Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update APTnotes.csv #1

Merged
merged 1 commit into from
May 8, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 6 additions & 6 deletions APTnotes.csv
Original file line number Diff line number Diff line change
Expand Up @@ -297,12 +297,12 @@ CitizenLab_Mapping-FinFishers-Continuing-Proliferation(Oct-15-15),Pay No Attenti
Checkpoint_rocket-kitten-report(Nov-9-2015),Rocket Kitten: A Campaign With 9 Lives,Checkpoint,https://app.box.com/s/vhe51fr5m6kqqzbkkcuukta6nucn9p6a,523ae1be152df2a4d1de51ee2b3e7f23cad62628,11/09/2015,2015
Microsoft_Security_Intelligence_Report_Volume_19_English(11-16-2015),Microsoft Security Intelligence Report (Volume 19),Microsoft,https://app.box.com/s/qjvx7sdbo7cufb5b8putfyqn8ku82xq2,666a7931d4fc2466852e0676e318391a23aec1d1,11/16/2015,2015
RSA_Peering-Into-GlassRAT-final(Nov-23-15),PEERING INTO GLASSRAT: A Zero Detection Trojan from China,RSA,https://app.box.com/s/3jg797vagekvf1xjyz1j49esdhm4fmjs,1d72a50b38ee4b5f57684726cef957f61ae6d2f2,11/23/2015,2015
Symantec_Iran-based-attackers-use-back-door-threats-to-spy-on-Middle-Eastern-targets(Dec-7-2015),Iran-based attackers use back door threats to spy on Middle Eastern targets,Symantec,https://app.box.com/s/oeix6b4jcwdkwyrzq35brtmq2ktoyxnw,7819b3820b7af3f3d3f0335989a95ae6314b353b,12/07/2015,2015
Symantec_Iran-based-attackers-use-back-door-threats-to-spy-on-Middle-Eastern-targets(Dec-7-2015) ,Iran-based attackers use back door threats to spy on Middle Eastern targets,Symantec,https://app.box.com/s/oeix6b4jcwdkwyrzq35brtmq2ktoyxnw,7819b3820b7af3f3d3f0335989a95ae6314b353b,12/07/2015,2015
Symantec_CadelSpy-Remexi-IOC(12-07-2015),Backdoor.Cadelspy and Backdoor.Remexi indicators of compromise,Symantec,https://app.box.com/s/k351gsuaj647jtmwmukmtem31oszg1tv,a3d9e8a14cf1729af25bf64193ac17bf9da56a20,12/07/2015,2015
Kaspersky_Evolution-of-Cyber-Threats-in-the-Corporate-Sector(Dec-10-2015),Evolution of Cyber Threats in the Corporate Sector,Kaspersky,https://app.box.com/s/ql84nxbrheluzhi3bt7k48damnuz00u5,75c2325f529d34155445af6a82bb22ec4277a80f,12/10/2015,2015
Fidelis_FTA_1020_Fidelis_Inocnation_FINAL(Dec-16-15),Dissecting the Malware Involved in the INOCNATION Campaign,Fidelis,https://app.box.com/s/dl6izicyky1x946ueo77nn2w8c5jxgm3,e10651d3a6223055e95464f0023b549cdf7ca00c,12/16/2015,2015
PaloAlto_BBSRAT-Attacks-Targeting-Russian-Organizations-Linked-to-Roaming-Tiger(Dec-22-15),BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger,Palo Alto,https://app.box.com/s/noqd4tec6z6nfv8w4z48vzvwfo3goegl,e9de634545c873b0999728df361b28fae9536dc2,12/22/2015,2015
PWC_ELISE- Security-Through-Obesity(Dec-23-15),ELISE: Security Through Obesity,PWC,https://app.box.com/s/xjjieg8w489osjfp4jk7vgum37a6ibro,7baa3b39f072e82717aa554f3434863f7e9edd1f,12/23/2015,2015
PWC_ELISE-Security-Through-Obesity(Dec-23-15),ELISE: Security Through Obesity,PWC,https://app.box.com/s/xjjieg8w489osjfp4jk7vgum37a6ibro,7baa3b39f072e82717aa554f3434863f7e9edd1f,12/23/2015,2015
ESET_BlackEnergy-by-the-SSHBearDoor(Jan-3-16),BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry,ESET,https://app.box.com/s/uo31npu9sese34f1ppggmrug48x7rlqp,8bcb1743d4a9ddbbc6daf063dca8c8107baed218,01/03/2016,2016
Clearsky_Operation-DustySky_TLP_WHITE(Jan-7-2016),Operation Dusty Sky,Clearsky,https://app.box.com/s/cydpeasz6l8cv9oo99o4tpazd5tq4xkm,9b7bf2d6c4a10dac7483c618562e701f42c1dc32,01/07/2016,2016
Clearsky_Operation-DustySky-indicators(Jan-7-2016),Operation Dusty Sky (indicators),Clearsky,https://app.box.com/s/5iym3huegu3ssaejl0rr268sr7qy6seb,1acdc7b846d53b582075ea4a3c5ba64bbbf10e81,01/07/2016,2016
Expand Down Expand Up @@ -371,7 +371,7 @@ PaloAlto_PrinceofPersiaGameOver(06-28-2016),Prince of Persia Game Over,Palo Alto
JPCERT_AsruexShortcutFiles(06-30-2016),Asruex: Malware Infecting through Shortcut Files,JPCERT,https://app.box.com/s/mxvgs6dx4kixjv5s29yc6m81kii8opbw,0ddd9b23aaa773615e7d6392969d40b332e0c85f,06/30/2016,2016
