ04_2019/SectorJ04%20Group%E2%80%99s%20Increased%20Activity%20in%202019.pdf
10232019-08-29bcbd65daf124728e6731e0decb7b4e01b64864dcHeatstroke Campaign Uses Multistage Phishing Attack to Steal PayPal and Credit Card Informationhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.29.Heatstroke_Campaign/Heatstroke%20Campaign%20Uses%20Multistage%20Phishing%20Attack%20to%20Steal%20PayPal%20and%20Credit%20Card%20Information.pdf
10242019-08-29e1ba4c5db4982f4aac36cea2429be505196f7ff9tickgroupavar201920191111chaminseokpublish-191126231730https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.29_Tick_Tock/tickgroupavar201920191111chaminseokpublish-191126231730.pdf
10252019-08-29f7e0afcb7fd22d35bb6ca3bd665f830c2991b713More_eggs, Anyone_ Threat Actor ITG08 Strikes Againhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.29.FIN6_ITG08/More_eggs%2C%20Anyone_%20Threat%20Actor%20ITG08%20Strikes%20Again.pdf
10262019-08-31ce6de200409d558d88c026c9ab087ed1c836db28Bitter_APT_Malware_analysishttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.08.31.Bitter_APT_Malware_analysis/Bitter_APT_Malware_analysis.pdf
10272019-09-048cde271eb5fe7b54b667ee88368518c7b2fdbaccGlupteba Campaign Hits Network Routers and Updates C&C Servers with Data from Bitcoin Transactionshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.09.04.Glupteba_Campaign/Glupteba%20Campaign%20Hits%20Network%20Routers%20and%20Updates%20C%26C%20Servers%20with%20Data%20from%20Bitcoin%20Transactions.pdf
10282019-09-055b6bccee4b358c195ea7d80c118d6e9a793f3ed7UPSynergy_ Chinese-American Spy vs. Spy Storyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.09.05.UPSynergy/UPSynergy_%20Chinese-American%20Spy%20vs.%20Spy%20Story.pdf
10292019-09-06cf011cca773f812145c8e81d8f1bade04e716732BITTER APT_ Not So Sweethttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.09.06.BITTER_APT_Not_So_Sweet/BITTER%20APT_%20Not%20So%20Sweet.pdf
10302019-09-09537bd87d34bbeab8077bb7e199475a9dffa9f58fThrip_ Ambitious Attacks Against High Level Targets Continuehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.09.09.Thrip/Thrip_%20Ambitious%20Attacks%20Against%20High%20Level%20Targets%20Continue.pdf
10312019-09-11a873e9f1ba1904911a92497f949b9b10c701d931RANCOR APT_ Suspected targeted attacks against South East Asiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.09.11.RANCOR_APT/RANCOR%20APT_%20Suspected%20targeted%20attacks%20against%20South%20East%20Asia.pdf
10322019-09-15453956dd602ee94ea82c44135308783d153507baThe-Kittens-Are-Back-in-Town-Charming-Kitten-2019https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.09.15_Kittens_back/The-Kittens-Are-Back-in-Town-Charming-Kitten-2019.pdf
10332019-09-181932e05dd6ba26e752fb89960c24fee7afe7a42bMagecart Skimming Attack Targets Mobile Users of Hotel Chain Booking Websiteshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.09.18.Magecart_Hotel_Chain_Booking/Magecart%20Skimming%20Attack%20Targets%20Mobile%20Users%20of%20Hotel%20Chain%20Booking%20Websites.pdf
10342019-09-185d08b29ec4f76e1a6bce6d1507de01df1b188666Tortoiseshell Group Targets IT Providers in Saudi Arabia in Probable Supply Chain Attackshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.09.18.Tortoiseshell-APT/Tortoiseshell%20Group%20Targets%20IT%20Providers%20in%20Saudi%20Arabia%20in%20Probable%20Supply%20Chain%20Attacks.pdf
10352019-09-24a713bdf75154084b9f6841ace63fa1919bf504e0DeadlyKiss_TAARhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.09.24.DeadlyKiss_APT/DeadlyKiss_TAAR.pdf
10362019-09-24d1592835be4b0370146d53603f6eddd0681131a3Mapping the connections inside Russia APT Ecosystemhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.09.24_Russia_APT_Ecosystem/Mapping%20the%20connections%20inside%20Russia%20APT%20Ecosystem.pdf
10372019-09-24e4129398913943732e62a603877b9bb70b998fd9How Tortoiseshell created a fake veteran hiring website to host malwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.09.24_New_Tortoiseshell/How%20Tortoiseshell%20created%20a%20fake%20veteran%20hiring%20website%20to%20host%20malware.pdf
10382019-09-264231fdbb3b27a90a81d25f8bd60bff7904e910f8Chinese APT Hackers Attack Windows Users via FakeNarrator Malwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.09.26_China_APT_FakeNarrator_To_PcShare/Chinese%20APT%20Hackers%20Attack%20Windows%20Users%20via%20FakeNarrator%20Malware.pdf
10392019-09-303b57873600b96e7474e6aa88f6c924dd81775b41HELO Winnti_ Attack or Scanhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.09.30_HELO_Winnti/HELO%20Winnti_%20Attack%20or%20Scan.pdf
10402019-10-01095871915af386b3addb87036dfca584473b283cNew Fileless Botnet Novter Distributed by KovCoreG Malvertising Campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.01.kovcoreg-malvertising-campaign/New%20Fileless%20Botnet%20Novter%20Distributed%20by%20KovCoreG%20Malvertising%20Campaign.pdf
10412019-10-014169a4d2143afaf8d91eda2397dbbe34c294fdb4Tech-Brief-New-Fileless-Botnet-Novter-Distributed-by-KovCoreG-Malvertising-Campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.01.kovcoreg-malvertising-campaign/Tech-Brief-New-Fileless-Botnet-Novter-Distributed-by-KovCoreG-Malvertising-Campaign.pdf
10422019-10-01880e01c8cadd72f8318f79d5c95cc57556b69c56New Adwind Campaign targets US Petroleum Industryhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.01.Adwind_Campaign_US_Petroleum_Industry/New%20Adwind%20Campaign%20targets%20US%20Petroleum%20Industry.pdf
10432019-10-01c7a5dcf44c6e0f1f8eb0048caf82f9c436558d73Appendix-New-Fileless-Botnet-Novter-Distributed-by-KovCoreG-Malvertising-Campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.01.kovcoreg-malvertising-campaign/Appendix-New-Fileless-Botnet-Novter-Distributed-by-KovCoreG-Malvertising-Campaign.pdf
10442019-10-030c794545e8fa5eba2e1e806d9817b85ea12cdd88PKPLUG_ Chinese Cyber Espionage Group Attacking Asiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.03.PKPLUG/PKPLUG_%20Chinese%20Cyber%20Espionage%20Group%20Attacking%20Asia.pdf
10452019-10-04d9104f80cde5ce7667b3acbab40b38f6d2079f00VB2019-Garcia-etalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.04.GEOST_BOTNET/VB2019-Garcia-etal.pdf
10462019-10-07426093a99e7a45aa88da697cd1503fb3a5fd745dThe Kittens Are Back in Town 2 - Charming Kitten Campaign Keeps Going on, Using New Impersonation Methods - ClearSky Cyber Securityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.07.Charming_Kitten_Back_in_Town_2/The%20Kittens%20Are%20Back%20in%20Town%202%20-%20Charming%20Kitten%20Campaign%20Keeps%20Going%20on%2C%20Using%20New%20Impersonation%20Methods%20-%20ClearSky%20Cyber%20Security.pdf
10472019-10-0793a3c3b7f8285726b22ead392e71b3e1626f7d10The-Kittens-Are-Back-in-Town-2https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.07.Charming_Kitten_Back_in_Town_2/The-Kittens-Are-Back-in-Town-2.pdf
10482019-10-07bf791907d880bddae90894ed89b4b453d0c11498CERTFR-2019-CTI-005https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.07.Supply_Chain_Attacks/CERTFR-2019-CTI-005.pdf
10492019-10-07d7541e81aea48ec49932896620416f0dd9f9dfdeChina-Based APT Mustang Panda Targets Minority Groups, Public and Private Sector Organizationshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.07.Panda_minority-groups/China-Based%20APT%20Mustang%20Panda%20Targets%20Minority%20Groups%2C%20Public%20and%20Private%20Sector%20Organizations.pdf
10502019-10-099e96e893e70535aacbc087d16f73a909fd2602d9FIN6 Compromised E-commerce Platform via Magecart to Inject Credit Card Skimmers Into Thousands of Online Shopshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.09_FIN6_Magecart/FIN6%20Compromised%20E-commerce%20Platform%20via%20Magecart%20to%20Inject%20Credit%20Card%20Skimmers%20Into%20Thousands%20of%20Online%20Shops.pdf
10512019-10-1023e4d67dd76553f78f40f1a30aef6bd88ca7200eMahalo_FIN7https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.10.Fin7/Mahalo_FIN7.pdf
10522019-10-106b2579a0886d2a14bb3f4a86cb5f18782da63fe3ASEC_REPORT_vol.96_ENGhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/AhnLab/ASEC_REPORT_vol.96_ENG.pdf
10532019-10-10bbb2512ccf7681d73faa6a447fdbda1fb5da9b2dESET discovers Attor, a spy platform with curious GSM fingerprinting _ WeLiveSecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.10.Attor_GSM_fingerprinting_spy_platform/ESET%20discovers%20Attor%2C%20a%20spy%20platform%20with%20curious%20GSM%20fingerprinting%20_%20WeLiveSecurity.pdf
10542019-10-10dc342c30cc53686416204d97ceb44156f1ecf5e8ESET_Attorhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.10.Attor_GSM_fingerprinting_spy_platform/ESET_Attor.pdf
10552019-10-10fa008c2924f69b019af1924b429744d76ca11e1fESET_Winntihttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.10.Winnti_Group/ESET_Winnti.pdf
10562019-10-14c0061604b409cad311414bd47b97ba6ec79bb642winnti_ENhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.14.From_tweet_to_rootkit/winnti_EN.pdf
10572019-10-14d30068cc3f5856ba52df3b019e5eaa8653e22d77huge-fan-of-your-work-intelligence-reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.14.TURBINE_PANDA/huge-fan-of-your-work-intelligence-report.pdf
10582019-10-14eb99c745139bd6e46e81745dfd72e41325a02ad4Is Emotet gang targeting companies with external SOChttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.14.Emotet_external_SOC/Is%20Emotet%20gang%20targeting%20companies%20with%20external%20SOC.pdf
10592019-10-150511740e527c025858aa577e7b6b198f28e2a1acLOWKEY_ Hunting for the Missing Volume Serial IDhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.15.LOWKEY/LOWKEY_%20Hunting%20for%20the%20Missing%20Volume%20Serial%20ID.pdf
10602019-10-17d6f66a51549b7c2090135e8cb8c40a68c152018dESET_Operation_Ghost_Dukeshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.17.Operation_Ghost/ESET_Operation_Ghost_Dukes.pdf
10612019-10-21152af7cf47b0d2a89e2415d2d44acf4a50e15f4cVB2019-Garcia-etalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.21_Geost_botnet/VB2019-Garcia-etal.pdf
10622019-10-217f98a609e1dcd3f69a822d3636c28f7a9e2dd105Winnti Groups skip2.0_ A Microsoft SQL Server backdoorhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.21.Winnti_skip_2.0/Winnti%20Group%E2%80%99s%20skip%E2%80%912.0_%20A%C2%A0Microsoft%20SQL%20Server%20backdoor.pdf
10632019-10-2829d8473954434c405b838e895f2adfd734dd215bSWEED Targeting Precision Engineering Companies in Italyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.28_SWEED_Italy/SWEED%20Targeting%20Precision%20Engineering%20Companies%20in%20Italy.pdf
10642019-10-31cb3f46cb9def5b9bc1185e5fd60d390f77dc3834MESSAGETAP_ Whos Reading Your Text Messageshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.31.MESSAGETAP/MESSAGETAP_%20Who%E2%80%99s%20Reading%20Your%20Text%20Messages.pdf
10652019-10-31fa36f2632e6b9ff400f8b3ad9539f3bf4a586deccalypso-apt-2019-enghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.10.31.Calypso_APT/calypso-apt-2019-eng.pdf
10662019-11-04d043d2ce37e8e5a249f59e30eb2608801a3a3f30Is Lazarus_APT38 Targeting Critical Infrastructures _ Marco Ramilli Web Cornerhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.11.04.Lazarus_APT38/Is%20Lazarus_APT38%20Targeting%20Critical%20Infrastructures%20_%20%E2%80%93%20Marco%20Ramilli%20Web%20Corner.pdf
10672019-11-04f17a8bf210b805556ebaa1488ab937d8a035d27d(cn)_higaisa_apt_reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.11.04.Higaisa_APT/%28cn%29_higaisa_apt_report.pdf
10682019-11-058b90e283d66e6e3222641f09269ad28eda4127bfLAZARUS_GAZE_APT38https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.11.05.LAZARUS_GAZE/LAZARUS_GAZE_APT38.pdf
10692019-11-0880b06f28ee5e364f47ca3a290b160b2de61bcc0fTitanium_ the Platinum group strikes againhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.11.08_Titanium_Action_Platinum_group/Titanium_%20the%20Platinum%20group%20strikes%20again.pdf
10702019-11-089d6dcfc9a673613fdafe7d967945a0a97308de19Massive malicious campaign by FakeSecurity JS-snifferhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.11.08_FakeSecurity_JS-sniffer/Massive%20malicious%20campaign%20by%20FakeSecurity%20JS-sniffer.pdf
10712019-11-123836ed16ed8e861c19344558cb4bd40b6d3b6415TA-505 Cybercrime on System Integrator Companieshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.11.12_TA-505_On_SI/TA-505%20Cybercrime%20on%20System%20Integrator%20Companies.pdf
10722019-11-1391c0a6c0cd95b42991ea7981be1bec29974df17fsophoslabs-uncut-2020-threat-reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/Sophos/sophoslabs-uncut-2020-threat-report.pdf
10732019-11-13fe8df78646bee14a74f2f88f76bdda52a611f8b6More than a Dozen Obfuscated APT33 Botnets Used for Extreme Narrow Targetinghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.11.13.APT33_Extreme%EF%BC%BFNarrow_Targeting/More%20than%20a%20Dozen%20Obfuscated%20APT33%20Botnets%20Used%20for%20Extreme%20Narrow%20Targeting.pdf
10742019-11-20192be8ca1c779e40ef93e950065e84f5d900161eAPT-C-34.cnhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.11.20.Golden_Eagle_APT-C-34/APT-C-34.cn.pdf
10752019-11-20cf1750865234a5840d529a498a5fa1107d79fe64Mac Backdoor Linked to Lazarus Targets Korean Usershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.11.20.Mac_Lazarus/Mac%20Backdoor%20Linked%20to%20Lazarus%20Targets%20Korean%20Users.pdf
10762019-11-21f9ec0ec31ccab12f99b03f09a0882b3d30a3365aRegisters as “Default Print Monitor”, but is a malicious downloader. Meet DePriMonhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.11.21.DePriMon/Registers%20as%20%E2%80%9CDefault%20Print%20Monitor%E2%80%9D%2C%20but%20is%20a%20malicious%20downloader.%20Meet%20DePriMon.pdf
10772019-11-25688771ff7a16425f001508bbb46242248d74545eStudying Donot Teamhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.11.25_Donot_Team/Studying%20Donot%20Team.pdf
10782019-11-257c4c067c4853d72e3c561eaf388d8494f57c514ccybersecurity-threatscape-2019-q3-enghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/PTSecurity/cybersecurity-threatscape-2019-q3-eng.pdf
10792019-11-266226f5e623d80ddcce349e617498a339d78927d0Insights from one year of tracking a polymorphic threathttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.11.26.Dexphot/Insights%20from%20one%20year%20of%20tracking%20a%20polymorphic%20threat.pdf
10802019-11-2827c033bcdacc4271b9bd9b08714026ad3832ac73RevengeHotels_ cybercrime targeting hotel front desks worldwidehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.11.28.RevengeHotels/RevengeHotels_%20cybercrime%20targeting%20hotel%20front%20desks%20worldwide.pdf
10812019-11-29502c37a11fc85045efc1cc7ab019875aba9906a8Operation-ENDTRADE-TICK-s-Multi-Stage-Backdoors-for-Attacking-Industries-and-Stealing-Classified-Datahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.11.29.Operation_ENDTRADE/Operation-ENDTRADE-TICK-s-Multi-Stage-Backdoors-for-Attacking-Industries-and-Stealing-Classified-Data.pdf
10822019-11-29626f179b5bfca66c6cd149ca061c9717dca2c03dGroup-IB_Hi-Tech_Crime_Trends_2019-2020https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/Group-IB/Group-IB_Hi-Tech_Crime_Trends_2019-2020.pdf
10832019-12-032e3173ba71b32d02b261f61e1194feccfd8ed085Threat Actor Targeting Hong Kong Pro-Democracy Figureshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.12.03.Hong_Kong_Pro-Democracy/Threat%20Actor%20Targeting%20Hong%20Kong%20Pro-Democracy%20Figures.pdf
10842019-12-04843e820608adc7a51abb9a74a689d4c3bdb92d75Obfuscation Tools Found in the Capesand Exploit Kit Possibly Used in “KurdishCoder” Campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.12.04.KurdishCoder_Campaign/Obfuscation%20Tools%20Found%20in%20the%20Capesand%20Exploit%20Kit%20Possibly%20Used%20in%20%E2%80%9CKurdishCoder%E2%80%9D%20Campaign.pdf
10852019-12-04a93d869bc0d4893c042f91e40e777d72db92a77eNew_Destructive_Wiper_ZeroCleare_Final_https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.12.04.ZeroCleare/New_Destructive_Wiper_ZeroCleare_Final_.pdf
10862019-12-06b1ec8d737865e2e7feba57c220bd62290a93ed67Cosmic Banker campaign is still active revealing link with Banload malwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.12.06.Cosmic_Banker_campaign/Cosmic%20Banker%20campaign%20is%20still%20active%20revealing%20link%20with%20Banload%20malware.pdf
10872019-12-090db3e90a27d93efb360e8e0eee9ac0421a09f233Group-IB_Hi-Tech_Crime_Trends_2019-2020_enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/Group-IB/Group-IB_Hi-Tech_Crime_Trends_2019-2020_en.pdf
10882019-12-108acef95af9d674a45608198eb5e80dc7ab65617fsentinel-one-sentine-6https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.12.10_TrickBot_Planeswalker/sentinel-one-sentine-6.pdf
10892019-12-11322a9344111331462baab10d055d78f7055b3c4fChrome 0-day exploit CVE-2019-13720 used in Operation WizardOpium https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.11.1.Operation_WizardOpium/Chrome%200-day%20exploit%20CVE-2019-13720%20used%20in%20Operation%20WizardOpium%20.pdf
10902019-12-1169bf39301d6e5df6314314995c021963c7f18c94Dropping Anchor_ From a TrickBot Infection to the Discovery of the Anchor Malwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.12.11_DROPPING_ANCHOR/Dropping%20Anchor_%20From%20a%20TrickBot%20Infection%20to%20the%20Discovery%20of%20the%20Anchor%20Malware.pdf
10912019-12-11f69b318bff05a1abc62c42a01b120a1e2e54d665Waterbear is Back, Uses API Hooking to Evade Security Product Detectionhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.12.11.Waterbear_Back/Waterbear%20is%20Back%2C%20Uses%20API%20Hooking%20to%20Evade%20Security%20Product%20Detection.pdf
10922019-12-11fed1378dbf09119779790de36b53cffcc6bfae5bAnchor IOCshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.12.11_DROPPING_ANCHOR/Anchor%20IOCs.pdf
10932019-12-123d4b6ef9ea3d3d64c174b6eaf85434ffa4af8d61cta-2019-1212https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.12.12.Operation_Gamework/cta-2019-1212.pdf
10942019-12-1254840544c79d24dace32a7a4caa8678036b4f7e7GALLIUM_ Targeting global telecomhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.12.12.GALLIUM/GALLIUM_%20Targeting%20global%20telecom.pdf
10952019-12-125af7b3313dafaf307421e6de17add21c894cb59cwp-drilling-deep-a-look-at-cyberattacks-on-the-oil-and-gas-industryhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.12.12.Drilling_Deep/wp-drilling-deep-a-look-at-cyberattacks-on-the-oil-and-gas-industry.pdf
