Skip to content

Commit

Permalink
Merge pull request #1 from soloShak/Fixed_filenames_branch
Browse files Browse the repository at this point in the history
Update APTnotes.csv
  • Loading branch information
ShakYld authored May 8, 2024
2 parents 377510b + 3065e32 commit 01531c8
Showing 1 changed file with 6 additions and 6 deletions.
12 changes: 6 additions & 6 deletions APTnotes.csv
Original file line number Diff line number Diff line change
Expand Up @@ -297,12 +297,12 @@ CitizenLab_Mapping-FinFishers-Continuing-Proliferation(Oct-15-15),Pay No Attenti
Checkpoint_rocket-kitten-report(Nov-9-2015),Rocket Kitten: A Campaign With 9 Lives,Checkpoint,https://app.box.com/s/vhe51fr5m6kqqzbkkcuukta6nucn9p6a,523ae1be152df2a4d1de51ee2b3e7f23cad62628,11/09/2015,2015
Microsoft_Security_Intelligence_Report_Volume_19_English(11-16-2015),Microsoft Security Intelligence Report (Volume 19),Microsoft,https://app.box.com/s/qjvx7sdbo7cufb5b8putfyqn8ku82xq2,666a7931d4fc2466852e0676e318391a23aec1d1,11/16/2015,2015
RSA_Peering-Into-GlassRAT-final(Nov-23-15),PEERING INTO GLASSRAT: A Zero Detection Trojan from China,RSA,https://app.box.com/s/3jg797vagekvf1xjyz1j49esdhm4fmjs,1d72a50b38ee4b5f57684726cef957f61ae6d2f2,11/23/2015,2015
Symantec_Iran-based-attackers-use-back-door-threats-to-spy-on-Middle-Eastern-targets(Dec-7-2015),Iran-based attackers use back door threats to spy on Middle Eastern targets,Symantec,https://app.box.com/s/oeix6b4jcwdkwyrzq35brtmq2ktoyxnw,7819b3820b7af3f3d3f0335989a95ae6314b353b,12/07/2015,2015
Symantec_Iran-based-attackers-use-back-door-threats-to-spy-on-Middle-Eastern-targets(Dec-7-2015) ,Iran-based attackers use back door threats to spy on Middle Eastern targets,Symantec,https://app.box.com/s/oeix6b4jcwdkwyrzq35brtmq2ktoyxnw,7819b3820b7af3f3d3f0335989a95ae6314b353b,12/07/2015,2015
Symantec_CadelSpy-Remexi-IOC(12-07-2015),Backdoor.Cadelspy and Backdoor.Remexi indicators of compromise,Symantec,https://app.box.com/s/k351gsuaj647jtmwmukmtem31oszg1tv,a3d9e8a14cf1729af25bf64193ac17bf9da56a20,12/07/2015,2015
Kaspersky_Evolution-of-Cyber-Threats-in-the-Corporate-Sector(Dec-10-2015),Evolution of Cyber Threats in the Corporate Sector,Kaspersky,https://app.box.com/s/ql84nxbrheluzhi3bt7k48damnuz00u5,75c2325f529d34155445af6a82bb22ec4277a80f,12/10/2015,2015
Fidelis_FTA_1020_Fidelis_Inocnation_FINAL(Dec-16-15),Dissecting the Malware Involved in the INOCNATION Campaign,Fidelis,https://app.box.com/s/dl6izicyky1x946ueo77nn2w8c5jxgm3,e10651d3a6223055e95464f0023b549cdf7ca00c,12/16/2015,2015
PaloAlto_BBSRAT-Attacks-Targeting-Russian-Organizations-Linked-to-Roaming-Tiger(Dec-22-15),BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger,Palo Alto,https://app.box.com/s/noqd4tec6z6nfv8w4z48vzvwfo3goegl,e9de634545c873b0999728df361b28fae9536dc2,12/22/2015,2015
PWC_ELISE- Security-Through-Obesity(Dec-23-15),ELISE: Security Through Obesity,PWC,https://app.box.com/s/xjjieg8w489osjfp4jk7vgum37a6ibro,7baa3b39f072e82717aa554f3434863f7e9edd1f,12/23/2015,2015