10962019-12-1658b815814e28d00219c6b4dec546c23c6a6f2162sophoslabs-uncut-mykings-reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.12.16.MyKings/sophoslabs-uncut-mykings-report.pdf
10972019-12-1717c168147b6c7d7b313a6a014ae6bdb153e778e8Dacls, the Dual platform RAThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.12.17.Dacls_RAT/Dacls%2C%20the%20Dual%20platform%20RAT.pdf
10982019-12-17c95263e812d3e831061753ff3d432e50b1c4c571CN_Dacls, the Dual platform RAThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.12.17.Dacls_RAT/CN_Dacls%2C%20the%20Dual%20platform%20RAT.pdf
10992019-12-17e54539e7a87e229b70384bd20943c2afd689445cRancor_ Cyber Espionage Group Uses New Custom Malware to Attack Southeast Asiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.12.17.Rancor/Rancor_%20Cyber%20Espionage%20Group%20Uses%20New%20Custom%20Malware%20to%20Attack%20Southeast%20Asia.pdf
11002019-12-1985ddad10bbd8e93e8de1bfedee6563ce5f0c6f96201912_Report_Operation_Wacaohttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.12.19.Operation_Wocao/201912_Report_Operation_Wacao.pdf
11012019-12-2653ef5f11eca852b962543eb4c172ae012456be72Targeting Portugal_ A new trojan 'Lampion' has spread using template emails from the Portuguese Government Finance & Taxhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.12.26.Trojan-Lampion/Targeting%20Portugal_%20A%20new%20trojan%20%27Lampion%27%20has%20spread%20using%20template%20emails%20from%20the%20Portuguese%20Government%20Finance%20%26%20Tax.pdf
11022019-12-291a37382df05d162c04564b538f7bd0229f1f8e7eBRONZE PRESIDENT Targets NGOshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2019/2019.12.29_BRONZE_PRESIDENT_NGO/BRONZE%20PRESIDENT%20Targets%20NGOs.pdf
11032020-01-018fc0ccc71a8dc6fec2584ed73ffe8fbef5b43e74[CN]_SideWinder_APThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.01.01.SideWinder_APT/%5BCN%5D_SideWinder_APT.pdf
11042020-01-060663cef97989f69df67f59cab5071d3b4ef742f1First Active Attack Exploiting CVE-2019-2215 Found on Google Play, Linked to SideWinder APT Grouphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.01.06.SideWinder_Google_Play/First%20Active%20Attack%20Exploiting%20CVE-2019-2215%20Found%20on%20Google%20Play%2C%20Linked%20to%20SideWinder%20APT%20Group.pdf
11052020-01-079df38c6e2d7d8347a0e922df462f20049f16a797Iranian Cyber Response to Death of IRGC Head Would Likely Use Reported TTPs and Previous Accesshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.01.07_Iranian_Cyber_Response/Iranian%20Cyber%20Response%20to%20Death%20of%20IRGC%20Head%20Would%20Likely%20Use%20Reported%20TTPs%20and%20Previous%20Access.pdf
11062020-01-07bfa9143ed25f03e8a3273a392583de3292d64e35Saudi-Arabia-CNA-reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.01.07_Destructive_Attack_DUSTMAN/Saudi-Arabia-CNA-report.pdf
11072020-01-088d45b1a37d3fc6784fa2f55d4fde6f10e19802c5Operation AppleJeus Sequelhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.01.08_Operation_AppleJeus_Sequel/Operation%20AppleJeus%20Sequel.pdf
11082020-01-090ca55a185d1faaa2c0b3576999faad5147eccc76NA-EL-Threat-Perspective-2019https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.01.09.NA-EL-Threat-Perspective/NA-EL-Threat-Perspective-2019.pdf
11092020-01-13441f48b969b4448c18c6382282db8ac548f8a3e5APT27 ZXShell RootKit module updateshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.01.13.APT27_ZxShell_RootKit/APT27%20ZXShell%20RootKit%20module%20updates.pdf
11102020-01-13587a7a2e1f2251135b851ad40fdf13359efa9b63Reviving MuddyC3 Used by MuddyWater (IRAN) APThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.01.13.muddyc3.Revived/Reviving%20MuddyC3%20Used%20by%20MuddyWater%20%28IRAN%29%20APT.pdf
11112020-01-161036c13f75483a87237103247da0b9e99e16fee6JSAC2020_3_takai_jphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/other/JSAC2020_3_takai_jp.pdf
11122020-01-1659e37b1b95367583cc5cc181fee309b96f786fd0JhoneRAT_ Cloud based python RAT targeting Middle Eastern countrieshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.01.16.JhoneRAT/JhoneRAT_%20Cloud%20based%20python%20RAT%20targeting%20Middle%20Eastern%20countries.pdf
11132020-01-20cd96b74b284193b21abeadedfc64e2257545d9dbASEC_REPORT_vol.97_ENGhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/AhnLab/ASEC_REPORT_vol.97_ENG.pdf
11142020-01-22a83f4b160e2543812bf9ee048af1d8ce27aaa730200122_IBM_X-Force_IRIS_ZeroCleare_Paperhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.01.xx.ZeroCleare_Wiper/200122_IBM_X-Force_IRIS_ZeroCleare_Paper.pdf
11152020-01-3133e67d5669920778611140f7b293a4d807de35e5welivesecurity.com-Winnti Group targeting universities in Hong Konghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.01.31.Winnti_universities_in_HK/welivesecurity.com-Winnti%20Group%20targeting%20universities%20in%20Hong%20Kong.pdf
11162020-02-03653171288c2d534959efd7c9060e178593465be9Actors Still Exploiting SharePoint Vulnerability to Attack Middle East Government Organizationshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.02.03.SharePoint_Vulnerability_Middle_East/Actors%20Still%20Exploiting%20SharePoint%20Vulnerability%20to%20Attack%20Middle%20East%20Government%20Organizations.pdf
11172020-02-10fad082e169f6f4bca710eef792f0711c6a9d98ccOutlaw Updates Kit to Kill Older Miner Versions, Targets More Systemshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.02.10_Outlaw_Updates/Outlaw%20Updates%20Kit%20to%20Kill%20Older%20Miner%20Versions%2C%20Targets%20More%20Systems.pdf
11182020-02-12d6b452fe46682f1bd964eb8cae720076bf30c5922020.02.22_APT_threat_report_2019_CN_versionhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/QianXin/2020.02.22_APT_threat_report_2019_CN_version.pdf
11192020-02-13b2c9a2d88fe19485808d261e58a2fca4dbbf27edNew Cyber Espionage Campaigns Targeting Palestinians - Part 2_ The Discovery of the New, Mysterious Pierogi Backdoorhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.02.13.PIEROGI_BACKDOOR_APT/New%20Cyber%20Espionage%20Campaigns%20Targeting%20Palestinians%20-%20Part%202_%20The%20Discovery%20of%20the%20New%2C%20Mysterious%20Pierogi%20Backdoor.pdf
11202020-02-1773bf0529f33594669d849df43de2d78a38eab8ccClearSky-Fox-Kitten-Campaign-v1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.02.17_Fox_Kitten_Campaign/ClearSky-Fox-Kitten-Campaign-v1.pdf
11212020-02-17916b7687b6d0a73686f1515fe228b1c4ff95122aCLAMBLING - A New Backdoor Base On Dropbox (EN)https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.02.17_CLAMBLING_Dropbox_Backdoor/CLAMBLING%20-%20A%20New%20Backdoor%20Base%20On%20Dropbox%20%28EN%29.pdf
11222020-02-17bead11e2acc0a0690136d7963bb52e8fd93bb80bCyberwarfare_ A deep dive into the latest Gamaredon Espionage Campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.02.17.Cyberwarfare_Gamaredon_Campaign/Cyberwarfare_%20A%20deep%20dive%20into%20the%20latest%20Gamaredon%20Espionage%20Campaign.pdf
11232020-02-180e43d375e0d1f9ce30a9df30b8c2c27d21df5d83wp-uncovering-DRBcontrolhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.02.18_Operation_DRBControl/wp-uncovering-DRBcontrol.pdf
11242020-02-198a127514c633f3298d1eedc3ee1d7d439648950eLexfo-WhitePaper-The_Lazarus_Constellationhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.02.19_The_Lazarus_Constellation/Lexfo-WhitePaper-The_Lazarus_Constellation.pdf
11252020-02-21ea7ee7903aac206a471642078ade87af0d183c68[KR]Analysis Report_MyKings Botnethttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.02.21_MyKings_Botnet/%5BKR%5DAnalysis%20Report_MyKings%20Botnet.pdf
11262020-02-22e786a69583d446ea26e7151b0a534b539b7d5fc3Weaponizing a Lazarus Group Implanthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.02.22_Lazarus_Group_Weaponizing/Weaponizing%20a%20Lazarus%20Group%20Implant.pdf
11272020-02-255689d93fa60e88759d1b0d9a23674a43caf87717CloudSnooper_reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.02.25_Cloud_Snooper/CloudSnooper_report.pdf
11282020-02-286683391f26af54d6c995a4df80fbde6419638cdcNortrom_Lion_APT_CN_versionhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.02.28_Nortrom_Lion_APT/Nortrom_Lion_APT_CN_version.pdf
11292020-03-02ab9e7ac7d48f727dab0986a1672f60c1a7d8dec2apt34-aka-oilrig-attacks-lebanon-government-entities-with-maildropper-implanthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.03.02_APT34_MAILDROPPER/apt34-aka-oilrig-attacks-lebanon-government-entities-with-maildropper-implant.pdf
11302020-03-02fed84094f8bd8822542b76820b569235ff6cd98aReport2020CrowdStrikeGlobalThreatReporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/CrowdStrike/Report2020CrowdStrikeGlobalThreatReport.pdf
11312020-03-03126e1841bb7a5c0b9b0208b01605328402e30a97mtrends-2020https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/FireEye/mtrends-2020.pdf
11322020-03-0379e7ff150be9c0d28ed50f410f2a3d682e172898The North Korean Kimsuky APT keeps threatening South Korea evolving its TTPshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.03.03_Kimsuky_APT/The%20North%20Korean%20Kimsuky%20APT%20keeps%20threatening%20South%20Korea%20evolving%20its%20TTPs.pdf
11332020-03-03ec7d70f1abbdff4227a39b98306a490085cb5bf6New Perl Botnet (Tuyul) Found with Possible Indonesian Attributionhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.03.03_Tuyul_Botnet_Indonesian/New%20Perl%20Botnet%20%28Tuyul%29%20Found%20with%20Possible%20Indonesian%20Attribution.pdf
11342020-03-0543c98642ad0f9f099ab7d61a0b1433fa4e852dc1apt_report_2019.CN_Versionhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/Tencent/apt_report_2019.CN_Version.pdf
11352020-03-0596d1ff403eb0306a6afce709bc54b16480635775Guildma_ The Devil drives electric _ WeLiveSecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.03.05_Guildma/Guildma_%20The%20Devil%20drives%20electric%20_%20WeLiveSecurity.pdf
11362020-03-05ae511e37067348208579e7fcf8da0389626b2044Dissecting Geost_ Exposing the Anatomy of the Android Trojan Targeting Russian Banks - TrendLabs Security Intelligence Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.03.05_Dissecting_Geost/Dissecting%20Geost_%20Exposing%20the%20Anatomy%20of%20the%20Android%20Trojan%20Targeting%20Russian%20Banks%20-%20TrendLabs%20Security%20Intelligence%20Blog.pdf
11372020-03-1000108e5f5e785cd5df1012deee919fe1a9cf0db1njRat IOCshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.03.10.WHO_HACKING_THE_HACKERS/njRat%20IOCs.pdf
11382020-03-10865d88a8d0c6bf1dff0accd241bc1f06a7f22616Who's Hacking the Hackers_ No Honor Among Thieveshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.03.10.WHO_HACKING_THE_HACKERS/Who%27s%20Hacking%20the%20Hackers_%20No%20Honor%20Among%20Thieves.pdf
11392020-03-10e685607aac68a580c1feed8dc1bb21fc567ee4142020_03_Threat_Alert_Hacking_the_Hackershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.03.10.WHO_HACKING_THE_HACKERS/2020_03_Threat_Alert_Hacking_the_Hackers.pdf
11402020-03-119fafe6bd3615077295cfb7cc07059df42e187c14Operation Overtrap Targets Japanese Online Banking Users Via Bottle Exploit Kit and Brand-New Cinobi Banking Trojanhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.03.11.Operation_Overtrap/Operation%20Overtrap%20Targets%20Japanese%20Online%20Banking%20Users%20Via%20Bottle%20Exploit%20Kit%20and%20Brand-New%20Cinobi%20Banking%20Trojan.pdf
11412020-03-11daa952eb7f9cd9f938255053657d4e8a9271d6c5Tech Brief_Operation Overtrap Targets Japanese Online Banking Usershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.03.11.Operation_Overtrap/Tech%20Brief_Operation%20Overtrap%20Targets%20Japanese%20Online%20Banking%20Users.pdf
11422020-03-1240347605cbd5510bb0371309456dc1805780c368Vicious Panda_ The COVID Campaign - Check Point Researchhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.03.12_Vicious_Panda/Vicious%20Panda_%20The%20COVID%20Campaign%20-%20Check%20Point%20Research.pdf
11432020-03-1244034bcbd317f83aba6172387eae7fb102e0926bTwo-tailed_scorpion_CN_versionhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.03.12_Two-tailed_scorpion/Two-tailed_scorpion_CN_version.pdf
11442020-03-1268b971b44c01fa3821825e239cf6b227673106eaTracking Turla_ New backdoor delivered via Armenian watering holes _ WeLiveSecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.03.12_Tracking_Turla/Tracking%20Turla_%20New%20backdoor%20delivered%20via%20Armenian%20watering%20holes%20_%20WeLiveSecurity.pdf
11452020-03-131f00e902bb6c10ff50389d6cc9075d156cf0986dcybersecurity-threatscape-2019-q4-enghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/PTSecurity/cybersecurity-threatscape-2019-q4-eng.pdf
11462020-03-15ca7fb7c0312305d20e41bff716082169ff5f5a01APT36 jumps on the coronavirus bandwagon, delivers Crimson RAT _ Malwarebytes Labshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.03.15_APT36_Crimson_RAT/APT36%20jumps%20on%20the%20coronavirus%20bandwagon%2C%20delivers%20Crimson%20RAT%20_%20Malwarebytes%20Labs.pdf
11472020-03-196c96e61b7ed93841857c6737b7a84650b39403adwp-pawn-storm-in-2019https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.03.19_Probing_Pawn_Storm/wp-pawn-storm-in-2019.pdf
11482020-03-24d71ad8ea9e4809433ec87615aafbc7e20e77b9a4WildPressure targets industrial-related entities in the Middle East _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.03.24_WildPressure/WildPressure%20targets%20industrial-related%20entities%20in%20the%20Middle%20East%20_%20Securelist.pdf
11492020-03-24f516eade0319946e52c88ee6f44b01aa8e832fd2Operation Poisoned News_ Hong Kong Users Targeted With Mobile Malware via Local News Links - TrendLabs Security Intelligence Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.03.24_Operation_Poisoned_News/Operation%20Poisoned%20News_%20Hong%20Kong%20Users%20Targeted%20With%20Mobile%20Malware%20via%20Local%20News%20Links%20-%20TrendLabs%20Security%20Intelligence%20Blog.pdf
11502020-03-2560cdab19b8f87a9d3b1aa0dde91f9cf945cbfb76This Is Not a Test_ APT41 Initiates Global Intrusion Campaign Using Multiple Exploits _ FireEye Inchttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.03.25_APT41-initiates-global-intrusion-campaign/This%20Is%C2%A0Not%20a%20Test_%20APT41%20Initiates%20Global%20Intrusion%20Campaign%20Using%20Multiple%20Exploits%20_%20FireEye%20Inc.pdf
11512020-03-26cf105922040421377abdd120f6ba2b9772fdd40diOS exploit chain deploys “LightSpy” feature-rich malware _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.03.26_LightSpy_TwoSail_Junk_APT/iOS%20exploit%20chain%20deploys%20%E2%80%9CLightSpy%E2%80%9D%20feature-rich%20malware%20_%20Securelist.pdf
11522020-03-30b262e09517bd3bf9abb0c19c20ef8fddb2b0012dOperation Spy Cloud_enghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.03.30_Spy_Cloud_Operation/Operation%20Spy%20Cloud_eng.pdf
11532020-04-0736aa13f198fbad89f10281c4f5fe9ce7e41ec495report-bb-decade-of-the-ratshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.04.07_Decade_of_the_RATs/report-bb-decade-of-the-rats.pdf
11542020-04-07969ec8174de828cf9016983138f6b929d2e2b9bd200407-MWB-COVID-White-Paper_Finalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.04.07_APTs_COVID-19/200407-MWB-COVID-White-Paper_Final.pdf
11552020-04-07f6199ae7db7a2adfc28fa8b751fec7a88639fca2New Ursnif campaign_ a shift from PowerShell to Mshtahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.04.07_New_Ursnif_Campaign/New%20Ursnif%20campaign_%20a%20shift%20from%20PowerShell%20to%20Mshta.pdf
11562020-04-08742c783578c5461b8f2caa921dcc5a39c7f976d5ASEC_REPORT_vol.98_ENGhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/AhnLab/ASEC_REPORT_vol.98_ENG.pdf
11572020-04-152841ceea5cc8310669b24e4bba16f7bd9a1eb804Nation-state Mobile Malware Targets Syrians with COVID-19 Lureshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.04.15_COVID-19_Lures_Syrians/Nation-state%20Mobile%20Malware%20Targets%20Syrians%20with%20COVID-19%20Lures.pdf
11582020-04-156a5077e6dac44c1ba63d36b7562496996f56032a[TLP-White]20200415 Chimera_V4.1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.04.15_Chimera_APT/%5BTLP-White%5D20200415%20Chimera_V4.1.pdf
11592020-04-163aeba28cf0cbea7e4f635139516e5a3ab0b3966eWhite Ops _ Inside the Largest Connected TV Botnet Attackhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.04.16_ICEBUCKET_TV_Bot_Attack/White%20Ops%20_%20Inside%20the%20Largest%20Connected%20TV%20Botnet%20Attack.pdf
11602020-04-16a7ef251336a636626f97a4ebbedc6894c67481b4Exposing Modular Adware_ How DealPly, IsErIk, and ManageX Persist in Systems - TrendLabs Security Intelligence Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.04.16_Exposing_Modular_Adware/Exposing%20Modular%20Adware_%20How%20DealPly%2C%20IsErIk%2C%20and%20ManageX%20Persist%20in%20Systems%20-%20TrendLabs%20Security%20Intelligence%20Blog.pdf
11612020-04-17ed8af7aaa54ed27c726f0ca8f2c9377b4dfd534eGamaredon APT Group Use Covid-19 Lure in Campaigns - TrendLabs Security Intelligence Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.04.17_Gamaredon_APT_Covid-19/Gamaredon%20APT%20Group%20Use%20Covid-19%20Lure%20in%20Campaigns%20-%20TrendLabs%20Security%20Intelligence%20Blog.pdf
11622020-04-201936abcedd5c269851436ed6e042df7db8b618e1WINNTI GROUP_ Insights From the Pasthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.04.20_Winnti_from_the_past/WINNTI%20GROUP_%20Insights%20From%20the%20Past.pdf
11632020-04-211df98e647d64ef01bdc29e2530e611effe5e895bEvil Eye Threat Actor Resurfaces with iOS Exploit and Updated Implanthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.04.21.evil-eye-threat-actor/Evil%20Eye%20Threat%20Actor%20Resurfaces%20with%20iOS%20Exploit%20and%20Updated%20Implant.pdf
11642020-04-2461251cc065cb364dbba4585d1d97b0d81062cfc1PoshC2_APT_jphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.04.24_PoshC2_APT/PoshC2_APT_jp.pdf
11652020-04-278f7f8c91758763e2adc955d2d1170b324e314a74ESET_Threat_Report_Q12020https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/ESET/ESET_Threat_Report_Q12020.pdf
11662020-04-28690050958d76252df27f19728b3608a3f9011a15yoroi.company-Outlaw is Back a New Crypto-Botnet Targets European Organizationshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.04.28_Outlaw_is_Back/yoroi.company-Outlaw%20is%20Back%20a%20New%20Crypto-Botnet%20Targets%20European%20Organizations.pdf
11672020-04-28d72c4c798984d38fd23124d3c5adff2a0ac65262Grandoreiro_ How engorged can an EXE get_ _ WeLiveSecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.04.28.Grandoreiro/Grandoreiro_%20How%20engorged%20can%20an%20EXE%20get_%20_%20WeLiveSecurity.pdf
11682020-04-29992959657614e0598cdac414b7796dc37b6eab0dcta-2020-0429https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.04.29.Chinese_Influence_Operations_Taiwanese_Elections_Hong_Kong_Protests/cta-2020-0429.pdf
11692020-05-058f5591c1ec9f6b2911112c53dc551374a00b66c3Nazar_ Spirits of the Past - Check Point Researchhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.05.Nazar_APT/Nazar_%20Spirits%20of%20the%20Past%20-%20Check%20Point%20Research.pdf
11702020-05-0638e2947b2131a0e1cf3ac0868dad5f6c0c3a034ePrevailion Blog_ Phantom in the Command Shellhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.06_Phantom_EVILNUM/Prevailion%20Blog_%20Phantom%20in%20the%20Command%20Shell.pdf
11712020-05-06801eb85445d0e1a4ecec311846bdfe2435400d2cLeeryTurtleThreatReport_05_20https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.06_Leery_Turtle/LeeryTurtleThreatReport_05_20.pdf
11722020-05-07140f905caba9014a29fed5a5dcf1be7b6102969bNaikon APT_ Cyber Espionage Reloaded - Check Point Researchhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.07_Naikon_APT_Reloaded/Naikon%20APT_%20Cyber%20Espionage%20Reloaded%20-%20Check%20Point%20Research.pdf
11732020-05-07d9e41bb3cd7ad22a358930b9eb53495e4409803aBlue Mockingbird activity mines Monero cryptocurrencyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.07_Blue_Mockingbird/Blue%20Mockingbird%20activity%20mines%20Monero%20cryptocurrency.pdf
11742020-05-11b2eab25e33718c6f5114a4260c41b22d96938842zscaler.com-Attack on Indian Government Financial Institutionshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.11.JsOutProx_RAT_Targeted_Attacks/zscaler.com-Attack%20on%20Indian%20Government%20Financial%20Institutions.pdf
11752020-05-11d0acc76ee3510cbde8145e5c7d83e42f8b863123Updated BackConfig Malware Targeting Government and Military Organizations in South Asiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.11_BackConfig_South_Asia/Updated%20BackConfig%20Malware%20Targeting%20Government%20and%20Military%20Organizations%20in%20South%20Asia.pdf
11762020-05-12ed6a7415fce176c79774be3de06ba77aca1084ffTropic Troopers Back_ USBferry Attack Targets Air-gapped Environments - TrendLabs Security Intelligence Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.12.Tropic_Trooper_Back/Tropic%20Trooper%E2%80%99s%20Back_%20USBferry%20Attack%20Targets%20Air-gapped%20Environments%20-%20TrendLabs%20Security%20Intelligence%20Blog.pdf
11772020-05-13efee6cb22f537f81daeba1c34ca6a42030567d2eRamsay_ A cyberespionage toolkit tailored for airgapped networks _ WeLiveSecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.13.Ramsay/Ramsay_%20A%20cyber%E2%80%91espionage%20toolkit%20tailored%20for%20air%E2%80%91gapped%20networks%20_%20WeLiveSecurity.pdf
11782020-05-14005000464a9f344017647ae24c95407f58b0187dRATicate_ an attackers waves of information-stealing malware Sophos Newshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.14.RATicate/RATicate_%20an%20attacker%E2%80%99s%20waves%20of%20information-stealing%20malware%20%E2%80%93%20Sophos%20News.pdf
11792020-05-140c2e280bc8a52ed683fa6e5c85d6bbea835ac067COMpfun authors spoof visa application with HTTP status-based Trojan _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.14.COMpfun/COMpfun%20authors%20spoof%20visa%20application%20with%20HTTP%20status-based%20Trojan%20_%20Securelist.pdf
11802020-05-1416c81da78979a1a9feb92d07aadc89061cfea4d3Mikroceen_ Spying backdoor leveraged in highprofile networks in Central Asia _ WeLiveSecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.14.Mikroceen/Mikroceen_%20Spying%20backdoor%20leveraged%20in%20high%E2%80%91profile%20networks%20in%20Central%20Asia%20_%20WeLiveSecurity.pdf
11812020-05-146d5fedda30e086a09d6be72c89e2721e84f7a07cVendetta-new-threat-actor-from-Europehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.14.Vendetta_APT/Vendetta-new-threat-actor-from-Europe.pdf
11822020-05-146e668df891d5f95a31c04a5d6ea344b856ebceb9dl-20200511-lolsnif-appendix-a-enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.14.LOLSnif/dl-20200511-lolsnif-appendix-a-en.pdf
11832020-05-1475e4bbb86baca9834df9a238120a9dcff82c2c46APT Group Planted Backdoors Targeting High Profile Networks in Central Asia - Avast Threat Labshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.14.Central_Asia_APT/APT%20Group%20Planted%20Backdoors%20Targeting%20High%20Profile%20Networks%20in%20Central%20Asia%20-%20Avast%20Threat%20Labs.pdf
11842020-05-14e76e58648d529f7171fe87500cfe5b8ce2813e0bCybersecurity_ Tool leaks are very interesting occurrences in cyber security. _ Deutsche Telekomhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.14.LOLSnif/Cybersecurity_%20Tool%20leaks%20are%20very%20interesting%20occurrences%20in%20cyber%20security.%20_%20Deutsche%20Telekom.pdf
11852020-05-14ec57814179f082e30a8f4aa2a76ae9a5b393eb92dl-20200511-lolsnif-appendix-b-enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.14.LOLSnif/dl-20200511-lolsnif-appendix-b-en.pdf
11862020-05-18c3540b25293ee33d44c189ce1946a445c6b5964aAPT-C-23.cnhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.18_APT-C-23/APT-C-23.cn.pdf
11872020-05-191784a9f7457b052811e96d6467f1b6f32fa29a7aSophisticated Espionage Group Turns Attention to Telecom Providers in South Asia _ Symantec Blogshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.19.Greenbug_South_Asia/Sophisticated%20Espionage%20Group%20Turns%20Attention%20to%20Telecom%20Providers%20in%20South%20Asia%20_%20Symantec%20Blogs.pdf
11882020-05-210953a87a680ee134d2a8eaedec907f5c27028f32No “Game over” for the Winnti Group _ WeLiveSecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.21.No_Game_Over_Winnti/No%20%E2%80%9CGame%20over%E2%80%9D%20for%20the%20Winnti%20Group%20_%20WeLiveSecurity.pdf
11892020-05-21b2960938fa9e99613d211c440e2ee48c55c5648fIntezer - The Evolution of APT15's Codebase 2020https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.21.APT15_Codebase_2020/Intezer%20-%20The%20Evolution%20of%20APT15%27s%20Codebase%202020.pdf
11902020-05-21e1693e54076e904e62f120e99f71dfb2d221caa5Bitdefender-Whitepaper-Chafer-creat4491-en-EN-interactivehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.21.Iranian_Chafer_APT/Bitdefender-Whitepaper-Chafer-creat4491-en-EN-interactive.pdf
11912020-05-25a34f8a68f18d5f0fab426f07d5c837e63e7b8ffcmpressioncss_ta_report_2019_4https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/2019.H2_macnica_TeamT5/mpressioncss_ta_report_2019_4.pdf
11922020-05-267bcdfae2ef025893a57007a928a4c633f6beea1dESET_Turla_ComRAThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.26_From_Agent.BTZ_to_ComRAT/ESET_Turla_ComRAT.pdf
11932020-05-28e76e32e631c965b225e1e3eae6ba3d480a01d3a7The zero-day exploits of Operation WizardOpium _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.28_Operation_WizardOpium/The%20zero-day%20exploits%20of%20Operation%20WizardOpium%20_%20Securelist.pdf
11942020-05-2916809dc5ccb7ad44158fdfaba10439aa3fdef9f6Russian Cyber Attack Campaigns and Actors - Threat Researchhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.05.29_russian-cyber-attack-campaigns-and-actors/Russian%20Cyber%20Attack%20Campaigns%20and%20Actors%20-%20Threat%20Research.pdf
11952020-06-0103c57228e99df9e0536038c7fe3bf74f77fd4377Cryptocurrency-Miners-XMRig-Based-CoinMiner-by-Blue-Mockingbird-Grouphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.06.01.Blue_Mockingbird_Group/Cryptocurrency-Miners-XMRig-Based-CoinMiner-by-Blue-Mockingbird-Group.pdf
11962020-06-035687700fffca8bb7c37d2ac6ea7b375916a4907bCycldek_ Bridging the (air) gap _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.06.03.Cycldek/Cycldek_%20Bridging%20the%20%28air%29%20gap%20_%20Securelist.pdf
11972020-06-03a95b65c51aa3655e486a5b843d4ffdddbe375eb5New LNK attack tied to Higaisa APT discovered - Malwarebytes Labs _ Malwarebytes Labshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.06.03.Higaisa_APT/New%20LNK%20attack%20tied%20to%20Higaisa%20APT%20discovered%20-%20Malwarebytes%20Labs%20_%20Malwarebytes%20Labs.pdf
11982020-06-081c6623db3c2b89f3d02c27dbfe556fa16d2787a2GuLoader_ No, CloudEyE. - Check Point Researchhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.06.08.GuLoader_CloudEyE/GuLoader_%20No%2C%20CloudEyE.%20-%20Check%20Point%20Research.pdf
11992020-06-0877eba65a1f4e631d789ce46a273cbbf91e03ea04TA410_ The Group Behind LookBack Attacks Against U.S. Utilities Sector Returns with New Malware _ Proofpoint UShttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.06.08.TA410/TA410_%20The%20Group%20Behind%20LookBack%20Attacks%20Against%20U.S.%20Utilities%20Sector%20Returns%20with%20New%20Malware%20_%20Proofpoint%20US.pdf
12002020-06-1107f675fbe36baae92e4ba5f2e87aeb80a9022b3aGamaredon group grows its game _ WeLiveSecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.06.11.Gamaredon_group/Gamaredon%20group%20grows%20its%20game%20_%20WeLiveSecurity.pdf
12012020-06-11d7eb46c7b708a6638eaec45c8707a7f171daef5aNew Android Spyware ActionSpy Revealed via Phishing Attacks from Earth Empusa - TrendLabs Security Intelligence Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.06.11.Earth_Empusa/New%20Android%20Spyware%20ActionSpy%20Revealed%20via%20Phishing%20Attacks%20from%20Earth%20Empusa%20-%20TrendLabs%20Security%20Intelligence%20Blog.pdf
12022020-06-15e4c9189b12b624d00aebddce020dc21235824382India_ Human Rights Defenders Targeted by a Coordinated Spyware Operation _ Amnesty Internationalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.06.15.india-human-rights-defenders-targeted/India_%20Human%20Rights%20Defenders%20Targeted%20by%20a%20Coordinated%20Spyware%20Operation%20_%20Amnesty%20International.pdf
12032020-06-168eb01ca0fecc1b0f5ce51c40907e4299f6819d58Cobalt tactics and tools updatehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.06.16.Cobalt_Update/Cobalt%20tactics%20and%20tools%20update.pdf
12042020-06-17166f227840f32bab3de2bcf6ebae6a7f8821e2a8Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature - Malwarebytes Labs _ Malwarebytes Labshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.06.17.malleable-c2-feature_APT/Multi-stage%20APT%20attack%20drops%20Cobalt%20Strike%20using%20Malleable%20C2%20feature%20-%20Malwarebytes%20Labs%20_%20Malwarebytes%20Labs.pdf
12052020-06-174374926cb1aae28c30d3737c3c12d001f6b3531aESET_Operation_Interceptionhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.06.17.Operation_Interception/ESET_Operation_Interception.pdf
12062020-06-17bf1e6d61f88eae47312b6fe8208fa32a7f12caeaAcidBox_ Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizationshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.06.17.AcidBox/AcidBox_%20Rare%20Malware%20Repurposing%20Turla%20Group%20Exploit%20Targeted%20Russian%20Organizations.pdf
12072020-06-18b74baf46be77a5cf227622de8617e50b80573388mpressioncss_ta_report_2019_4_enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/2019.H2_macnica_TeamT5/mpressioncss_ta_report_2019_4_en.pdf
12082020-06-18ecbed95d0006c27f040e1e371a8bc71084ae425dESET_InvisiMolehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.06.18.InvisiMole_hidden_arsenal/ESET_InvisiMole.pdf
12092020-06-190ae2875e3f06b901197455731e0ebe814e144e32Targeted Attack Leverages India-China Border Disputehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.06.19.India-China_Border_Dispute_APT/Targeted%20Attack%20Leverages%20India-China%20Border%20Dispute.pdf
12102020-06-23b31245aa28777ce928ce0325c7a77db3a42edc1aWastedLocker_ A New Ransomware Variant Developed By The Evil Corp Group NCC Group Researchhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.06.23.WastedLocker_Evil_Corp_Group/WastedLocker_%20A%20New%20Ransomware%20Variant%20Developed%20By%20The%20Evil%20Corp%20Group%20%E2%80%93%20NCC%20Group%20Research.pdf
12112020-06-243f653faebd179cd80f6cf9900894d675d733f1ebBRONZE VINEWOOD Targets Supply Chains _ Secureworkshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.06.24.BRONZE_VINEWOOD/BRONZE%20VINEWOOD%20Targets%20Supply%20Chains%20_%20Secureworks.pdf
12122020-06-256d040ce46d5e965b3307831e8e60e579f717b533Leviathan APT campaign in 2020 Malaysian political crisis _ Elastic Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.06.25.Malaysian-focused-APT_campaign/Leviathan%20APT%20campaign%20in%202020%20Malaysian%20political%20crisis%20_%20Elastic%20Blog.pdf
12132020-06-265e6cfc1c4120b7e4816fb45ed6d4df1716020c90WastedLocker_ Symantec Identifies Wave of Attacks Against U.S. Organizations _ Symantec Blogshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.06.26_WastedLocker_Attack/WastedLocker_%20Symantec%20Identifies%20Wave%20of%20Attacks%20Against%20U.S.%20Organizations%20_%20Symantec%20Blogs.pdf
12142020-06-280951da302792eca3f8f5bc739e2416f085a4545d2020.06.29_APT_threat_report_2020_1H_CN_versionhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/QianXin/2020.06.29_APT_threat_report_2020_1H_CN_version.pdf
12152020-06-29fd80d881cea6a3b5f1c67d95e923993c5f54c56eTalos Blog __ Cisco Talos Intelligence Group - Comprehensive Threat Intelligence_ PROMETHIUM extends global reach with StrongPity3 APThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.06.29.PROMETHIUM_StrongPity3_APT/Talos%20Blog%20__%20Cisco%20Talos%20Intelligence%20Group%20-%20Comprehensive%20Threat%20Intelligence_%20PROMETHIUM%20extends%20global%20reach%20with%20StrongPity3%20APT.pdf
12162020-06-3029cc78207bc8dd6dddcd9d7a0cb70ba9fd44ac64Bitdefender-Whitepaper-StrongPity-APThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.06.30_StrongPity_APT/Bitdefender-Whitepaper-StrongPity-APT.pdf
12172020-07-01072401ca621f892b99161ba98326a82ece2a24dalookout-uyghur-malware-tr-ushttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.07.01.Mobile_APT_Uyghurs/lookout-uyghur-malware-tr-us.pdf
12182020-07-0261e28d6bfe21e4e27c946ef0478ad222e6903063ASEC_REPORT_vol.99_ENGhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/AhnLab/ASEC_REPORT_vol.99_ENG.pdf
12192020-07-03290ed6fd6340d563fe2220d47bb80c349952683dcybersecurity-threatscape-2020-q1-enghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/PTSecurity/cybersecurity-threatscape-2020-q1-eng.pdf
12202020-07-06fd213cf3ad977d04889c1f4bf9d36023270f12feNorth Korean hackers are skimming US and European shoppers Sansechttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.07.06_North_Korean_Magecart/North%20Korean%20hackers%20are%20skimming%20US%20and%20European%20shoppers%20%E2%80%93%20Sansec.pdf
12212020-07-084af9052cde27fa68791ba498e8ca4b2d8632933bTA410https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.07.08.TA410/TA410.pdf
12222020-07-0884838de308f10054250e737881e8882ed3115a9eCopy cat of APT Sidewinder _. In tweeter this weekend,@Timele9527… _ by Sebdraven _ Mediumhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.07.08.Copy_Cat_of_Sidewinder/Copy%20cat%20of%20APT%20Sidewinder%20_.%20In%20tweeter%20this%20weekend%2C%40Timele9527%E2%80%A6%20_%20by%20Sebdraven%20_%20Medium.pdf
12232020-07-089f8dda7367cccce4857167350a81827265457f12Operation Honey Trap_ APT36 Targets Defense Organizations in Indiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.07.08_Operation_Honey_Trap/Operation%20%E2%80%98Honey%20Trap%E2%80%99_%20APT36%20Targets%20Defense%20Organizations%20in%20India.pdf
12242020-07-0960542b63d4ebd6481f237c64553920cb3ee53897acid-agari-cosmic-lynxhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.07.09_Cosmic_Lynx/acid-agari-cosmic-lynx.pdf
12252020-07-09b2431a336059c7dca596d6f2195b08f084129dc6More evil_ A deep look at Evilnum and its toolset _ WeLiveSecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.07.09_Evilnum_Toolset/More%20evil_%20A%20deep%20look%20at%20Evilnum%20and%20its%20toolset%20_%20WeLiveSecurity.pdf
12262020-07-09f65700a01bce110e78a4426f2691de3ce3d1dad5IoCshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.07.09_Evilnum_Toolset/IoCs.pdf
12272020-07-122450a3838805875b48de2c1092cc6438b8ab3497SideWinder_APT_2020_H1_CN_versionhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.07.12_SideWinder_2020_H1/SideWinder_APT_2020_H1_CN_version.pdf
12282020-07-1419cf361089a302524207249a3c86c2a390ce19a4Turla _ Venomous Bear updates its arsenal_ _NewPass_ appears on the APT threat scene - Telsyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.07.14_Turla_VENOMOUS_BEAR/Turla%20_%20Venomous%20Bear%20updates%20its%20arsenal_%20_NewPass_%20appears%20on%20the%20APT%20threat%20scene%20-%20Telsy.pdf
12292020-07-14555840514267ef3183af84b886b7e25da4bd41aaWelcome Chat as a secure messaging app_ Nothing could be further from the truth _ WeLiveSecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.07.14_Molerats_Middle_East_APT/Welcome%20Chat%20as%20a%20secure%20messaging%20app_%20Nothing%20could%20be%20further%20from%20the%20truth%20_%20WeLiveSecurity.pdf
12302020-07-15b733176571839bd9bce34d91e7c5cdbf62c7529e2020-07-the-fake-ciscohttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.07.15_the_Fake_CISCO/2020-07-the-fake-cisco.pdf
12312020-07-16c37c39a715b7dabb3b71b2bcb720b4b1d6b55381Advisory-APT29-targets-COVID-19-vaccine-developmenthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.07.16.apt29-targets-covid-19-vaccine-development/Advisory-APT29-targets-COVID-19-vaccine-development.pdf
12322020-07-17135a6f7d72166abc72a0fc691651c47eb0ed1b5eCERTFR-2020-CTI-008https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.07.17.DRIDEX/CERTFR-2020-CTI-008.pdf
12332020-07-207ff8651fcdf8d0213257d3bf05b729b9c11d34b1Study_of_the_APT_attacks_on_state_institutions_in_Kazakhstan_and_Kyrgyzstan_enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.07.20.APT_attacks_Kazakhstan_Kyrgyzstan/Study_of_the_APT_attacks_on_state_institutions_in_Kazakhstan_and_Kyrgyzstan_en.pdf
12342020-07-2211dec46f1e037a4be8fdb1c7308385776697b456OilRig Targets Middle Eastern Telecommunications Organization and Adds Novel C2 Channel with Steganography to Its Inventoryhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.07.22.OilRig_Middle_Eastern_Telecommunication/OilRig%20Targets%20Middle%20Eastern%20Telecommunications%20Organization%20and%20Adds%20Novel%20C2%20Channel%20with%20Steganography%20to%20Its%20Inventory.pdf