PWC_ELISE-Security-Through-Obesity(Dec-23-15),ELISE: Security Through Obesity,PWC,https://app.box.com/s/xjjieg8w489osjfp4jk7vgum37a6ibro,7baa3b39f072e82717aa554f3434863f7e9edd1f,12/23/2015,2015
ESET_BlackEnergy-by-the-SSHBearDoor(Jan-3-16),BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry,ESET,https://app.box.com/s/uo31npu9sese34f1ppggmrug48x7rlqp,8bcb1743d4a9ddbbc6daf063dca8c8107baed218,01/03/2016,2016
Clearsky_Operation-DustySky_TLP_WHITE(Jan-7-2016),Operation Dusty Sky,Clearsky,https://app.box.com/s/cydpeasz6l8cv9oo99o4tpazd5tq4xkm,9b7bf2d6c4a10dac7483c618562e701f42c1dc32,01/07/2016,2016
Clearsky_Operation-DustySky-indicators(Jan-7-2016),Operation Dusty Sky (indicators),Clearsky,https://app.box.com/s/5iym3huegu3ssaejl0rr268sr7qy6seb,1acdc7b846d53b582075ea4a3c5ba64bbbf10e81,01/07/2016,2016
Expand Down Expand Up @@ -371,7 +371,7 @@ PaloAlto_PrinceofPersiaGameOver(06-28-2016),Prince of Persia Game Over,Palo Alto
JPCERT_AsruexShortcutFiles(06-30-2016),Asruex: Malware Infecting through Shortcut Files,JPCERT,https://app.box.com/s/mxvgs6dx4kixjv5s29yc6m81kii8opbw,0ddd9b23aaa773615e7d6392969d40b332e0c85f,06/30/2016,2016
Bitdefender_Pacifier-APT(7-1-2016),Pacifier APT,Bitdefender,https://app.box.com/s/xcu346jhiokohlj9300q6hif06swac57,6289dff2cbd2750c76517007989483922179fa40,07/01/2016,2016
ESET_targeting-Central-and-EasternEurope(07-01-2016),Espionage toolkit targeting Central and Eastern Europe uncovered,ESET,https://app.box.com/s/kmb22xnoniwxfkhsw8r3tkpo5rko0w1a,8d9af4bb8b4bafcb9e58ab21e1419abd2eed46b2,07/01/2016,2016
Cymmetria_Unveiling-Patchwork(07-07-16),Unveiling Patchwork the Copy Paste APT,Cymmetria,https://app.box.com/s/r9pw9xbcy2fz2ssewg5p7lqyvtn1b6jc,955ddb4453827e2c1664f2924e75b21fb0c0496d,07/07/2016,2016
Cymmetria_Unveiling-Patchwork(Jul-7-16),Unveiling Patchwork the Copy Paste APT,Cymmetria,https://app.box.com/s/r9pw9xbcy2fz2ssewg5p7lqyvtn1b6jc,955ddb4453827e2c1664f2924e75b21fb0c0496d,07/07/2016,2016
Proofpoint_NetTraveler-TargetsRussianEuropean(07-07-2016),"NetTraveler APT Targets Russian, European Interests",ProofPoint,https://app.box.com/s/u16hs4trjkamdxkb8xth6e5ugckr3230,d647ecd9a694447bc8ee9096f425ba29d93f7fb7,07/07/2016,2016
Kaspersky_DroppingElephant(07-08-2016),The Dropping Elephant - aggressive cyber-espionage in the Asian region,Kaspersky,https://app.box.com/s/9yczw853br9y9bs98j44uwc3kx6e414y,e0606a9e6a785d942b50d281d87550dc03d3666e,07/08/2016,2016
Symantec_Patchwork-expands-to-industries(07-25-2016),Patchwork cyberespionage group expands targets from governments to wide range of industries,Symantec,https://app.box.com/s/8k4ikxiyz3od5bg6juqpjf99dcfdba4l,0184ab60e9f8f38cd59f0a53278192a286255179,07/25/2016,2016
Expand All @@ -396,7 +396,7 @@ VectraNetworks_Moonlight-Targeted-attacks-MiddleEast(10-26-2016),Moonlight - Tar