12352020-07-221b63cf401d94eb2778d2fbdb6355cd4f7ab8eda6MATA_ Multi-platform targeted malware framework _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.07.22_MATA_APT/MATA_%20Multi-platform%20targeted%20malware%20framework%20_%20Securelist.pdf
12362020-07-2859031d3fff5445b8aa9f1384206288dba535f3c6cta-2020-0728https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.07.28.RedDelta_APT/cta-2020-0728.pdf
12372020-07-287af26b2a4e7823c399ebcc9adc62e927110a538aGroup-IB_PATRIOT_ENhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.07.28.black-jack/Group-IB_PATRIOT_EN.pdf
12382020-07-2952d8a01e7f751445ce92fe22444fa00c0d26b8d6ESET_Threat_Report_Q22020https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/ESET/ESET_Threat_Report_Q22020.pdf
12392020-07-299270d79d9568ff5effdec6b1bcdfae2b35122ee3mcafee.com-Operation 노스 스타 North Star A Job Offer Thats Too Good to be Truehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.07.29.Operation_North_Star/mcafee.com-Operation%20%EB%85%B8%EC%8A%A4%20%EC%8A%A4%ED%83%80%20North%20Star%20A%20Job%20Offer%20Thats%20Too%20Good%20to%20be%20True.pdf
12402020-07-314e5462be50d05ec0016c0ac96ac1b1cb1820bce4APT_trends_report_Q2_2020_Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/Kaspersky/APT_trends_report_Q2_2020_Securelist.pdf
12412020-08-034fa97bcbbda216a683c7b1b4105870086422bc8aMAR-10292089-1.v2 Chinese Remote Access Trojan_ TAIDOOR _ CISAhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.08.03.TAIDOOR/MAR-10292089-1.v2%20%E2%80%93%20Chinese%20Remote%20Access%20Trojan_%20TAIDOOR%20_%20CISA.pdf
12422020-08-100a1374273e78f5de1ee2df446cdfad6326cc09ffGorgon APT targeting MSME sector in Indiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.08.10.Gorgon_APT/Gorgon%20APT%20targeting%20MSME%20sector%20in%20India.pdf
12432020-08-124dd82280ab1b8286e7a15a6712d8aa51cea5717eInternet Explorer and Windows zero-day exploits used in Operation PowerFall _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.08.12.Operation_PowerFall/Internet%20Explorer%20and%20Windows%20zero-day%20exploits%20used%20in%20Operation%20PowerFall%20_%20Securelist.pdf
12442020-08-135a2a35f3dd63f115ffccd50ac18f25aa545b2476CactusPete APT groups updated Bisonal backdoor _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.08.13.CactusPete_APT/CactusPete%20APT%20group%E2%80%99s%20updated%20Bisonal%20backdoor%20_%20Securelist.pdf
12452020-08-13dbd58d46b251bb8850045e8a0c9588fb480f5ad7Dream-Job-Campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.08.13.Operation_Dream_Job/Dream-Job-Campaign.pdf
12462020-08-18ae100f502bae1c22ccbaafc930363da92fee7af6f-secureLABS-tlp-white-lazarus-threat-intel-report2https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.08.18.LAZARUS_GROUP/f-secureLABS-tlp-white-lazarus-threat-intel-report2.pdf
12472020-08-202be29c83661be962010cd1b651bc30358270d37fBitdefender-PR-Whitepaper-APTHackers-creat4740-en-EN-GenericUsehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.08.20_APT_Hackers_for_Hire/Bitdefender-PR-Whitepaper-APTHackers-creat4740-en-EN-GenericUse.pdf
12482020-08-20d26eee9aaf68c944c7b606a24e527a22d8f044e9CERTFR-2020-CTI-009https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.08.20_DEVELOPMENT_TA505/CERTFR-2020-CTI-009.pdf
12492020-08-2415d4cbcd158a1d481d50df98c0bab7c7320b9204Lifting the veil on DeathStalker, a mercenary triumvirate _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.08.24_DeathStalker/Lifting%20the%20veil%20on%20DeathStalker%2C%20a%20mercenary%20triumvirate%20_%20Securelist.pdf
12502020-08-279773d73d8f5fa7731c250b8c5a120c7d2f122737The-Kittens-are-Back-in-Town-3https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.08.27.Kittens_Are_Back/The-Kittens-are-Back-in-Town-3.pdf
12512020-08-281e67a31a1b58037730ec5c2658f08cf7e341f22aTransparent Tribe_ Evolution analysis, part 2 _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.08.28_Transparent_Tribe/Transparent%20Tribe_%20Evolution%20analysis%2C%20part%202%20_%20Securelist.pdf
12522020-09-01c58ac19d02322eb584b9a933873258b4bb46c63dChinese APT TA413 Resumes Targeting of Tibet Following COVID-19 Themed Economic Espionage Campaign Delivering Sepulcher Malware Targeting Europe _ Proofpoint UShttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.09.01.Chinese_APT_TA413/Chinese%20APT%20TA413%20Resumes%20Targeting%20of%20Tibet%20Following%20COVID-19%20Themed%20Economic%20Espionage%20Campaign%20Delivering%20Sepulcher%20Malware%20Targeting%20Europe%20_%20Proofpoint%20US.pdf
12532020-09-03481ea2b17f84432633e8539b6d0bdda62084a18bcybersecurity-threatscape-2020-q2-enghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/PTSecurity/cybersecurity-threatscape-2020-q2-eng.pdf
12542020-09-037f81e670c66b8e8bbbe5cb52544526cb18ee432cEvilnum IOCshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.09.03.Evilnum_Pyvil/Evilnum%20IOCs.pdf
12552020-09-03a61dd692af601982998502a3f199395a118ed59bNo Rest for the Wicked_ Evilnum Unleashes PyVil RAThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.09.03.Evilnum_Pyvil/No%20Rest%20for%20the%20Wicked_%20Evilnum%20Unleashes%20PyVil%20RAT.pdf
12562020-09-078cd6e584044556e5548bdefff08e2cf2c9bb5ecfswift_bae_report_Follow-The Moneyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/2020.09.07_Follow_the_Money/swift_bae_report_Follow-The%20Money.pdf
12572020-09-0831e082a1ca4f7e12ac0cc0a32185d5c7c55752e6TeamTNT activity targets Weave Scope deployments - Microsoft Tech Community - 1645968https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.09.08.TeamTNT_Weave-Scope/TeamTNT%20activity%20targets%20Weave%20Scope%20deployments%20-%20Microsoft%20Tech%20Community%20-%201645968.pdf
12582020-09-116370087a176d2e536888fde5dfd0478d2675ead62020.09.11_Talos_-_The_art_and_science_of_detecting_Cobalt_Strikehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.09.11_Talos_-_The_art_and_science_of_detecting_Cobalt_Strike/2020.09.11_Talos_-_The_art_and_science_of_detecting_Cobalt_Strike.pdf
12592020-09-16e31ec8645ecd065f317e9b6ac0f0e83849c1ecc9Partners in crime_ North Koreans and elite Russian-speaking cybercriminals - Intel 471https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.09.16.Partners_in_crime/Partners%20in%20crime_%20North%20Koreans%20and%20elite%20Russian-speaking%20cybercriminals%20-%20Intel%20471.pdf
12602020-09-1793d561129091d822ec1d402a359e7dedb472766d69da886eecc7087e9dac2d3ea4c66ba8https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.09.17.Operation_Tibbar/69da886eecc7087e9dac2d3ea4c66ba8.pdf
12612020-09-21656646baa87275b8a967c07f218e65abad2dc05cTalos_Cobalt_Strikehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.09.21.coverage-strikes-back-cobalt-strike-paper/Talos_Cobalt_Strike.pdf
12622020-09-22e08daeb493b2dd368eaf56261dc50d1a320c1a54APT28 Delivers Zebrocy Malware Campaign Using NATO Theme as Lurehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.09.22.APT28_Zebrocy_Malware_Campaign/APT28%20Delivers%20Zebrocy%20Malware%20Campaign%20Using%20NATO%20Theme%20as%20Lure.pdf
12632020-09-23a1bdc13886c38c08ab612c67fa129cf822a0c586Seqrite-WhitePaper-Operation-SideCopyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.09.23.Operation_SideCopy/Seqrite-WhitePaper-Operation-SideCopy.pdf
12642020-09-24b68432d09718bec3dcd78a55d09dc826f249f425Microsoft Security—detecting empires in the cloud - Microsoft Securityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.09.24.Empires_in_the_Cloud/Microsoft%20Security%E2%80%94detecting%20empires%20in%20the%20cloud%20-%20Microsoft%20Security.pdf
12652020-09-2537b32bf2d55a94ac7991302ba9b19f19cd4ea4dcGerman-made FinSpy spyware found in Egypt, and Mac and Linux versions revealed _ Amnesty Internationalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.09.25.Finspy_in_Egypt/German-made%20FinSpy%20spyware%20found%20in%20Egypt%2C%20and%20Mac%20and%20Linux%20versions%20revealed%20_%20Amnesty%20International.pdf
12662020-09-25a77cbdde77e4f422afa752f5300c4c61227a9713apt-c-43-steals-venezuelan-military-secrets-to-provide-intelligence-support-for-the-reactionaries-hpreact-campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.09.25.APT-C-43_HpReact_campaign/apt-c-43-steals-venezuelan-military-secrets-to-provide-intelligence-support-for-the-reactionaries-hpreact-campaign.pdf
12672020-09-2957e8d714b5d438ce9e92de0b265e73d7e9f44956Palmerworm_ Espionage Gang Targets the Media, Finance, and Other Sectors _ Symantec Blogshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.09.29.Palmerworm/Palmerworm_%20Espionage%20Gang%20Targets%20the%20Media%2C%20Finance%2C%20and%20Other%20Sectors%20_%20Symantec%20Blogs.pdf
12682020-09-29964d1402954f35daa80c32477d96673bd3e8d9e32020.09.29_ShadowPad - new activity from the Winnti grouphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.09.29_ShadowPad_-_new_activity_from_the_Winnti_group/2020.09.29_ShadowPad%20-%20new%20activity%20from%20the%20Winnti%20group.pdf
12692020-09-30c19c3cf6fc7f11ece1d8db1f0eaf19dd9017d91aAPTC23 group evolves its Android spyware _ WeLiveSecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.09.30.APT%E2%80%91C%E2%80%9123_Android/APT%E2%80%91C%E2%80%9123%20group%20evolves%20its%20Android%20spyware%20_%20WeLiveSecurity.pdf
12702020-10-05293d6da465b3568edeba3f01e6b51ab5c504bce82020.10.05_-_MosaicRegressor_Lurking_in_the_Shadows_of_UEFI_Securelist_2020https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.10.05.MosaicRegressor_Lurking_in_the_Shadows_of_UEFI/2020.10.05_-_MosaicRegressor_Lurking_in_the_Shadows_of_UEFI_Securelist_2020.pdf
12712020-10-06e00bdad5093bbd5ef5d5b949edfbb5e7d2a0d668Release the Kraken_ Fileless APT attack abuses Windows Error Reporting servicehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.10.06.Kraken_Fileless_APT/Release%20the%20Kraken_%20Fileless%20APT%20attack%20abuses%20Windows%20Error%20Reporting%20service.pdf
12722020-10-079782e6360e97367764f28ad9eeb6a2b7bb830e3ereport-spark-bahamuthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.10.07.Massive_Hack-For-Hire_Group/report-spark-bahamut.pdf
12732020-10-12dd71e034b730cc673712b1c34759f6d8a08e85d7ASEC_REPORT_vol.100_ENGhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/AhnLab/ASEC_REPORT_vol.100_ENG.pdf
12742020-10-13f439ee14595e3a11b2bbf3180d48149a4148309fBlood_Rubia_APT_CN_versionhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.10.13.Operation_Rubia_cordifolia/Blood_Rubia_APT_CN_version.pdf
12752020-10-148406efff010535b5b3970c90f1c66c48cd42a334Silent Librarian APT right on schedule for 20_21 academic year - Malwarebytes Labs _ Malwarebytes Labshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.10.14.Silent_Librarian_APT/Silent%20Librarian%20APT%20right%20on%20schedule%20for%2020_21%20academic%20year%20-%20Malwarebytes%20Labs%20_%20Malwarebytes%20Labs.pdf
12762020-10-157b40403abebcff1c0adfca8446cf0470c96d6caf2020.10.15_Operation_Quicksand_MuddyWaters_Offensive_Attack_Against_Israelihttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.10.15_Operation_Quicksand_MuddyWater%E2%80%99s_Offensive_Attack_Against_Israeli/2020.10.15_Operation_Quicksand_MuddyWater%E2%80%99s_Offensive_Attack_Against_Israeli.pdf
12772020-10-194a1e9f829eb2f169cfa22e8ee29bf346b07002a4ETL2020_Incidents_A4https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/ENISA/ETL2020_Incidents_A4.pdf
12782020-10-19caf252729256e6060cdd1a1b79c1601bbb9e57f52020.10.19_-_Operation_Earth_Kitsune_-_Tracking_SLUBs_current_operationshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.10.19_-_Operation_Earth_Kitsune_-_Tracking_SLUBs_current_operations/2020.10.19_-_Operation_Earth_Kitsune_-_Tracking_SLUBs_current_operations.pdf
12792020-10-22a64d2206e1e103ad29c72db4046f85bd46769eb7Bitter_CHM_APT_CNhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.10.22.Bitter_CHM_APT/Bitter_CHM_APT_CN.pdf
12802020-10-23b373caf73601a0d9b85ac7ddf32b5bafd7fac08bAPT-C-44_CN_Versionhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.10.23.APT-C-44_NAFox/APT-C-44_CN_Version.pdf
12812020-10-2677cb524019f00c62291b56c239af3b64cde985e3Study_of_the_ShadowPad_APT_backdoor_and_its_relation_to_PlugX_en (1)https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.10.26.ShadowPad_APT_backdoor_PlugX/Study_of_the_ShadowPad_APT_backdoor_and_its_relation_to_PlugX_en%20%281%29.pdf
12822020-10-2763c7af76b7bf400f15d027af6c64e7713b031fc3ESET_Threat_Report_Q32020https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/ESET/ESET_Threat_Report_Q32020.pdf
12832020-10-27e9982868ab5e1049d2681d5f26b52b6d3cfc90aaTLP-WHITE_AA20-301A_North_Korean_APT_Focus_Kimsukyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.10.27_AA20-301A.North_Korean_APT/TLP-WHITE_AA20-301A_North_Korean_APT_Focus_Kimsuky.pdf
12842020-11-01ff7e1ff5b450cfab95e1d2efeed6173e6f752658cyberstanc.com-A look into APT36s Transparent Tribe tradecrafthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.11.01.Transparent_Tribe_APT/cyberstanc.com-A%20look%20into%20APT36s%20Transparent%20Tribe%20tradecraft.pdf
12852020-11-02060d5bead69abda2843568e023e2da9b79f30728fireeye.com-Live off the Land How About Bringing Your Own Island An Overview of UNC1945https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.11.02.UNC1945/fireeye.com-Live%20off%20the%20Land%20How%20About%20Bringing%20Your%20Own%20Island%20An%20Overview%20of%20UNC1945.pdf
12862020-11-045740fa2785845008e0ca6e3116cd9e545ec8712f2020.11.04_-_WorldEconomicForum_-_Partnership_against_Cybercrimehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/2020.11.04_-_WorldEconomicForum_-_Partnership_against_Cybercrime/2020.11.04_-_WorldEconomicForum_-_Partnership_against_Cybercrime.pdf
12872020-11-049adac60dfdae3acfe01e9d105fc0e50e7e80ea62APT_trends_report_Q3_2020_Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/Kaspersky/APT_trends_report_Q3_2020_Securelist.pdf
12882020-11-04ad4a25b8d51c674cc7cc87ce0a38d119214203aaA new APT uses DLL side-loads to “KilllSomeOne” Sophos Newshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.11.04.KilllSomeOne_DLL_APT/A%20new%20APT%20uses%20DLL%20side-loads%20to%20%E2%80%9CKilllSomeOne%E2%80%9D%20%E2%80%93%20Sophos%20News.pdf
12892020-11-06f20e6d7993156865b1b6d4d17c8a61f4cbfdf197OceanLotus_ Extending Cyber Espionage Operations Through Fake Websites _ Volexityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.11.06.OceanLotus_Fake_Websites/OceanLotus_%20Extending%20Cyber%20Espionage%20Operations%20Through%20Fake%20Websites%20_%20Volexity.pdf
12902020-11-1034ca92f2cf9d17f44a084b1dfd89861416010109cta-2020-1110https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.11.10.APT32_Cambodian/cta-2020-1110.pdf
12912020-11-1169abc992873b860e8f7677b252223232e89c759d2020-2021-cyber-espionage-reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/Verizon/2020-2021-cyber-espionage-report.pdf
12922020-11-120059d38480ba7bf97b0eca30fe489c3a41d8862eHungry for data, ModPipe backdoor hits POS software used in hospitality sector _ WeLiveSecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.11.12.ModPipe_POS_Hospitality-Sector/Hungry%20for%20data%2C%20ModPipe%20backdoor%20hits%20POS%20software%20used%20in%20hospitality%20sector%20_%20WeLiveSecurity.pdf
12932020-11-125352306527c9f9cbd00390846f430f159d9e6797Jupyter Infostealer WEBhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.11.12.Jupyter_InfoStealer/Jupyter%20Infostealer%20WEB.pdf
12942020-11-12d6c8819c55c41b32b1d1d75fff4346407609acf2The CostaRicto Campaign_ Cyber-Espionage Outsourcedhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.11.12.CostaRicto_Campaign/The%20CostaRicto%20Campaign_%20Cyber-Espionage%20Outsourced.pdf
12952020-11-12e9f32f7b199787f8b8bb42c90054f2db6a1fee0fCisco Talos Intelligence Group - Comprehensive Threat Intelligence_ CRAT wants to plunder your endpointshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.11.12.CRAT_Lazarus/Cisco%20Talos%20Intelligence%20Group%20-%20Comprehensive%20Threat%20Intelligence_%20CRAT%20wants%20to%20plunder%20your%20endpoints.pdf
12962020-11-1604f2e7dae2a99039549957795de625810f0e2698Bitdefender-Whitepaper-Chinese-APThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.11.16.Chinese_APT_South_Eastern_Asian/Bitdefender-Whitepaper-Chinese-APT.pdf
12972020-11-165c1c65e34650e0d891d23fbf362a7f160db8fe67TA505_ A Brief History Of Their Time Fox-IT International bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.11.16.TA505_History/TA505_%20A%20Brief%20History%20Of%20Their%20Time%20%E2%80%93%20Fox-IT%20International%20blog.pdf
12982020-11-17297670f9a872410bddc852a030f4a7ec518e167f11-2020-Chaes-e-commerce-malware-researchhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.11.17.CHAES/11-2020-Chaes-e-commerce-malware-research.pdf
12992020-11-17757fa642dccef50a0d9c00f12de89e57d136b796Japan-Linked Organizations Targeted in Long-Running and Sophisticated Attack Campaign _ Symantec Blogshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.11.17.Cicada_Japan/Japan-Linked%20Organizations%20Targeted%20in%20Long-Running%20and%20Sophisticated%20Attack%20Campaign%20_%20Symantec%20Blogs.pdf
13002020-11-17be07f4c6382c69d62fb14a5886575b3bec1de53dchaes-malware-iocshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.11.17.CHAES/chaes-malware-iocs.pdf
13012020-11-181b8684ab53b5ee732bfb95dab91fbbae3da45700sophos-2021-threat-reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/Sophos/sophos-2021-threat-report.pdf
13022020-11-1830d80fc2ff785b0dffdd99d24cec6b35e65556742020.11.18_Zooming_into_Darknet_Threats_Targeting_Japanese_Organizationshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/2020.11.18_Zooming_into_Darknet_Threats_Targeting_Japanese_Organizations/2020.11.18_Zooming_into_Darknet_Threats_Targeting_Japanese_Organizations.pdf
13032020-11-19657a7e2583a1f3590740eb6935202c5ebe94ecdb2020.11.19_-_Cybereason_vs_MedusaLocker_Ransomwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.11.19.MedusaLocker_Ransomware/2020.11.19_-_Cybereason_vs_MedusaLocker_Ransomware.pdf
13042020-11-230e1716828670b5518cfa19c9a31b7c61002a1042Group-IB_Hi-Tech_Crime_Trends_2020-2021_enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/Group-IB/Group-IB_Hi-Tech_Crime_Trends_2020-2021_en.pdf
13052020-11-23680326f4ffb2f446f27f40fb66eaaae9fd0254fd[S2W LAB] Analysis of Clop Ransomware suspiciously related to the Recent Incident (English)https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.11.23.Clop_Campaign/%5BS2W%20LAB%5D%20Analysis%20of%20Clop%20Ransomware%20suspiciously%20related%20to%20the%20Recent%20Incident%20%28English%29.pdf
13062020-11-26507f014ec7d5d00cdfe894e9f4a8e5d6363aa73fBandook_ Signed & Delivered - Check Point Researchhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.11.26.Bandook/Bandook_%20Signed%20%26%20Delivered%20-%20Check%20Point%20Research.pdf
13072020-11-27ad2ea5b4d217a569389d450ff52aa167961484cbInvestigation with a twist_ an accidental APT attack and averted data destructionhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.11.27.Twist_APT27/Investigation%20with%20a%20twist_%20an%20accidental%20APT%20attack%20and%20averted%20data%20destruction.pdf
13082020-11-3015fe81e24bfbb3b20b2deddd8beeb6c137956a79Threat actor leverages coin miner techniques to stay under the radar heres how to spot them - Microsoft Securityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.11.30.BISMUTH_CoinMiner/Threat%20actor%20leverages%20coin%20miner%20techniques%20to%20stay%20under%20the%20radar%20%E2%80%93%20here%E2%80%99s%20how%20to%20spot%20them%20-%20Microsoft%20Security.pdf
13092020-11-305e45c51ac37f98d5a77773448007d5c2d47b28f6yoroi.company-Shadows From the Past Threaten Italian Enterpriseshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.11.30.UNC1945/yoroi.company-Shadows%20From%20the%20Past%20Threaten%20Italian%20Enterprises.pdf
13102020-12-0149b601dfe0bb2b946424d96bdd31c63cb0ea2c03Red_Kangaroohttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.12.01.Operation_RED_KANGAROO/Red_Kangaroo.pdf
13112020-12-01ee81cf429cf7d9d2f535e00a6f041e70be4364baAA20-336A-APT_Actors_Targeting_US_ThinkTankshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.12.01.APT_US_Think_Tanks/AA20-336A-APT_Actors_Targeting_US_ThinkTanks.pdf
13122020-12-02201269ab296c57608c21f5dc2db15738b73409daTurla Crutch_ Keeping the “back door” open _ WeLiveSecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.12.02.Turla_Crutch/Turla%20Crutch_%20Keeping%20the%20%E2%80%9Cback%20door%E2%80%9D%20open%20_%20WeLiveSecurity.pdf
13132020-12-03721bc070ec4a33f0c6aa17606e76d04ccfb80b21ATR_82599-1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.12.03.Adversary_Tracking_Report/ATR_82599-1.pdf
13142020-12-0713c7d3da1d1cec27f6bf4730227557837d0191daThe footprints of Raccoon_ a story about operators of JS-sniffer FakeSecurity distributing Raccoon stealerhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.12.07.FakeSecurity/The%20footprints%20of%20Raccoon_%20a%20story%20about%20operators%20of%20JS-sniffer%20FakeSecurity%20distributing%20Raccoon%20stealer.pdf
13152020-12-095fbc6d29a61db83e0aaa5262e68751d0fc91aae7SideWinder Uses South Asian Issues for Spear Phishing, Mobile Attackshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.12.09.SideWinder/SideWinder%20Uses%20South%20Asian%20Issues%20for%20Spear%20Phishing%2C%20Mobile%20Attacks.pdf
13162020-12-09731f807cbab23d94b4fb3b2fab99a2ff6ff0394aRussian APT Uses COVID-19 Lures to Deliver Zebrocy - Intezerhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.12.09.Sofacy_APT/Russian%20APT%20Uses%20COVID-19%20Lures%20to%20Deliver%20Zebrocy%20-%20Intezer.pdf
13172020-12-1346758aa98959fdc1ae34dd3ef0ab1303879cc692fireeye.com-Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.12.13.SolarWinds_Supply_Chain_SUNBURST_Backdoor/fireeye.com-Highly%20Evasive%20Attacker%20Leverages%20SolarWinds%20Supply%20Chain%20to%20Compromise%20Multiple%20Global%20Victims%20With%20.pdf
13182020-12-150a6463f3c8f788c5b69d1a93c941fd3d9e3b5a44Microsoft_Digital_Defense_Report_2020_Septemberhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/Microsoft/Microsoft_Digital_Defense_Report_2020_September.pdf
13192020-12-1533f5db26e70ff659285215cfe24da89b0ee44f78ThreatReport-Lazarushttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.12.15.Lazarus_Campaign/ThreatReport-Lazarus.pdf
13202020-12-15d1e6ea484caee3d4a6caba94f056bfb1ec350303APT-C-47_ClickOnce_Operation.CN_versionhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.12.15.APT-C-47_ClickOnce/APT-C-47_ClickOnce_Operation.CN_version.pdf
13212020-12-1675609cca39e6bd39390f11e23753c951fd5f0f7eMapping out AridViper Infrastructure Using Augurys Malware Module Team Cymruhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.12.16.AridViper_Augury/Mapping%20out%20AridViper%20Infrastructure%20Using%20Augury%E2%80%99s%20Malware%20Module%20%E2%80%93%20Team%20Cymru.pdf
13222020-12-1722d4bacae3cb4eda41d3b3ddf44843e8c5902db8Operation SignSight_ Supplychain attack against a certification authority in Southeast Asia _ WeLiveSecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.12.17.Operation_SignSight/Operation%20SignSight_%20Supply%E2%80%91chain%20attack%20against%20a%20certification%20authority%20in%20Southeast%20Asia%20_%20WeLiveSecurity.pdf
13232020-12-17a4f055f4aa7f38e5a81e9d28e6a1d929d2f6842aPay2Kittenhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.12.17.Pay2Kitten/Pay2Kitten.pdf
13242020-12-19f1a02cdc30e256d40d50aa8939f9aa79313324b7blog.vincss.net-RE018-1 Analyzing new malware of China Panda hacker group used to attack supply chain against Vietnamhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.12.19.Panda_Vietnam/blog.vincss.net-RE018-1%20Analyzing%20new%20malware%20of%20China%20Panda%20hacker%20group%20used%20to%20attack%20supply%20chain%20against%20Vietnam.pdf
13252020-12-2250fa2057d9ebe2ccb52a3d0bda82abf3ec5e8e2bblog.truesec.com-Collaboration between FIN7 and the RYUK group a Truesec Investigationhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.12.22.FIN7_RYUK/blog.truesec.com-Collaboration%20between%20FIN7%20and%20the%20RYUK%20group%20a%20Truesec%20Investigation.pdf
13262020-12-22613c7e31ab44b8c0329a518b3d89d5860d68c1ccCybersecurity_threatscape-2020-Q3.ENGhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/PTSecurity/Cybersecurity_threatscape-2020-Q3.ENG.pdf
13272020-12-235543aa9877bbed56afcfcb5423aeff3ac8f22a78securelist.com-Lazarus covets COVID-19-related intelligencehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.12.23.Lazarus_COVID-19/securelist.com-Lazarus%20covets%20COVID-19-related%20intelligence.pdf
13282020-12-29c16375fdd9f0f4b81b76df0c4f0d09967d040ab7Revenge RAT targeting users in South Americahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2020.12.29.Revenge_RAT/Revenge%20RAT%20targeting%20users%20in%20South%20America.pdf
13292021-01-0414665d7d4810b9592c7da1d219d6d44f35aac6ddnao-sec.org-Royal Road ReDivehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.04.Royal_Road_ReDive/nao-sec.org-Royal%20Road%20ReDive.pdf
13302021-01-04433f0b9bf25b149d226eee3c3405805cbcae3ad0research.checkpoint.com-Stopping Serial Killer Catching the Next Strikehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.04.Dridex_Next_Strike/research.checkpoint.com-Stopping%20Serial%20Killer%20Catching%20the%20Next%20Strike.pdf
13312021-01-04449c50fa76fa2545a649262dfe8fff05b2fcedf3APT27+turns+to+ransomwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.04.APT27_Ransomware/APT27%2Bturns%2Bto%2Bransomware.pdf
13322021-01-049abf08d5f161141853b1ecf23b0b35d6839adb64[Morphisec]_The_Evolution_of_the_FIN7_JssLoaderhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.04.Carbanak_evolution_of_FIN7_JssLoader/%5BMorphisec%5D_The_Evolution_of_the_FIN7_JssLoader.pdf
13332021-01-05425780581a76b844dce4c8817d1878171f138507quointelligence.eu-ReconHellcat Uses NIST Theme as Lure To Deliver New BlackSoul Malwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.05.ReconHellcat_APT_BlackSoul_Malware/quointelligence.eu-ReconHellcat%20Uses%20NIST%20Theme%20as%20Lure%20To%20Deliver%20New%20BlackSoul%20Malware.pdf
13342021-01-057ea2f0f7fad95346ee6624677767693dceca75cetrendmicro.com-Earth Wendigo Injects JavaScript Backdoor for Mailbox Exfiltrationhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.05.Earth_Wendigo_Mailbox_Exfiltration/trendmicro.com-Earth%20Wendigo%20Injects%20JavaScript%20Backdoor%20for%20Mailbox%20Exfiltration.pdf
13352021-01-069dafe61a944ded91b92124368c6095997beaa6c3blog.talosintelligence.com-A Deep Dive into Lokibot Infection Chainhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.06.Lokibot_Infection_Chain/blog.talosintelligence.com-A%20Deep%20Dive%20into%20Lokibot%20Infection%20Chain.pdf
13362021-01-06bdd99082714507efe1e61cb50369f0bcdf2f729fblog.malwarebytes.com-Retrohunting APT37 North Korean APT used VBA self decode technique to inject RokRathttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.06.APT37_North_Korean_APT_RokRat/blog.malwarebytes.com-Retrohunting%20APT37%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat.pdf
13372021-01-07791e4be4ccaf81a83beea4fc815af9e572222ef2BrunHilda_DaaShttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.07.Brunhilda_DaaS_Malware/BrunHilda_DaaS.pdf
13382021-01-082e84ade1e1bea56ea53967234f083557877053c8Charming Kittens Christmas Gift - Certfa Labhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.08.Charming_Kitten_Christmas_Gift/Charming%20Kitten%E2%80%99s%20Christmas%20Gift%20-%20Certfa%20Lab.pdf
13392021-01-110749d18014ca22469e3ded51cbdca9f836e6f52bSUNSPOT Malware A Technical Analysishttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.11.SUNSPOT/SUNSPOT%20Malware%20A%20Technical%20Analysis.pdf
13402021-01-1107ed9ccef8f3b0e30efe4c9110a73c5d537b6003ASEC_REPORT_vol.101_ENGhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/AhnLab/ASEC_REPORT_vol.101_ENG.pdf
13412021-01-1108046eda34296ae9856dbe879fa7529af2448279crowdstrike.com-SUNSPOT An Implant in the Build Processhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2021.01.11.SUNSPOT/crowdstrike.com-SUNSPOT%20An%20Implant%20in%20the%20Build%20Process.pdf
13422021-01-1161a27be290976447f72c35a58fb1b76481b08adbunit42.paloaltonetworks.com-xHunt Campaign New BumbleBee Webshell and SSH Tunnels Used for Lateral Movementhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2021.01.11.xHunt_Campaign/unit42.paloaltonetworks.com-xHunt%20Campaign%20New%20BumbleBee%20Webshell%20and%20SSH%20Tunnels%20Used%20for%20Lateral%20Movement.pdf
13432021-01-119077800dc0e2dbbb57d9c9a90a3619c68d718b13securelist.com-Sunburst backdoor code overlaps with Kazuarhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.11.Sunburst_Kazuar/securelist.com-Sunburst%20backdoor%20%20code%20overlaps%20with%20Kazuar.pdf
13442021-01-11d236226592ada17c3181d9c1eb42f6f6ca52f9bcxHunt Campaign_ New BumbleBee Webshell and SSH Tunnels Used for Lateral Movementhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.11.xHunt_Campaign/xHunt%20Campaign_%20New%20BumbleBee%20Webshell%20and%20SSH%20Tunnels%20Used%20for%20Lateral%20Movement.pdf
13452021-01-12d5cf4e80ac62b5e17eaf837484b6e99c5a7e1c34research.nccgroup.com-Abusing cloud services to fly under the radarhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.12.Abusing_cloud_services_Chimera/research.nccgroup.com-Abusing%20cloud%20services%20to%20fly%20under%20the%20radar.pdf
13462021-01-12e53b5732b76f4478577c591d9baec717e35adc3bwelivesecurity.com-Operation Spalax Targeted malware attacks in Colombiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.12.Operation_Spalax/welivesecurity.com-Operation%20Spalax%20Targeted%20malware%20attacks%20in%20Colombia.pdf
13472021-01-12ec83db1b099ad2e211b9633f66ebed82f8bb93e5yoroi.company-Opening STEELCORGI A Sophisticated APT Swiss Army Knifehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.12.STEELCORGI/yoroi.company-Opening%20STEELCORGI%20A%20Sophisticated%20APT%20Swiss%20Army%20Knife.pdf
13482021-01-14df2b0c38d578d431b4b112be019a28af408c96ddptsecurity.com-Higaisa or Winnti APT41 backdoors old and newhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.14.Higaisa_or_Winnti_APT41/ptsecurity.com-Higaisa%20or%20Winnti%20APT41%20backdoors%20old%20and%20new.pdf
13492021-01-200aca0b66d032d240ffcc074bc43e57cefb835967Commonly Known Tools Used by Lazarus - JPCERT_CC Eyes _ JPCERT Coordination Center official Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.20.Commonly_Known_Tools_Lazarus/Commonly%20Known%20Tools%20Used%20by%20Lazarus%20-%20JPCERT_CC%20Eyes%20_%20JPCERT%20Coordination%20Center%20official%20Blog.pdf
13502021-01-209dfed529039907f4bb300d0281839de2de0a0058A Deep Dive Into Patchwork APT Group _ Cyblehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.20.Deep_Dive_Patchwork/A%20Deep%20Dive%20Into%20Patchwork%20APT%20Group%20_%20Cyble.pdf
13512021-01-25701322599004ff14f9ec088b3b910f9e28c0eef7A detailed analysis of ELMER Backdoor used by APT16 CYBER GEEKShttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.25.APT16_Elmer_backdoor/A%20detailed%20analysis%20of%20ELMER%20Backdoor%20used%20by%20APT16%20%E2%80%93%20CYBER%20GEEKS.pdf
13522021-01-28f379aa885d52567de38ad7ffe6be90aca2140f56Lebanese-Cedar-APThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.28.Lebanese_Cedar_APT/Lebanese-Cedar-APT.pdf
13532021-01-311dfd4cd9d9a5cd3d9749a98852ba36d6eb0b865dJSAC2021_202_niwa-yanagishita_enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.01.31.A41APT/JSAC2021_202_niwa-yanagishita_en.pdf
13542021-02-011776a3f9f29651f6de2f458c0a14afb79c3bfb81VinCSS Blog_ [RE020] ElephantRAT (Kunming version)_ our latest discovered RAT of Panda and the similarities with recently Smanager RAThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.02.01.ElephantRAT/VinCSS%20Blog_%20%5BRE020%5D%20ElephantRAT%20%28Kunming%20version%29_%20our%20latest%20discovered%20RAT%20of%20Panda%20and%20the%20similarities%20with%20recently%20Smanager%20RAT.pdf
13552021-02-012306d03d7e80ab6e90c753e55ed363904371a6ffblog.vincss.net-RE020 ElephantRAT Kunming version our latest discovered RAT of Panda and the similarities with recenthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2021.02.01.ElephantRAT/blog.vincss.net-RE020%20ElephantRAT%20Kunming%20version%20our%20latest%20discovered%20RAT%20of%20Panda%20and%20the%20similarities%20with%20recent.pdf
13562021-02-01aaf0f41c26fc8122eed39c863ef7a586f4024808operation-nightscout-supply-chain-attack-online-gaming-asiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.02.01.Operation_NightScout/operation-nightscout-supply-chain-attack-online-gaming-asia.pdf
13572021-02-02b3337c0f3226c009089da347f58b0611411dfbedESET_Kobaloshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.02.02.Kobalos/ESET_Kobalos.pdf
13582021-02-03b075b3490db2935c09d7b942e2c1ae079cf0a29fHildegard_ New TeamTNT Malware Targeting Kuberneteshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.02.03.Hildegard/Hildegard_%20New%20TeamTNT%20Malware%20Targeting%20Kubernetes.pdf
13592021-02-08bcc2ff0e9e6bfbc5b2d54610dede3be8a49f1331research.checkpoint.com-Domestic Kitten An Inside Look at the Iranian Surveillance Operationshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.02.08.Domestic_Kitten/research.checkpoint.com-Domestic%20Kitten%20%20An%20Inside%20Look%20at%20the%20Iranian%20Surveillance%20Operations.pdf
13602021-02-09cd98ff1cf9217495ce3ccc27c189298278841548unit42.paloaltonetworks.com-BendyBear Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTechhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.02.09.BendyBear/unit42.paloaltonetworks.com-BendyBear%20Novel%20Chinese%20Shellcode%20Linked%20With%20Cyber%20Espionage%20Group%20BlackTech.pdf
13612021-02-1096d826302a7efc3ed7d0d5aec99c9cfc1646e4feblog.lookout.com-Lookout Discovers Novel Confucius APT Android Spyware Linked to India-Pakistan Conflicthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2021.02.10.Confucius_India-Pakistan/blog.lookout.com-Lookout%20Discovers%20Novel%20Confucius%20APT%20Android%20Spyware%20Linked%20to%20India-Pakistan%20Conflict.pdf
13622021-02-10f44953a930898e647b8220eec076c1274ca34851Novel Confucius APT Android Spyware Linked to India-Pakistan Conflicthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.02.10.Confucius_India-Pakistan/Novel%20Confucius%20APT%20Android%20Spyware%20Linked%20to%20India-Pakistan%20Conflict.pdf
13632021-02-174b91d90ea50514d038257a729599bddfa7a16bbbConfucius APT Android Spyware Targets Pakistani and Other South Asian Regions — Cyblehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.02.17.Confucius_Pakistani_South_Asian/Confucius%20APT%20Android%20Spyware%20Targets%20Pakistani%20and%20Other%20South%20Asian%20Regions%20%E2%80%94%20Cyble.pdf
13642021-02-177f777067bb7c374bc58a37819c510788819ab46ccybleinc.com-Confucius APT Android Spyware Targets Pakistani and Other South Asian Regionshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2020/2021.02.17.Confucius_Pakistani_South_Asian/cybleinc.com-Confucius%20APT%20Android%20Spyware%20Targets%20Pakistani%20and%20Other%20South%20Asian%20Regions.pdf
13652021-02-2298742dcad26eb4051bba977be4fe8bd6c6b140b1research.checkpoint.com-The Story of Jian How APT31 Stole and Used an Unknown Equation Group 0-Dayhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.02.22.APT31_Equation_Group/research.checkpoint.com-The%20Story%20of%20Jian%20%20How%20APT31%20Stole%20and%20Used%20an%20Unknown%20Equation%20Group%200-Day.pdf
13662021-02-239bef91678930a7bf4f38419db200a2abb277f839The_CrowdStrike_2021_Global_Threat_Reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/CrowdStrike/The_CrowdStrike_2021_Global_Threat_Report.pdf
13672021-02-24830252fd24ee5a302d2ac6d9dc1e6842e3efbed1LazyScripterhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.02.24.LazyScripter/LazyScripter.pdf
13682021-02-24aad302df572c61e3f31f09ceac912cc6b4cf2e9famnesty.org-Click and Bait Vietnamese Human Rights Defenders Targeted with Spyware Attackshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.02.24.Click_and_Bait/amnesty.org-Click%20and%20Bait%20Vietnamese%20Human%20Rights%20Defenders%20Targeted%20with%20Spyware%20Attacks.pdf
13692021-02-2542da0553f984992fca55238adb710a7a8c081816greatidea_A41_v1.0https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.02.25.A41APT/greatidea_A41_v1.0.pdf
13702021-02-256a688916cf8672f92df48613cd092add20cb383dproofpoint.com-TA413 Leverages New FriarFox Browser Extension to Target the Gmail Accounts of Global Tibetan Organizhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.02.25.TA413_FriarFox/proofpoint.com-TA413%20Leverages%20New%20FriarFox%20Browser%20Extension%20to%20Target%20the%20Gmail%20Accounts%20of%20Global%20Tibetan%20Organiz.pdf