Forcepoint_BITTER-Targeted-attack-Pakistan(10-26-2016),BITTER: A Targeted attack against Pakistan,Forcepoint,https://app.box.com/s/iegu4jz7v3q0vcvgrkzrnq3w28q3pyne,385ba37be4d0617780a137a81d6593554f0ecc98,10/26/2016,2016
eset-sednit-part3(10-27-2016),En Route with Sednit Part 3: A Mysterious Downloader,ESET,https://app.box.com/s/p4ywd9iqr5fr48nbz5o0nfwwgjkq5itk,2cd04b3b878180782e8467c2cbe69d301a0d98ec,10/27/2016,2016
TrendMicro_BLACKGEAR-Espionage-Campaign(10-27-2016),"BLACKGEAR Espionage Campaign Evolves, Adds Japan To Target List",Trend Micro,https://app.box.com/s/ws5vsndqqi7s17ysrfa39260wqy2ktyt,bd52c0809e379a7dabdb35fcbb07d077f10a6edc,10/27/2016,2016
BoozAllen_ukraine-report-when-the-lights-went-out(11-3-2016),When The Lights Went Out: Ukraine Cybersecurity Threat Briefing,Booz Allen,https://app.box.com/s/pbj4aeiapdbblzs19gzymgsk73sxbe56,6a6ad533b71fd64fc9dd4948e920a0992f637302,11/03/2016,2016
BoozAllen_ukraine-report-when-the-lights-went-out(11-03-2016),When The Lights Went Out: Ukraine Cybersecurity Threat Briefing,Booz Allen,https://app.box.com/s/pbj4aeiapdbblzs19gzymgsk73sxbe56,6a6ad533b71fd64fc9dd4948e920a0992f637302,11/03/2016,2016
Volexity_Powerduke-Widespread-PostElection-Spear-Phish(11-09-2016),PowerDuke: Widespread Post-Election Spear Phishing Campaigns Targeting Think Tanks and NGOs,Volexity,https://app.box.com/s/wd73vlkdiry8hibkbqvmtsn0bhmzkhgk,d1e4a9dc8b5bd3aaa06b40d5fe8fcefb5328e157,11/09/2016,2016
Trustwave_Carbanak _Anunak_Attack_Methodology(11-14-2016),New Carbanak / Anunak Attack Methodology,Trustwave,https://app.box.com/s/cbclbgiu54ihivxe7bvblwsv1e8jq44h,35f1522128ae21490cc812f5929b961fe0cbdf5c,11/14/2016,2016
Citizenlab_KeyBoy-targeting-Tibetan-Community(11-17-2016),It's Parliamentary: KeyBoy and the targeting of the Tibetan Community,Citizen Lab,https://app.box.com/s/q7rywbgt6s5c380vvjpk643ppcdtdl8v,1c664e6ab6a1e36fb0a1dccb231acfb26e943b19,11/17/2016,2016
Expand Down Expand Up @@ -490,7 +490,7 @@ RSA_the-carbanak-fin7-syndicate(11-22-2017),The Carbanak/Fin7 syndicate,RSA,http
NCSC_Turla-Neuron-Nautilus-Snake-malware_1(11-22-2017),Turla group using Neuron and Nautilus tools alongside Snake malware,NCSC,https://app.box.com/s/316mbg901wxjdarmtdlj6v4qv29a0ge8,316cd38c3939a4f862b611888a489672c014b651,11/22/2017,2017
RSA_the-shadows-of-ghosts-carbanak-report(11-30-2017),Inside the Response of a Unique CARBANAK Intrusion,RSA,https://app.box.com/s/egwg3so00e433s191jow7xlb1o27z7m7,06c63b54de2848bff9557bc9c49bf75906273fb2,11/30/2017,2017
Clearsky_Charming_Kitten_2017(12-05-2017),Charming Kitten: Iranian Cyber Espionage Against Human Rights Activists,Clearsky,https://app.box.com/s/3eqrk7r3hvx4e61vznh61mmw75u3zira,bba8af0fe4254863c86aafeedb7d86f7af7b0e99,12/05/2017,2017
Clearsky_Charming-Kitten-2017(12-05-2017).csv,Charming Kitten: CSV Data,Clearsky,https://app.box.com/s/gair4givf0gt8ga4c65vtkj3na9wba2n,e55cf58e470f10affdb7dd0664868d014a2c8d13,12/05/2017,2017
Clearsky_Charming-Kitten-2017(12-05-2017),Charming Kitten: CSV Data,Clearsky,https://app.box.com/s/gair4givf0gt8ga4c65vtkj3na9wba2n,e55cf58e470f10affdb7dd0664868d014a2c8d13,12/05/2017,2017