13712021-02-25e505382d8c12eda7c13df2094de433d304c69a20kaspersky-ics-cert-lazarus-targets-defense-industry-with-threatneedle-en-20210225https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.02.25.Lazarus_ThreatNeedle/kaspersky-ics-cert-lazarus-targets-defense-industry-with-threatneedle-en-20210225.pdf
13722021-03-0271b7670f7c8e59dbaea64acb39a796862c6b05c1Operation Exchange Marauder_ Active Exploitation of Multiple Zero-Day Microsoft Exchange Vulnerabilities _ Volexityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.03.02.Operation_Exchange_Marauder/Operation%20Exchange%20Marauder_%20Active%20Exploitation%20of%20Multiple%20Zero-Day%20Microsoft%20Exchange%20Vulnerabilities%20_%20Volexity.pdf
13732021-03-02ecc7718e285eba15ee5c9d610dc10fed75227bf3HAFNIUM targeting Exchange Servers with 0-day exploits - Microsoft Securityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.03.02.HAFNIUM_APT/HAFNIUM%20targeting%20Exchange%20Servers%20with%200-day%20exploits%20-%20Microsoft%20Security.pdf
13742021-03-10412f70c02f7582ed56e48d5ab2fb62d5fc37c064Bitdefender-PR-Whitepaper-BADHATCH-creat5237-en-ENhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.03.10.FIN8_BADHATCH_Toolkit/Bitdefender-PR-Whitepaper-BADHATCH-creat5237-en-EN.pdf
13752021-03-10b2470335bf38bddcffac494b053edf80751d74d9Linux Backdoor RedXOR Likely Operated by Chinese Nation-Statehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.03.10.RedXOR/Linux%20Backdoor%20RedXOR%20Likely%20Operated%20by%20Chinese%20Nation-State.pdf
13762021-03-189807dbe836d414e2b78de88142d0e49c409fd310SilverFish_TLPWHITEhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.03.18.SilverFish_Group/SilverFish_TLPWHITE.pdf
13772021-03-231397cd7b11ebd6527ce6b71e5d37716717fdf4cdWebsites Hosting Cracks Spread Malware, Adwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.03.23.CopperStealer/Websites%20Hosting%20Cracks%20Spread%20Malware%2C%20Adware.pdf
13782021-03-306da3d044daff6bb24ef18b3e013b1f17c3548dbfBadBlood_ TA453 Targets US and Israeli Medical Research Personnel in Credential Phishing Campaigns _ Proofpoint UShttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.03.30.BadBlood_TA453/BadBlood_%20TA453%20Targets%20US%20and%20Israeli%20Medical%20Research%20Personnel%20in%20Credential%20Phishing%20Campaigns%20_%20Proofpoint%20US.pdf
13792021-03-307c8a47dad5440202660007a31618e4f85d0d86feAPT10_ sophisticated multi-layered loader Ecipekac discovered in A41APT campaign _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.03.30.APT10/APT10_%20sophisticated%20multi-layered%20loader%20Ecipekac%20discovered%20in%20A41APT%20campaign%20_%20Securelist.pdf
13802021-03-30d08c90184d768b25306806f66ca829a24c8a6c382021-Threat-Detection-Reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/2021-Threat-Detection-Report.pdf
13812021-04-066de388bbce11428b2491f5c5de501303b50770ceThreat Group Uses Voice Changing Software in Espionage Attempt - Cado Security _ Cloud Native Digital Forensicshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.04.06.APT-C-23_Voice_Changing/Threat%20Group%20Uses%20Voice%20Changing%20Software%20in%20Espionage%20Attempt%20-%20Cado%20Security%20_%20Cloud%20Native%20Digital%20Forensics.pdf
13822021-04-07865a943119a51537413db6f558af76559237a1eeCisco Talos Intelligence Group - Comprehensive Threat Intelligence_ Sowing Discord_ Reaping the benefits of collaboration app abusehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.04.07.Sowing_Discord/Cisco%20Talos%20Intelligence%20Group%20-%20Comprehensive%20Threat%20Intelligence_%20Sowing%20Discord_%20Reaping%20the%20benefits%20of%20collaboration%20app%20abuse.pdf
13832021-04-08358418d6665af6173055b08fad48e56540c50190Irans APT34 Returns with an Updated Arsenal - Check Point Researchhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.04.08.APT34_Returns/Iran%E2%80%99s%20APT34%20Returns%20with%20an%20Updated%20Arsenal%20-%20Check%20Point%20Research.pdf
13842021-04-08fa51e4fc31413cc11e93b0245b93dc0dd36b07ce(Are you) afreight of the dark_ Watch out for Vyveva, new Lazarus backdoor _ WeLiveSecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.04.08.Vyveva_Lazarus/%28Are%20you%29%20afreight%20of%20the%20dark_%20Watch%20out%20for%20Vyveva%2C%20new%20Lazarus%20backdoor%20_%20WeLiveSecurity.pdf
13852021-04-0901d5f589f56547de69752f135d32c6723a4b3055Iron Tiger APT Updates Toolkit With Evolved SysUpdate Malwarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.04.09.Iron_Tiger_SysUpdate/Iron%20Tiger%20APT%20Updates%20Toolkit%20With%20Evolved%20SysUpdate%20Malware.pdf
13862021-04-12f1e5b814ff4ee85f0be263cdc4a7048fad658933rpt-mtrends-2021https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/FireEye/rpt-mtrends-2021.pdf
13872021-04-12f1e5b814ff4ee85f0be263cdc4a7048fad658933mtrends-2021https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/FireEye/mtrends-2021.pdf
13882021-04-135cac1187b758faac5a0874c199b4ff928590b8edeSentire _ Hackers Flood the Web with 100,000 Malicious Pages,…https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.04.13.Hackers_Flood/eSentire%20_%20Hackers%20Flood%20the%20Web%20with%20100%2C000%20Malicious%20Pages%2C%E2%80%A6.pdf
13892021-04-1361cbc94ba10fa02aa103a45c681a5cf52c74b402Zero-day vulnerability in Desktop Window Manager (CVE-2021-28310) used in the wild _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.04.13.CVE-2021-28310_APT/Zero-day%20vulnerability%20in%20Desktop%20Window%20Manager%20%28CVE-2021-28310%29%20used%20in%20the%20wild%20_%20Securelist.pdf
13902021-04-139e6dbde54289974038d5b36e40163761b444361fASEC_REPORT_vol.102_ENGhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/AhnLab/ASEC_REPORT_vol.102_ENG.pdf
13912021-04-19ee00fbe1a7e991856e9ef3da7601dc010aacdeba2021.04.19.A_Deep_Dive_into_Zebrocys_Dropper_Docshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.04.19.A_Deep_Dive_into_Zebrocys_Dropper_Docs/2021.04.19.A_Deep_Dive_into_Zebrocys_Dropper_Docs.pdf
13922021-04-19f577c784cc04ad513072b1b02e4d3c9f9399c10a2021.04.19.Lazarus_APT_conceals_malicious_code_within_BMP_image_to_drop_its_RAThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.04.19.Lazarus_APT_conceals_malicious_code_within_BMP_image_to_drop_its_RAT/2021.04.19.Lazarus_APT_conceals_malicious_code_within_BMP_image_to_drop_its_RAT.pdf
13932021-04-202df18ace43029121d0bc039c517739e3a76e0d1bCheck Your Pulse_ Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day _ FireEye Inchttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.04.20.APT_Pulse_Secure_Zero-Day/Check%20Your%20Pulse_%20Suspected%20APT%20Actors%20Leverage%20Authentication%20Bypass%20Techniques%20and%20Pulse%20Secure%20Zero-Day%20_%20FireEye%20Inc.pdf
13942021-04-23c0a6c1d076397e18a94880fea00e416b94d2d263Bitdefender-PR-Whitepaper-NAIKON-creat5397-en-ENhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.04.23.NAIKON/Bitdefender-PR-Whitepaper-NAIKON-creat5397-en-EN.pdf
13952021-04-23c6737d903675ae6e4ae9531ee6dab7b1a0cd3126APT35 Charming Kitten' discovered in a pre-infected environment _ Blog _ Darktracehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.04.23.Charming_Kitten/APT35%20%E2%80%98Charming%20Kitten%27%20discovered%20in%20a%20pre-infected%20environment%20_%20Blog%20_%20Darktrace.pdf
13962021-04-27e89c63fb8f2b2e868b4e3159ae6a70671399e48eLazarus Group Recruitment_ Threat Hunters vs Head Huntershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.04.27.Lazarus_Group_Recruitment/Lazarus%20Group%20Recruitment_%20Threat%20Hunters%20vs%20Head%20Hunters.pdf
13972021-04-284847ac85009d57c2f3b32022f5da496afbe97663Water Pamola Attacked Online Shops Via Malicious Ordershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.04.28.Water_Pamola/Water%20Pamola%20Attacked%20Online%20Shops%20Via%20Malicious%20Orders.pdf
13982021-04-2884aa89ff766bcd002bf1a6641157aed3388547f5unc1151-ghostwriter-update-reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.04.28.Ghostwriter_UNC1151/unc1151-ghostwriter-update-report.pdf
13992021-04-28dbedc67e6cb865b41f475841e723d3742e41e9b4APT_trends_report_Q1_2021_Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/Kaspersky/APT_trends_report_Q1_2021_Securelist.pdf
14002021-05-01cbf2c8b08c7445c3b7dfbbb4d2d07b5ce1b6d709MuddyWater Binder Project Part 1https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.05.01.MuddyWater_Binder_1/MuddyWater%20Binder%20Project%20Part%201.pdf
14012021-05-01e68c113ca98d90157913ad4c7d6820d0935616d3CryptoCore-Lazarus-Clearskyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.05.01.CryptoCore-Lazarus/CryptoCore-Lazarus-Clearsky.pdf
14022021-05-064b06da80d998f2b02afb361cbecf02c1b9c62ce8Operation TunnelSnake _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.05.06.Operation_TunnelSnake/Operation%20TunnelSnake%20_%20Securelist.pdf
14032021-05-06ee72d1a177d77e14ae5ce7ce612abd4f0d121cbeCybersecurity_threatscape-2020-Q4_enghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/PTSecurity/Cybersecurity_threatscape-2020-Q4_eng.pdf
14042021-05-0754e368656f8c1ec2ea9279668731bc1563ac0c93Advisory Further TTPs associated with SVR cyber actorshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.05.07.SVR_TTPs/Advisory%20Further%20TTPs%20associated%20with%20SVR%20cyber%20actors.pdf
14052021-05-07c09e4404fe00745c657cdbdaf5b1b65d3cf11403MuddyWater Binder Project Part 2https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.05.07.MuddyWater_Binder_2/MuddyWater%20Binder%20Project%20Part%202.pdf
14062021-05-13ec6a5ea95cca0fdb10be0bfbd44c95b2e2ad12a4blog.talosintelligence.com-Transparent Tribe APT expands its Windows malware arsenalhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.05.13.Transparent_Tribe_APT/blog.talosintelligence.com-Transparent%20Tribe%20APT%20expands%20its%20Windows%20malware%20arsenal.pdf
14072021-05-258f99e28d978b22cfe04a25286d94b10b5b89a9fcevol-agriushttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.05.25.AGRIUSAuthor/evol-agrius.pdf
14082021-05-27714b97855b6bca61266ae5a43f01443c5ab49570New sophisticated email-based attack from NOBELIUM - Microsoft Securityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.05.27.NOBELIUM_New/New%20sophisticated%20email-based%20attack%20from%20NOBELIUM%20-%20Microsoft%20Security.pdf
14092021-05-28158c584a037e8a315ce4089356c213174c46baf4Breaking down NOBELIUMs latest early-stage toolset - Microsoft Securityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.05.28.NOBELIUM_toolset/Breaking%20down%20NOBELIUM%E2%80%99s%20latest%20early-stage%20toolset%20-%20Microsoft%20Security.pdf
14102021-06-013253a930ea63c726f582ec4b7476553e47bf28e2eset_threat_report_t12021https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/ESET/eset_threat_report_t12021.pdf
14112021-06-0306d0aec6c9a8aa4ef0a72f17d82006471f34d427SharpPanda_ Chinese APT Group Targets Southeast Asian Government With Previously Unknown Backdoor - Check Point Researchhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.06.03.SharpPanda_APT/SharpPanda_%20Chinese%20APT%20Group%20Targets%20Southeast%20Asian%20Government%20With%20Previously%20Unknown%20Backdoor%20-%20Check%20Point%20Research.pdf
14122021-06-08ac0591591ca8eabd198c118d307d5626e635c0dcPuzzleMaker attacks with Chrome zero-day exploit chain _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.06.08.PuzzleMaker_APT/PuzzleMaker%20attacks%20with%20Chrome%20zero-day%20exploit%20chain%20_%20Securelist.pdf
14132021-06-10fa1a699f09e9631b4bb88974ac2535b4972e59a9Big airline heist_ APT41 likely behind massive supply chain attackhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.06.10.Big_airline_heist/Big%20airline%20heist_%20APT41%20likely%20behind%20massive%20supply%20chain%20attack.pdf
14142021-06-163ef10b0ab15e09aa93d78ade0cdc1d316b4849c2Ferocious Kitten_ 6 years of covert surveillance in Iran _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.06.16.Ferocious_Kitten/Ferocious%20Kitten_%206%20years%20of%20covert%20surveillance%20in%20Iran%20_%20Securelist.pdf
14152021-06-24d063937814ba93ea91211bfad9050a8e791634beOperation Eagle Eye Securiferahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.06.24.Operation_Eagle_Eye/Operation%20Eagle%20Eye%20%E2%80%93%20Securifera.pdf
14162021-06-251c47b10138d1717b816ffba852e939cacda13cd2Cybersecurity_threats_2021-Q1-enghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/PTSecurity/Cybersecurity_threats_2021-Q1-eng.pdf
14172021-07-011e0588628d0a59185f79dcd422a3c0b9e0ec4a19IndigoZebra APT continues to attack Central Asia with evolving tools - Check Point Researchhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.07.01.IndigoZebra_APT/IndigoZebra%20APT%20continues%20to%20attack%20Central%20Asia%20with%20evolving%20tools%20-%20Check%20Point%20Research.pdf
14182021-07-05592860ae544200835fbe47e24e2f8120260064f6Tracking Cobalt Strike_ A Trend Micro Vision One Investigationhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.07.05.cobalt_strike_tracking/Tracking%20Cobalt%20Strike_%20A%20Trend%20Micro%20Vision%20One%20Investigation.pdf
14192021-07-0647b5872e770ab60fbb0567c160ebd2fd71de9d5aLazarus campaign TTPs and evolution _ AT&T Alien Labshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.07.06.Lazarus_TTPs_evolution/Lazarus%20campaign%20TTPs%20and%20evolution%20_%20AT%26T%20Alien%20Labs.pdf
14202021-07-09134f2e202dfedcb1bc0cf378237b52aebfdf6bceBIOPASS RAT New Malware Sniffs Victims via Live Streaminghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.07.09.BIOPASS_RAT/BIOPASS%20RAT%20New%20Malware%20Sniffs%20Victims%20via%20Live%20Streaming.pdf
14212021-07-12c8c216936ab67e42fe240e50ae1e0edb42c445c9#NoFilter_ Exposing the Tactics of Instagram Account Hackershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.07.12.NoFilter/%23NoFilter_%20Exposing%20the%20Tactics%20of%20Instagram%20Account%20Hackers.pdf
14222021-07-13d8f51b768c2767132210757a41aa0068c0edcaebASEC_REPORT_vol.103_ENGhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/AhnLab/ASEC_REPORT_vol.103_ENG.pdf
14232021-07-144929da9c7a9f48feec74f9e95942cc4bcae558e1How we protect users from 0-day attackshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.07.14.Candiru_0Day/How%20we%20protect%20users%20from%200-day%20attacks.pdf
14242021-07-190f3bf0752bfd0844fdd3d4b2a306b8532155d44eCSA_TTPs-of-Indicted-APT40-Actors-Associated-with-China-MSS-Hainan-State-Security-Departmenthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.07.19.APT40_TTP/CSA_TTPs-of-Indicted-APT40-Actors-Associated-with-China-MSS-Hainan-State-Security-Department.pdf
14252021-07-20d89fd3072ca54b3027546576a3d11ec24b6af17ewp-tracking-the-activities-of-teamTNThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.07.20.Tracking.TeamTNT/wp-tracking-the-activities-of-teamTNT.pdf
14262021-07-261d8afcb0a27dd36ac103ce50236577d9b066b01cFM 3-12 Cyberspace Operations and Electromagnetic Warfare 20https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/FM%203-12%20Cyberspace%20Operations%20and%20Electromagnetic%20Warfare%2020.pdf
14272021-07-27742607b5902b16a84a818c26fa5c7919d7642639THOR_ Previously Unseen PlugX Variant Deployed During Microsoft Exchange Server Attacks by PKPLUG Grouphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.07.27.THOR_PKPLUG_Group/THOR_%20Previously%20Unseen%20PlugX%20Variant%20Deployed%20During%20Microsoft%20Exchange%20Server%20Attacks%20by%20PKPLUG%20Group.pdf
14282021-07-286fa5641b366ea3cb82097902227cd9a6c2682607I Knew You Were Trouble_ TA456 Targets Defense Contractor with Alluring Social Media Persona _ Proofpoint UShttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.07.28.TA456/I%20Knew%20You%20Were%20Trouble_%20TA456%20Targets%20Defense%20Contractor%20with%20Alluring%20Social%20Media%20Persona%20_%20Proofpoint%20US.pdf
14292021-08-0273ab28174d255e1168f7f37a1059e7724c030081TG1021 - Praying Mantis Threat Actorhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.08.02.TG1021_Praying_Mantis/TG1021%20-%20Praying%20Mantis%20Threat%20Actor.pdf
14302021-08-0311ceeb439a68322cf4e558528e7c1c1c07650b26DeadRinger_ Exposing Chinese Threat Actors Targeting Major Telcoshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.08.03.DeadRinger/DeadRinger_%20Exposing%20Chinese%20Threat%20Actors%20Targeting%20Major%20Telcos.pdf
14312021-08-03836d38706da0649008cfec7363adb8afdd865e65APT31 new dropper. Target destinations_ Mongolia, Russia, the U.S., and elsewherehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.08.03.APT31_new_dropper/APT31%20new%20dropper.%20Target%20destinations_%20Mongolia%2C%20Russia%2C%20the%20U.S.%2C%20and%20elsewhere.pdf
14322021-08-03baeb67b65db49abaa6006edff1ab3c2027f6646aA step-by-step analysis of the new malware used by APT28_Sofacy called SkinnyBoy CYBER GEEKShttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.08.03.SKINNYBOY/A%20step-by-step%20analysis%20of%20the%20new%20malware%20used%20by%20APT28_Sofacy%20called%20SkinnyBoy%20%E2%80%93%20CYBER%20GEEKS.pdf
14332021-08-03f75539e7eea8d63a92a7c27b1bc5ba7f36cb73c7The Art of Cyberwarfarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.08.03.Chinese_APTs_attackRussia/The%20Art%20of%20Cyberwarfare.pdf
14342021-08-09a1c41f7fdb6f7c8fb6b716eadb1ed38acc825e56Cinobi Banking Trojan Targets Users of Cryptocurrency Exchanges with New Malvertising Campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.08.09.Cinobi_Banking_Trojan/Cinobi%20Banking%20Trojan%20Targets%20Users%20of%20Cryptocurrency%20Exchanges%20with%20New%20Malvertising%20Campaign.pdf
14352021-08-10543a366fa1fa63ff8f723bacbdd87cc8fb645c15UNC215_ Spotlight on a Chinese Espionage Campaign in Israel _ FireEye Inchttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.08.10.UNC215_Chinese_Israel/UNC215_%20Spotlight%20on%20a%20Chinese%20Espionage%20Campaign%20in%20Israel%20_%20FireEye%20Inc.pdf
14362021-08-12cd1679b297d1649491047771ba3a048192e577c7Uncovering Tetris a Full Surveillance Kit Running in your Browser imp0rtp3https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.08.12.Full-Surveillance-Kit-China/Uncovering%20Tetris%20%E2%80%93%20a%20Full%20Surveillance%20Kit%20Running%20in%20your%20Browser%20%E2%80%93%20imp0rtp3.pdf