Dragos_TRISIS-01(12-14-2017),TRISIS Malware,Dragos,https://app.box.com/s/lczcjm4izqlu3fuve5lf7yof2gpcxn0h,c9534efcbf1a9c020ba864ee090e0c0b03d32181,12/14/2017,2017
Fireeye_ICS-Attack-Framework-TRITON(12-14-2017),"Attackers Deploy New ICS Attack Framework ""TRITON"" and Cause Operational Disruption to Critical Infrastructure",FireEye,https://app.box.com/s/yvlm1esfazyp5ktx6ximkj2l9nkh6sk9,b0d8df40d920ddbd5372adef63486c23545a141c,12/14/2017,2017
ProofPoint_us-wp-north-korea-bitten-by-bitcoin-bug(12-19-2017),North Korea Bitten by Bitcoin Bug,Proofpoint,https://app.box.com/s/xez1hl78xz2l55mqe5cqvlwb5ytckhxf,d8ba9a371c7dc7e6608b92e8a671b82191d6c67a,12/19/2017,2017
Expand Down Expand Up @@ -664,7 +664,7 @@ Proofpoint_Russia-Aligned-TA499-Beleaguers-Targets-Video-Call-Requests(03-07-202
Checkpoint_Chinese-Espionage-Southeast-Asian-Government-Entities(03-07-2023),Pandas with a Soul: Chinese Espionage Attacks Against Southeast Asian Government Entities,Checkpoint,https://app.box.com/s/29jms8a3yoapqi7id90gi7fepknh155m,d1a6a9b7fbd5a94cdd7b325883da3e413d4f8ffc,03/07/2023,2023
Mandiant_LIGHTSHOW-1-North-Koreas-UNC2970(03-09-2023),Stealing the LIGHTSHOW (Part One) - North Korea's UNC2970,Mandiant,https://app.box.com/s/t1wj2s9hwf71dh65w5re5est9yhvh0mu,e9325a67d4681c8cdfc1e2a18783142e2e74826c,03/09/2023,2023
Mandiant_LIGHTSHOW-2-LIGHTSHIFT-and-LIGHTSHOW(03-09-2023),Stealing the LIGHTSHOW (Part Two) - LIGHTSHIFT and LIGHTSHOW,Mandiant,https://app.box.com/s/q3opc1veurizduac9fqpcptxcc7eztg0,604ce904b72ea33febb00802b7b26f4d782f6f67,03/09/2023,2023
360_APT-C-56-TransparentTribe-camouflage-campaign(02-13-2023),Analysis of APT-C-56 (Transparent Tribe) camouflage resume attack campaign,CoreSec360,https://app.box.com/s/rnoc7ldxv29za832xasqohm1ammp3g2d,39ab8916e64fe878e3198b82bc0bfd0b78c8e8cd,03/13/2023,2023
360_APT-C-56-TransparentTribe-camouflage-campaign(03-13-2023),Analysis of APT-C-56 (Transparent Tribe) camouflage resume attack campaign,CoreSec360,https://app.box.com/s/rnoc7ldxv29za832xasqohm1ammp3g2d,39ab8916e64fe878e3198b82bc0bfd0b78c8e8cd,03/13/2023,2023
ESET_Tick-APT-compromise-DLP-developer-East-Asia(03-14-2023),The slow Ticking time bomb: Tick APT group compromise of a DLP software developer in East Asia,ESET,https://app.box.com/s/m37w9blhczmsgr4cmhjfxu432zca4sdj,23219da0963e95373d5dacba4348f1ccd274fd59,03/14/2023,2023
Mandiant_Fortinet-Zero-Day-Suspected-Chinese-Operation(03-16-2023),Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation,mandiant,https://app.box.com/s/iii4w6dhgx5q3ty6wqw3blcwquf074rq,d4d5053d7057f5fd24a4e431de95c2efc33b3a59,03/16/2023,2023
ESET_apt-activity-report-q2-2023-q3-2023(10-26-2023),ESET APT Activity Report Q2-Q3 2023,ESET,https://app.box.com/s/k8lwb8mo9io4mzsu89jd8lwsu123hazd,7873f4b161d89a40f97a4b4104f212f4d556459a,10/26/2023,2023
Expand Down

0 comments on commit 01531c8

Please sign in to comment.