14372021-08-14757ef48a54cef102a118185232edaf29063efa2dIndra — Hackers Behind Recent Attacks on Iran - Check Point Researchhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.08.14.Indra_Iran/Indra%20%E2%80%94%20Hackers%20Behind%20Recent%20Attacks%20on%20Iran%20-%20Check%20Point%20Research.pdf
14382021-08-170ac0607c1ca7b3c37963078ca00d7b42678b7bdbvolexity.com-North Korean APT InkySquid Infects Victims Using Browser Exploitshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.08.17.NK_APT_InkySquid/volexity.com-North%20Korean%20APT%20InkySquid%20Infects%20Victims%20Using%20Browser%20Exploits.pdf
14392021-08-178aa09365daf1885aba46f3f46d07582ae06754d9Confucius Uses Pegasus Spyware-related Lures to Target Pakistani Militaryhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.08.17.Confucius_Pegasus/Confucius%20Uses%20Pegasus%20Spyware-related%20Lures%20to%20Target%20Pakistani%20Military.pdf
14402021-08-17baedafd5738f76de4cf76381afc917cb0facd9622021.08.17_new_iranian_campaign_by_Siamesekittenhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.08.17_new_iranian_campaign_by_Siamesekitten/2021.08.17_new_iranian_campaign_by_Siamesekitten.pdf
14412021-08-19beca2ea7c71252aff71f45e5a6aedce2cadbc9f0Shadowpadhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.08.19.ShadowPad/Shadowpad.pdf
14422021-08-2482faf0f8be075ee1f3efaba5089fd9962328811fvolexity.com-North Korean BLUELIGHT Special InkySquid Deploys RokRAThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.08.24.NK_APT_InkySquid_RokRAT/volexity.com-North%20Korean%20BLUELIGHT%20Special%20InkySquid%20Deploys%20RokRAT.pdf
14432021-08-24f5ba5f8240569e08da4796deb95b89ee1340d03dwp-earth-baku-an-apt-group-targeting-indo-pacific-countrieshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.08.24.Earth_Baku_Returns/wp-earth-baku-an-apt-group-targeting-indo-pacific-countries.pdf
14442021-08-252f7a1368b3927bfbb7aea55aa173425cea798e5bBitdefender-PR-Whitepaper-FIN8-creat5619-en-ENhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.08.25.FIN8_Sardonic_Backdoor/Bitdefender-PR-Whitepaper-FIN8-creat5619-en-EN.pdf
14452021-09-021eb5501d5d7378576a757794de2b1731cedfca98North Korean Cyberattacks A Dangerous and Evolving Threat 2https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/North%20Korean%20Cyberattacks%20%20A%20Dangerous%20and%20Evolving%20Threat%202.pdf
14462021-09-0756752df9972f7695f87fffc0f0278cf16135a776Report2021ThreatHuntinghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/CrowdStrike/Report2021ThreatHunting.pdf
14472021-09-087d10596b5dd3375e6100b3370438a9fb9dc8e7a8Pro-PRC Influence Campaign Expands to Dozens of Social Media Platforms, Websites, and Forums in at Least Seven Languages, Attempted to Physically Mobilize Protesters in the U.S. _ FireEye Inchttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.09.08.Pro-PRC_Campaign/Pro-PRC%20Influence%20Campaign%20Expands%20to%20Dozens%20of%20Social%20Media%20Platforms%2C%20Websites%2C%20and%20Forums%20in%20at%20Least%20Seven%20Languages%2C%20Attempted%20to%20Physically%20Mobilize%20Protesters%20in%20the%20U.S.%20_%20FireEye%20Inc.pdf
14482021-09-11d512fa27b8b1196c05cc32f4a9752c5913579e90APT_trends_report_Q2_2021_Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/Kaspersky/APT_trends_report_Q2_2021_Securelist.pdf
14492021-09-132e715005ca1bc480ffaf2a75a4bfc1651c3fb015APT-C-36 Updates Its Long-term Spam Campaign Against South American Entities With Commodity RATshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.09.13.APT-C-36_South_American/APT-C-36%20Updates%20Its%20Long-term%20Spam%20Campaign%20Against%20South%20American%20Entities%20With%20Commodity%20RATs.pdf
14502021-09-14f6800cab68f7c1b95614a48cacd45ec079c32bd9Operation Harvest_ A Deep Dive into a Long-term Campaign _ McAfee Blogshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.09.14.Operation_Harvest/Operation%20%E2%80%98Harvest%E2%80%99_%20A%20Deep%20Dive%20into%20a%20Long-term%20Campaign%20_%20McAfee%20Blogs.pdf
14512021-09-20c129b2753a0240db809636501db41d413003b583FY21_Microsoft_Digital_Defense_Reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/Microsoft/FY21_Microsoft_Digital_Defense_Report.pdf
14522021-09-230acf53ba83aaabb027f6e37905690e36bf7ef6e4FamousSparrow_ A suspicious hotel guest _ WeLiveSecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.09.23.FamousSparrow/FamousSparrow_%20A%C2%A0suspicious%20hotel%20guest%20_%20WeLiveSecurity.pdf
14532021-09-231502a5da6914b420e3ffa6fe507419a692951970eset_threat_report_t22021https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/ESET/eset_threat_report_t22021.pdf
14542021-09-2736a2f04f55d02b967222faad2d629f6c1296007aFoggyWeb_ Targeted NOBELIUM malware leads to persistent backdoor _ Microsoft Security Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.09.27.FoggyWeb/FoggyWeb_%20Targeted%20NOBELIUM%20malware%20leads%20to%20persistent%20backdoor%20_%20Microsoft%20Security%20Blog.pdf
14552021-09-302d2c53b46c2c454a93aa1902a1940c973f8196deGhostEmperor_technical-details_PDF_enghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.09.30.GhostEmperor/GhostEmperor_technical-details_PDF_eng.pdf
14562021-10-04b29056a7d71a0119d0296a203efe53692c584726Malware Gh0stTimes Used by BlackTech - JPCERT_CC Eyes _ JPCERT Coordination Center official Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.10.04.Gh0stTimes_BlackTech/Malware%20Gh0stTimes%20Used%20by%20BlackTech%20-%20JPCERT_CC%20Eyes%20_%20JPCERT%20Coordination%20Center%20official%20Blog.pdf
14572021-10-05c838b993057ccdeb6cbfa25d879f891e995d1a2eUEFI threats moving to the ESP_ Introducing ESPecter bootkit _ WeLiveSecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.10.05.ESPecter_bootkit/UEFI%20threats%20moving%20to%20the%20ESP_%20Introducing%20ESPecter%20bootkit%20_%20WeLiveSecurity.pdf
14582021-10-06bab9bb00d8257cc19a6053d24e649884cebcec3aOperation GhostShell_ Novel RAT Targets Global Aerospace and Telecoms Firmshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.10.06.Operation_GhostShell/Operation%20GhostShell_%20Novel%20RAT%20Targets%20Global%20Aerospace%20and%20Telecoms%20Firms.pdf
14592021-10-1201a8aab8c3dae6852f09ec151cf7afb6d1cfcc77MysterySnail attacks with Windows zero-day _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.10.12.MysterySnail/MysterySnail%20attacks%20with%20Windows%20zero-day%20_%20Securelist.pdf
14602021-10-143e9e42157b00624ac9d5537837bc12139694be04Analyzing Email Services Abused for Business Email Compromisehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.10.14.BEC_groups/Analyzing%20Email%20Services%20Abused%20for%20Business%20Email%20Compromise.pdf
14612021-10-15cff106c8ed7c8f625ed5c4deca151a7a385b5997Global_APT_Research_Report_for_the_first_half_of_2021-360https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/360/Global_APT_Research_Report_for_the_first_half_of_2021-360.pdf
14622021-10-18a23d0adf9427966cbd9a55d0d7a34b1046d1cd1eHarvester_ Nation-state-backed group uses new toolset to target victims in South Asia _ Symantec Blogshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.10.18.Harvester_South_Asia/Harvester_%20Nation-state-backed%20group%20uses%20new%20toolset%20to%20target%20victims%20in%20South%20Asia%20_%20Symantec%20Blogs.pdf
14632021-10-192e682dca2ba1ed2bf2ac50d0d07f22c9b6bb0359Whatta TA_ TA505 Ramps Up Activity, Delivers New FlawedGrace Variant _ Proofpoint UShttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.10.19.TA505_New_FlawedGrace/Whatta%20TA_%20TA505%20Ramps%20Up%20Activity%2C%20Delivers%20New%20FlawedGrace%20Variant%20_%20Proofpoint%20US.pdf
14642021-10-1998fe112857885dc84909b66d652305b9ff09952dLightBasin_A-Roaming-Threat-to-Telecommunications-Companies_CrowdStrikehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.10.19.UNC1945_LightBasin/LightBasin_A-Roaming-Threat-to-Telecommunications-Companies_CrowdStrike.pdf
14652021-10-19dfa5c713e19a1e537fb24955675433f4c22b3b05PurpleFox Adds New Backdoor That Uses WebSocketshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.10.19.PurpleFox/PurpleFox%20Adds%20New%20Backdoor%20That%20Uses%20WebSockets.pdf
14662021-10-2580d5d6464f2feb2ff8096841057b5d2bc4214cc5AfricanCyberthreatAssessment_ENGLISHhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/AfricanCyberthreatAssessment_ENGLISH.pdf
14672021-10-264ef2ac990d902dd57573c84d2a9e32073419be36Malware WinDealer used by LuoYu Attack Group - JPCERT_CC Eyes _ JPCERT Coordination Center official Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.10.26.WinDealer_LuoYu_Group/Malware%20WinDealer%20used%20by%20LuoYu%20Attack%20Group%20-%20JPCERT_CC%20Eyes%20_%20JPCERT%20Coordination%20Center%20official%20Blog.pdf
14682021-10-26a57364b181e963fb578604b96c8e8c076fd18c79CERTFR-2021-CTI-009https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/CERTFR-2021-CTI-009.pdf
14692021-10-28177ddb0153c6749da6258bf5cc2f9770214452d3Solarmarker_v2https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/Solarmarker_v2.pdf
14702021-11-04ee64c5385df7e65c33cbb7de8f802e279ab0a8c9Technical report Armagedonhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.11.04.Gamaredon_Armageddon_Group/Technical%20report%20Armagedon.pdf
14712021-11-08d12903008af0fa50b26f425731eac32f8cd70bd2TA505 exploits SolarWinds Serv-U vulnerability (CVE-2021-35211) for initial access NCC Group Researchhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.11.08.TA505_SolarWinds/TA505%20exploits%20SolarWinds%20Serv-U%20vulnerability%20%28CVE-2021-35211%29%20for%20initial%20access%20%E2%80%93%20NCC%20Group%20Research.pdf
14722021-11-10ccc5f2d73b1912c88f9d513670b361b7da83d9adwp-void-balaur-tracking-a-cybermercenarys-activities (1)https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.11.10.Void_Balaur/wp-void-balaur-tracking-a-cybermercenarys-activities%20%281%29.pdf
14732021-11-11ac3bc9d76279d5e7f01938bc9f93086aa946ddf0Analyzing a watering hole campaign using macOS exploitshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.11.11.watering_hole_macOS_exploits/Analyzing%20a%20watering%20hole%20campaign%20using%20macOS%20exploits.pdf
14742021-11-15423f5a4c910cbb9c0c31136fa8ffbbf9dcafd0e2FINDING BEACONS IN THE DARK 1650728751599https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/FINDING%20BEACONS%20IN%20THE%20DARK%201650728751599.pdf
14752021-11-161f6daa02e5a9289aae807988f9f4dc3248fac1fbStrategic web compromises in the Middle East with a pinch of Candiru _ WeLiveSecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.11.16.Pinch_of_Candiru/Strategic%20web%20compromises%20in%20the%20Middle%20East%20with%20a%20pinch%20of%20Candiru%20_%20WeLiveSecurity.pdf
14762021-11-16b2e4b4c6640dcfb1be4198cff0caee607843c149UNC1151 Assessed with High Confidence to have Links to Belarus, Ghostwriter Campaign Aligned with Belarusian Government Interests _ Mandianthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.11.16.UNC1151/UNC1151%20Assessed%20with%20High%20Confidence%20to%20have%20Links%20to%20Belarus%2C%20Ghostwriter%20Campaign%20Aligned%20with%20Belarusian%20Government%20Interests%20_%20Mandiant.pdf
14772021-11-16f7ab89e669d11e63e8f62a6fdb63127078fe0f23UNC1151_Assessed-with-High-Confidence-to-have-Links-to-Belarus_Mandianthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.11.16.UNC1115_Ghostwriter_Campaign/UNC1151_Assessed-with-High-Confidence-to-have-Links-to-Belarus_Mandiant.pdf
14782021-11-189b0f4bbb3f0258b6bccef43be37e95125b747904TA406_triple-threat-N-Korea-aligned-TA406-steals-scams-spies_Proofpointhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.11.18.TA406_North_Korea_aligned/TA406_triple-threat-N-Korea-aligned-TA406-steals-scams-spies_Proofpoint.pdf
14792021-11-2970c9ebf707682ca2311e3cedf264f4e7c66d7a15Campaign Abusing Legitimate Remote Administrator Tools Uses Fake Cryptocurrency Websiteshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.11.29.Safib_Assistant/Campaign%20Abusing%20Legitimate%20Remote%20Administrator%20Tools%20Uses%20Fake%20Cryptocurrency%20Websites.pdf
14802021-12-0350ca1906cdc6559901f61b79f22ed57f47937e04conti-cyber-attack-on-the-hse-full-reporthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.12.03.Conti_Attack_HSE/conti-cyber-attack-on-the-hse-full-report.pdf
14812021-12-078d9d36d5a0f7e1b3367f0058888e59aae58ff855FIN13_ A Cybercriminal Threat Actor Focused on Mexico _ Mandianthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.12.07.FIN13/FIN13_%20A%20Cybercriminal%20Threat%20Actor%20Focused%20on%20Mexico%20_%20Mandiant.pdf
14822021-12-1191ae6d339296f9d85396d9aa2c1f279f2b05eb6beset_jumping_the_air_gap_wphttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.12.11.Jumping_the_air_gap/eset_jumping_the_air_gap_wp.pdf
14832021-12-168e156a0a92cb4ed04111ced57054bf79b491cea1New DarkHotel APT attack chain identified _ Zscalerhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.12.16.New_DarkHotel_APT/New%20DarkHotel%20APT%20attack%20chain%20identified%20_%20Zscaler.pdf
14842021-12-19011d85f9602c8af14d9cf5bb0721633c1702f8bcEN-BlackTech_2021https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2021/2021.12.19.BlackTech_APT/EN-BlackTech_2021.pdf
14852022-01-039a4bfa953645a026d375321eef37b893847d80adKonni_targeting_Russian_diplomatic_sectorhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.01.03.KONNI_Targets_Russian_Diplomatic/Konni_targeting_Russian_diplomatic_sector.pdf
14862022-01-05f40128c46ba46871e88e231615d3f220c133324fSygnia- Elephant Beetle_Jan2022https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.01.05.Elephant_Beetle/Sygnia-%20Elephant%20Beetle_Jan2022.pdf
14872022-01-07bc53a0db10794ce970ffd5d1c22e71f580e6eaedPatchwork_Patchwork-APT-caught-in-its-own-web_MalwarebytesLabshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.01.07.Patchwork_APT_India/Patchwork_Patchwork-APT-caught-in-its-own-web_MalwarebytesLabs.pdf
14882022-01-17870bca331eac48550c2b19d5e931cf673abe8d9btechnical-brief-delving-deep-an-analysis-of-earth-lusca-operationshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.01.17.Earth_Lucsa/technical-brief-delving-deep-an-analysis-of-earth-lusca-operations.pdf
14892022-01-205430c0dc9b0469443f1725e7e8a42febadb0b31bMoonBounce_ the dark side of UEFI firmware _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.01.20.MoonBounce/MoonBounce_%20the%20dark%20side%20of%20UEFI%20firmware%20_%20Securelist.pdf
14902022-01-2508fff1030cceb4ca9a10bf788cf477017a5bae9cPrime Ministers Office Compromised_ Details of Recent Espionage Campaignhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.01.25.Prime_Minister_Compromised/Prime%20Minister%E2%80%99s%20Office%20Compromised_%20Details%20of%20Recent%20Espionage%20Campaign.pdf
14912022-01-272bdc78b3bc56515322135f0dc78c058db89ef411North Korea's Lazarus APT leverages Windows Update client, GitHub in latest campaign _ Malwarebytes Labshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.01.27.Lazarus_APT/North%20Korea%27s%20Lazarus%20APT%20leverages%20Windows%20Update%20client%2C%20GitHub%20in%20latest%20campaign%20_%20Malwarebytes%20Labs.pdf
14922022-01-27aec95bd02681262700b32b383e13345b29859baeAPT29_StellarParticle-Campaing_CrowdStrikehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.01.27.APT29_StellarParticle/APT29_StellarParticle-Campaing_CrowdStrike.pdf
14932022-01-3170b68051e0086125427abed0851380433dc93108Shuckworm_APThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.01.31.Shuckworm_APT/Shuckworm_APT.pdf
14942022-01-31e58ce98ef061a0c2dd538e2fe1cc6dc9df402285Cisco Talos Intelligence Group - Comprehensive Threat Intelligence_ Iranian APT MuddyWater targets Turkish users via malicious PDFs, executableshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.01.31.MuddyWater_Turkish/Cisco%20Talos%20Intelligence%20Group%20-%20Comprehensive%20Threat%20Intelligence_%20Iranian%20APT%20MuddyWater%20targets%20Turkish%20users%20via%20malicious%20PDFs%2C%20executables.pdf
14952022-02-0134ba9f0c1b7b234a95ae5d96fc574e97551a9b85PowerLess Trojan_ Iranian APT Phosphorus Adds New PowerShell Backdoor for Espionagehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.02.01.Phosphorus_APT/PowerLess%20Trojan_%20Iranian%20APT%20Phosphorus%20Adds%20New%20PowerShell%20Backdoor%20for%20Espionage.pdf
14962022-02-035c32c243e75a98bcbff60ec9678f6c4eb28881ceAntlion_ Chinese APT Uses Custom Backdoor to Target Financial Institutions in Taiwan _ Symantec Blogshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.02.03.Antlion_APT/Antlion_%20Chinese%20APT%20Uses%20Custom%20Backdoor%20to%20Target%20Financial%20Institutions%20in%20Taiwan%20_%20Symantec%20Blogs.pdf
14972022-02-08f72eb3b283f282c8ab825f3924c0341fb50d0f73eset_threat_report_t32021https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/ESET/eset_threat_report_t32021.pdf
14982022-02-1470c4e5d03aad858ada2452ff6faff202aa1401e1Report2022GTRhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/CrowdStrike/Report2022GTR.pdf
14992022-02-15f0c6e1af701bfce2c62c66ae7e5845455f64ca81ShadowPad Malware Analysis _ Secureworkshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.02.15_ShadowPad/ShadowPad%20Malware%20Analysis%20_%20Secureworks.pdf
15002022-02-235c61980e67a35be135305a23a49801e89fa14780(Ex)Change of Pace_ UNC2596 Observed Leveraging Vulnerabilities to Deploy Cuba Ransomware _ Mandianthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.02.23.UNC2596/%28Ex%29Change%20of%20Pace_%20UNC2596%20Observed%20Leveraging%20Vulnerabilities%20to%20Deploy%20Cuba%20Ransomware%20_%20Mandiant.pdf
15012022-02-23b6a45bf5c338924a200e7c67eef4c3601dce0c9eThe_Bvp47_a_top-tier_backdoor_of_us_nsa_equation_group.enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.02.23.Bvp47/The_Bvp47_a_top-tier_backdoor_of_us_nsa_equation_group.en.pdf
15022022-03-01248c00716584d84cbf66e6d19a4b27f28ee27c79Asylum Ambuscade_ State Actor Uses Compromised Private Ukrainian Military Emails to Target European Governments and Refugee Movement _ Proofpoint UShttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.03.01.Asylum_Ambuscade/Asylum%20Ambuscade_%20State%20Actor%20Uses%20Compromised%20Private%20Ukrainian%20Military%20Emails%20to%20Target%20European%20Governments%20and%20Refugee%20Movement%20_%20Proofpoint%20US.pdf
15032022-03-07cba4918a039ac19c5340c399f8828ee819275303The Good, the Bad, and the Web Bug_ TA416 Increases Operational Tempo Against European Governments as Conflict in Ukraine Escalates _ Proofpoint UShttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.03.07.TA416/The%20Good%2C%20the%20Bad%2C%20and%20the%20Web%20Bug_%20TA416%20Increases%20Operational%20Tempo%20Against%20European%20Governments%20as%20Conflict%20in%20Ukraine%20Escalates%20_%20Proofpoint%20US.pdf
15042022-03-083774add8772159cc87d60efe57e72ba435e7051bNew RURansom Wiper Targets Russiahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.03.08.RURansom_Wiper/New%20RURansom%20Wiper%20Targets%20Russia.pdf
15052022-03-1709c4f8ef3fced7f59e58ed7b506dcd2fb2a94fdcCyclops Blink Sets Sights on Asus Routershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.03.17.Cyclops_Blink_Voodoo_Bear/Cyclops%20Blink%20Sets%20Sights%20on%20Asus%20Routers.pdf
15062022-03-17e908e25d6553b35b8e87f04fe92f53d2dd6df732Appendix_Cyclops Blink Sets Sights on ASUS Routershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.03.17.Cyclops_Blink_Voodoo_Bear/Appendix_Cyclops%20Blink%20Sets%20Sights%20on%20ASUS%20Routers.pdf
15072022-03-23551dbf96ed7bedc5778b2bd0f0e873c14a7e842bMustang Pandas Hodur_ Old tricks, new Korplug variant _ WeLiveSecurityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.03.23.Mustang_Panda/Mustang%20Panda%E2%80%99s%20Hodur_%20Old%20tricks%2C%20new%20Korplug%20variant%20_%20WeLiveSecurity.pdf
15082022-03-23c848df52070b8baac8ccb65d4a223c2370e75469telecom_research_enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.03.23.Kazakhstan_APT/telecom_research_en.pdf
15092022-03-30ea6ce067a3a25f585984e9931b76131e254fc714New Milestones for Deep Panda_ Log4Shell and Digitally Signed Fire Chili Rootkitshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.03.30.Deep_Panda_New_Milestones/New%20Milestones%20for%20Deep%20Panda_%20Log4Shell%20and%20Digitally%20Signed%20Fire%20Chili%20Rootkits.pdf
15102022-05-0267f46c74653725c4e385c800f438eb8fd8805d05UNC3524_ Eye Spy on Your Email _ Mandianthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.05.02.UNC3524/UNC3524_%20Eye%20Spy%20on%20Your%20Email%20_%20Mandiant.pdf
15112022-05-0477b0b2d59915c9eb27318d061597a0706796cb02APT_trends_report_Q2_2022_Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/Kaspersky/APT_trends_report_Q2_2022_Securelist.pdf
15122022-05-059f57b345740588ac3769383ddc70ab3fe8abea8cCisco Talos Intelligence Group - Comprehensive Threat Intelligence_ Mustang Panda deploys a new wave of malware targeting Europehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.05.05.Mustang_Panda_Europe/Cisco%20Talos%20Intelligence%20Group%20-%20Comprehensive%20Threat%20Intelligence_%20Mustang%20Panda%20deploys%20a%20new%20wave%20of%20malware%20targeting%20Europe.pdf
15132022-05-115f8c3de2c2e101c15d9c8fd9c86ca4cfcaeba07bCisco Talos Intelligence Group - Comprehensive Threat Intelligence_ Bitter APT adds Bangladesh to their targetshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.05.11.Bitter_APT_Bangladesh/Cisco%20Talos%20Intelligence%20Group%20-%20Comprehensive%20Threat%20Intelligence_%20Bitter%20APT%20adds%20Bangladesh%20to%20their%20targets.pdf
15142022-05-12f36b4d4ba9a966e066d94ad15a9cc11e1c22ef1aThreat Thursday_ Malware Rebooted - How Industroyer2 Takes Aim at Ukraine Infrastructurehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.05.12.Industroyer2_Ukraine/Threat%20Thursday_%20Malware%20Rebooted%20-%20How%20Industroyer2%20Takes%20Aim%20at%20Ukraine%20Infrastructure.pdf
15152022-05-19a1b1ab94940c4ef9fc2694b8f65bed6de440e4f7Twisted Panda_ Chinese APT espionage operation against Russians state-owned defense institutes - Check Point Researchhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.05.19.Twisted_Panda/Twisted%20Panda_%20Chinese%20APT%20espionage%20operation%20against%20Russian%E2%80%99s%20state-owned%20defense%20institutes%20-%20Check%20Point%20Research.pdf
15162022-05-26cae0df518ba65cdec37a220a4e608c6e68eebe9ceset_threat_report_t12022https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/ESET/eset_threat_report_t12022.pdf
15172022-06-02d05cfc990ee1f6ffe97aa7b07ea130da7a161476WinDealer dealing on the side _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.06.02.WinDealer/WinDealer%20dealing%20on%20the%20side%20_%20Securelist.pdf
15182022-06-21d2665a6a8b82c1d4842965e79b469abe56101a2bToddyCat_ Unveiling an unknown APT actor attacking high-profile entities in Europe and Asia _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.06.21.ToddyCat_APT/ToddyCat_%20Unveiling%20an%20unknown%20APT%20actor%20attacking%20high-profile%20entities%20in%20Europe%20and%20Asia%20_%20Securelist.pdf
15192022-06-27d947eca0780ae2be64623d792989115f95b9929bAttacks on industrial control systems using ShadowPad _ Kaspersky ICS CERThttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.06.27.ShadowPad_ICS/Attacks%20on%20industrial%20control%20systems%20using%20ShadowPad%20_%20Kaspersky%20ICS%20CERT.pdf
15202022-06-27fb8c120e618cddb8c89a2a5469d7b9983a45b703Overview of Russian GRU and SVR Cyberespionage Campaigns 1H 2022https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/Overview%20of%20Russian%20GRU%20and%20SVR%20Cyberespionage%20Campaigns%201H%202022.pdf
15212022-07-25e2ace107f8d2140b86150d76edd08cd1e14cfe56CosmicStrand_ the discovery of a sophisticated UEFI firmware rootkit _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.07.25.CosmicStrand/CosmicStrand_%20the%20discovery%20of%20a%20sophisticated%20UEFI%20firmware%20rootkit%20_%20Securelist.pdf
15222022-07-2690c27a9a4c8b09ba026c6a112738dd7eb5fe3477Old cat, new tricks, bad habitshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.07.26.Charming_Kitten_APT/Old%20cat%2C%20new%20tricks%2C%20bad%20habits.pdf
15232022-08-12d44d93c12fce2403517bf53705dfd78dbb61ae51LuckyMouse uses a backdoored Electron app to target MacOS - SEKOIA.IO Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.08.12.LuckyMouse/LuckyMouse%20uses%20a%20backdoored%20Electron%20app%20to%20target%20MacOS%20-%20SEKOIA.IO%20Blog.pdf
15242022-08-12e93fbf3bc680023e383c1179424f054b94a7e86fIron Tiger Compromises Chat Application Mimi, Targets Windows, Mac, and Linux Usershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.08.12.Iron_Tiger_Mimi/Iron%20Tiger%20Compromises%20Chat%20Application%20Mimi%2C%20Targets%20Windows%2C%20Mac%2C%20and%20Linux%20Users.pdf
15252022-09-080903ff6d3b598d56dc8806ebcbd48aa27a1f5df4BRONZE PRESIDENT Targets Government Officials _ Secureworkshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.09.08.BRONZE_PRESIDENT/BRONZE%20PRESIDENT%20Targets%20Government%20Officials%20_%20Secureworks.pdf
15262022-09-2859781a33093ab92e108580f0006aadd07ba58d21VB2022-Exploit-archaeology-a-forensic-history-of-in-the-wild-NSO-Group-exploitshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.09.28.EXPLOIT_ARCHAEOLOGY/VB2022-Exploit-archaeology-a-forensic-history-of-in-the-wild-NSO-Group-exploits.pdf
15272022-10-049374ad6e92811e2ace3e0a9b78e3ebcd5b2c4295wp-the-rise-of-earth-aughiskyhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.10.04.Rise_Earth_Aughisky/wp-the-rise-of-earth-aughisky.pdf
15282022-10-04a986298519a3a053e642717bb5888ef8d18abe04IOCs-the-rise-of-earth-aughisky-tracking-the-campaigns-taidoor-startedhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.10.04.Rise_Earth_Aughisky/IOCs-the-rise-of-earth-aughisky-tracking-the-campaigns-taidoor-started.pdf
15292022-10-06314c39ce253f68d062df9f0d9d641527da672101Mustang Panda Abuses Legitimate Apps to Target Myanmar Based Victimshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.10.06.Mustang_Panda_Myanmar/Mustang%20Panda%20Abuses%20Legitimate%20Apps%20to%20Target%20Myanmar%20Based%20Victims.pdf
15302022-11-02d6178c8c86d3dac48ddf678e2abf3d3235d91badRomCom Threat Actor Abuses KeePass and SolarWinds to Target Ukraine and Potentially the United Kingdomhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.11.02.RomCom_Ukraine_UK/RomCom%20Threat%20Actor%20Abuses%20KeePass%20and%20SolarWinds%20to%20Target%20Ukraine%20and%20Potentially%20the%20United%20Kingdom.pdf
15312022-11-034890934ae6fa2e26959574d125ffeb519784672dIndian Governmental Organizations Targeted by APT-36https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.11.03.APT-36/Indian%20Governmental%20Organizations%20Targeted%20by%20APT-36.pdf
15322022-12-027f9b8506b73078f6b437f402197deadcb15e46e3Blowing Cobalt Strike Out of the Water With Memory Analysishttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.12.02.Cobalt_Strike_Out_of_the_Water/Blowing%20Cobalt%20Strike%20Out%20of%20the%20Water%20With%20Memory%20Analysis.pdf
15332022-12-059c2e050959ee0d8e7e979b09b0d9674e2277cd15Message from Recorded Futurehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.12.05.TAG-53_Russia/Message%20from%20Recorded%20Future.pdf
15342022-12-0620abcd71b5293e4c97768dd337b4260a88efcc7cMustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targetshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.12.06.Mustang_Panda/Mustang%20Panda%20Uses%20the%20Russian-Ukrainian%20War%20to%20Attack%20Europe%20and%20Asia%20Pacific%20Targets.pdf
15352022-12-074d042f2898173264f3791050861eb0b4313213feInternet Explorer 0-day exploited by North Korean actor APT37https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2022/2022.12.07.APT37_0Day/Internet%20Explorer%200-day%20exploited%20by%20North%20Korean%20actor%20APT37.pdf
15362023-01-093efdf94296306b558b39d4b2bfab93cb944a0013INTRINSEC - Emotet returns and deploys loadershttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.01.09.Emotet_return/INTRINSEC%20-%20Emotet%20returns%20and%20deploys%20loaders.pdf
15372023-01-114d3fa4294df4b901a26c2f9bdbcae7c3be9f244aDark Pink APT unleashes malware for deeper and more sinister intrusions in the Asia-Pacific and Europe _ Group-IB Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.01.11.Dark_Pink_APT/Dark%20Pink%20APT%20unleashes%20malware%20for%20deeper%20and%20more%20sinister%20intrusions%20in%20the%20Asia-Pacific%20and%20Europe%20_%20Group-IB%20Blog.pdf
15382023-01-26adc02a61be87eeccc1ea3e3c6a5db73e3946f258Welcome to Goot Camp_ Tracking the Evolution of GOOTLOADER Operations _ Mandianthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.01.26.GOOTLOADER_Operations/Welcome%20to%20Goot%20Camp_%20Tracking%20the%20Evolution%20of%20GOOTLOADER%20Operations%20_%20Mandiant.pdf
15392023-05-2458fc13f649bea13d627496f46994ec6cd4248b75Volt Typhoon targets US critical infrastructure with living-off-the-land techniques _ Microsoft Security Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.05.24.Volt_Typhoon/Volt%20Typhoon%20targets%20US%20critical%20infrastructure%20with%20living-off-the-land%20techniques%20_%20Microsoft%20Security%20Blog.pdf
15402023-09-19c501ec19fa16b701ca5d314e13e09e5caec4d55fNew ShroudedSnooper actor targets telecommunications firms in the Middle East with novel Implantshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.09.19.ShroudedSnooper_Middle_East/New%20ShroudedSnooper%20actor%20targets%20telecommunications%20firms%20in%20the%20Middle%20East%20with%20novel%20Implants.pdf
15412023-10-13dcee2773b27c942311cd132eaa8b0c7151ff1042Void Rabisu Targets Female Political Leaders with New Slimmed-Down ROMCOM Varianthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.10.13.Void_Rabisu/Void%20Rabisu%20Targets%20Female%20Political%20Leaders%20with%20New%20Slimmed-Down%20ROMCOM%20Variant.pdf
15422023-10-2648ce1e53bd1cc8713e65dca21f28bc454ad13826StripedFly_ Perennially flying under the radar _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.10.26.StripedFly/StripedFly_%20Perennially%20flying%20under%20the%20radar%20_%20Securelist.pdf
15432023-10-31279686f1f47cd4e182910601931d8cb66b41ae84From Albania to the Middle East_ The Scarred Manticore is Listening - Check Point Researchhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.10.31.Scarred_Manticore/From%20Albania%20to%20the%20Middle%20East_%20The%20Scarred%20Manticore%20is%20Listening%20-%20Check%20Point%20Research.pdf
15442023-11-037873f4b161d89a40f97a4b4104f212f4d556459aeset-apt-activity-report-q2-2023-q3-2023https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/ESET/eset-apt-activity-report-q2-2023-q3-2023.pdf
15452023-11-060b57681534b8f5cb21ca7bc51e5658350c44c2bbAgonizing Serpens (Aka Agrius) Targeting the Israeli Higher Education and Tech Sectorshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.11.06.Agrius_Israeli/Agonizing%20Serpens%20%28Aka%20Agrius%29%20Targeting%20the%20Israeli%20Higher%20Education%20and%20Tech%20Sectors.pdf
15462023-11-07e7439a8f14c663f73b68bd0cfd2fba45b02b3111Chinese APT Targeting Cambodian Governmenthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.11.07.Chinese_APT_Cambodian/Chinese%20APT%20Targeting%20Cambodian%20Government.pdf
15472023-11-09ab3211cc642317a62c5330b640f24f08c3efb090Modern-Asian-APT-groups-TTPs_report_enghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.11.09.Modern_Asian_APT_TTPs/Modern-Asian-APT-groups-TTPs_report_eng.pdf
15482023-11-09f68c243dde7778085472543de3e7b5eac5141e6aModern Asia APT groups TTPs _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.11.09.Modern_Asian_APT_TTPs/Modern%20Asia%20APT%20groups%20TTPs%20_%20Securelist.pdf
15492023-11-1429c8ce1f0edb05ef632bc1b9d4f39f1d6d382a54APT29 attacks Embassies using CVE-2023-38831 - report enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.11.14.APT29_CVE-2023-38831/APT29%20attacks%20Embassies%20using%20CVE-2023-38831%20-%20report%20en.pdf
15502023-11-23fa03024e3a1093b0ed371ab0694131ede49c5f32Israel-Hamas War Spotlight_ Shaking the Rust Off SysJoker - Check Point Researchhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.11.23.israel-hamas-sysjoker/Israel-Hamas%20War%20Spotlight_%20Shaking%20the%20Rust%20Off%20SysJoker%20-%20Check%20Point%20Research.pdf
15512023-11-27359be6f14e3151f7efa230ed79d29fc01bdda962WildCard_ The APT Behind SysJoker Targets Critical Sectors in Israelhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.11.27.WildCard_SysJoker_Israel/WildCard_%20The%20APT%20Behind%20SysJoker%20Targets%20Critical%20Sectors%20in%20Israel.pdf
15522023-11-30746840e505e79254363b985feb4398670af1a6ddNew SugarGh0st RAT targets Uzbekistan government and South Koreahttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.11.30.New_SugarGh0st_RAT/New%20SugarGh0st%20RAT%20targets%20Uzbekistan%20government%20and%20South%20Korea.pdf
15532023-12-19105d2dad10219b0e6106a0fb55c6a00e7faf401dSeedworm_ Iranian Hackers Target Telecoms Orgs in North and East Africa _ Symantec Enterprise Blogshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.12.19.Seedworm/Seedworm_%20Iranian%20Hackers%20Target%20Telecoms%20Orgs%20in%20North%20and%20East%20Africa%20_%20Symantec%20Enterprise%20Blogs.pdf
15542023-12-2195f848ff414c5e2288448815427b9f0019449ab9Intellexa and Cytrox_ From fixer-upper to Intel Agency-grade spywarehttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.12.21.Intellexa_Cytrox/Intellexa%20and%20Cytrox_%20From%20fixer-upper%20to%20Intel%20Agency-grade%20spyware.pdf
15552023-12-27f9ebf0bee52c3bcf2193f1ab477359918b00da03Operation Triangulation_ The last (hardware) mystery _ Securelisthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.12.27.Operation_Triangulation/Operation%20Triangulation_%20The%20last%20%28hardware%29%20mystery%20_%20Securelist.pdf
15562024-01-10e71c1c4cd3ade02e4291bb9547aa9efbd4ce1a92Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN _ Volexityhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2024/2024.01.10.Active_Exploitation_UTA0178/Active%20Exploitation%20of%20Two%20Zero-Day%20Vulnerabilities%20in%20Ivanti%20Connect%20Secure%20VPN%20_%20Volexity.pdf
15572024-01-2456d84bd5ecc8f133912aee057748de586059729eThe Endless Struggle Against APT10_ Insights from LODEINFO v0.6.6 - v0.7.3 Analysis - Researcher Blog - ITOCHU Cyber & Intelligence Inc_https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2024/2024.01.24.APT10_LODEINFO/The%20Endless%20Struggle%20Against%20APT10_%20Insights%20from%20LODEINFO%20v0.6.6%20-%20v0.7.3%20Analysis%20-%20Researcher%20Blog%20-%20ITOCHU%20Cyber%20%26%20Intelligence%20Inc_.pdf
15582024-01-2520a6ee8d1830d059c2f8fa994e8be25860dac337JSAC2024_1_6_dongwook-kim_seulgi-lee_enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2024/2024.01.25.Lazarus_Group/JSAC2024_1_6_dongwook-kim_seulgi-lee_en.pdf
15592024-02-13edb8c33bf3b3cf5cf4ae6236d90fc3b6ea5210c1CVE-2024-21412_ Water Hydra Targets Traders with Microsoft Defender SmartScreen Zero-Dayhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2024/2024.02.13.Water_Hydra/CVE-2024-21412_%20Water%20Hydra%20Targets%20Traders%20with%20Microsoft%20Defender%20SmartScreen%20Zero-Day.pdf
15602024-02-14cceea736c1701121075cdfe16c219533a338954cStaying ahead of threat actors in the age of AI _ Microsoft Security Bloghttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2024/2024.02.14_APT_AI/Staying%20ahead%20of%20threat%20actors%20in%20the%20age%20of%20AI%20_%20Microsoft%20Security%20Blog.pdf
15612024-02-153664b70f458df908c57d6e907c84bb75509c67fawatchtower-2023-eoy-report-enhttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/Report/SentinelOne/watchtower-2023-eoy-report-en.pdf
15622024-02-23109638002e0eabb128fc553f32cd7300ddf32148ConnectWise ScreenConnect attacks deliver malware Sophos Newshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2024/2024.02.23.ConnectWise_Malware/ConnectWise%20ScreenConnect%20attacks%20deliver%20malware%20%E2%80%93%20Sophos%20News.pdf
15632024-02-27a31f70243b706d5a56bf988ae2fbdb703ddaddc9When Cats Fly_ Suspected Iranian Threat Actor UNC1549 Targets Israeli and Middle East Aerospace and Defense Sectors _ Mandianthttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2024/2024.02.27.UNC1549/When%20Cats%20Fly_%20Suspected%20Iranian%20Threat%20Actor%20UNC1549%20Targets%20Israeli%20and%20Middle%20East%20Aerospace%20and%20Defense%20Sectors%20_%20Mandiant.pdf
15642024-03-0770d471e53434b7806e3986a2ee97f6d6790b4673Evasive Panda leverages Monlam Festival to target Tibetanshttps://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2024/2024.03.07_Evasive_Panda/Evasive%20Panda%20leverages%20Monlam%20Festival%20to%20target%20Tibetans.pdf