Bitdefender_Pacifier-APT(7-1-2016),Pacifier APT,Bitdefender,https://app.box.com/s/xcu346jhiokohlj9300q6hif06swac57,6289dff2cbd2750c76517007989483922179fa40,07/01/2016,2016
ESET_targeting-Central-and-EasternEurope(07-01-2016),Espionage toolkit targeting Central and Eastern Europe uncovered,ESET,https://app.box.com/s/kmb22xnoniwxfkhsw8r3tkpo5rko0w1a,8d9af4bb8b4bafcb9e58ab21e1419abd2eed46b2,07/01/2016,2016
Cymmetria_Unveiling-Patchwork(07-07-16),Unveiling Patchwork the Copy Paste APT,Cymmetria,https://app.box.com/s/r9pw9xbcy2fz2ssewg5p7lqyvtn1b6jc,955ddb4453827e2c1664f2924e75b21fb0c0496d,07/07/2016,2016
Cymmetria_Unveiling-Patchwork(Jul-7-16),Unveiling Patchwork the Copy Paste APT,Cymmetria,https://app.box.com/s/r9pw9xbcy2fz2ssewg5p7lqyvtn1b6jc,955ddb4453827e2c1664f2924e75b21fb0c0496d,07/07/2016,2016
Proofpoint_NetTraveler-TargetsRussianEuropean(07-07-2016),"NetTraveler APT Targets Russian, European Interests",ProofPoint,https://app.box.com/s/u16hs4trjkamdxkb8xth6e5ugckr3230,d647ecd9a694447bc8ee9096f425ba29d93f7fb7,07/07/2016,2016
Kaspersky_DroppingElephant(07-08-2016),The Dropping Elephant - aggressive cyber-espionage in the Asian region,Kaspersky,https://app.box.com/s/9yczw853br9y9bs98j44uwc3kx6e414y,e0606a9e6a785d942b50d281d87550dc03d3666e,07/08/2016,2016
Symantec_Patchwork-expands-to-industries(07-25-2016),Patchwork cyberespionage group expands targets from governments to wide range of industries,Symantec,https://app.box.com/s/8k4ikxiyz3od5bg6juqpjf99dcfdba4l,0184ab60e9f8f38cd59f0a53278192a286255179,07/25/2016,2016
Expand All @@ -396,7 +396,7 @@ VectraNetworks_Moonlight-Targeted-attacks-MiddleEast(10-26-2016),Moonlight - Tar
Forcepoint_BITTER-Targeted-attack-Pakistan(10-26-2016),BITTER: A Targeted attack against Pakistan,Forcepoint,https://app.box.com/s/iegu4jz7v3q0vcvgrkzrnq3w28q3pyne,385ba37be4d0617780a137a81d6593554f0ecc98,10/26/2016,2016
eset-sednit-part3(10-27-2016),En Route with Sednit Part 3: A Mysterious Downloader,ESET,https://app.box.com/s/p4ywd9iqr5fr48nbz5o0nfwwgjkq5itk,2cd04b3b878180782e8467c2cbe69d301a0d98ec,10/27/2016,2016
TrendMicro_BLACKGEAR-Espionage-Campaign(10-27-2016),"BLACKGEAR Espionage Campaign Evolves, Adds Japan To Target List",Trend Micro,https://app.box.com/s/ws5vsndqqi7s17ysrfa39260wqy2ktyt,bd52c0809e379a7dabdb35fcbb07d077f10a6edc,10/27/2016,2016
BoozAllen_ukraine-report-when-the-lights-went-out(11-3-2016),When The Lights Went Out: Ukraine Cybersecurity Threat Briefing,Booz Allen,https://app.box.com/s/pbj4aeiapdbblzs19gzymgsk73sxbe56,6a6ad533b71fd64fc9dd4948e920a0992f637302,11/03/2016,2016
BoozAllen_ukraine-report-when-the-lights-went-out(11-03-2016),When The Lights Went Out: Ukraine Cybersecurity Threat Briefing,Booz Allen,https://app.box.com/s/pbj4aeiapdbblzs19gzymgsk73sxbe56,6a6ad533b71fd64fc9dd4948e920a0992f637302,11/03/2016,2016
Volexity_Powerduke-Widespread-PostElection-Spear-Phish(11-09-2016),PowerDuke: Widespread Post-Election Spear Phishing Campaigns Targeting Think Tanks and NGOs,Volexity,https://app.box.com/s/wd73vlkdiry8hibkbqvmtsn0bhmzkhgk,d1e4a9dc8b5bd3aaa06b40d5fe8fcefb5328e157,11/09/2016,2016
Trustwave_Carbanak _Anunak_Attack_Methodology(11-14-2016),New Carbanak / Anunak Attack Methodology,Trustwave,https://app.box.com/s/cbclbgiu54ihivxe7bvblwsv1e8jq44h,35f1522128ae21490cc812f5929b961fe0cbdf5c,11/14/2016,2016
Citizenlab_KeyBoy-targeting-Tibetan-Community(11-17-2016),It's Parliamentary: KeyBoy and the targeting of the Tibetan Community,Citizen Lab,https://app.box.com/s/q7rywbgt6s5c380vvjpk643ppcdtdl8v,1c664e6ab6a1e36fb0a1dccb231acfb26e943b19,11/17/2016,2016
Expand Down Expand Up @@ -490,7 +490,7 @@ RSA_the-carbanak-fin7-syndicate(11-22-2017),The Carbanak/Fin7 syndicate,RSA,http
NCSC_Turla-Neuron-Nautilus-Snake-malware_1(11-22-2017),Turla group using Neuron and Nautilus tools alongside Snake malware,NCSC,https://app.box.com/s/316mbg901wxjdarmtdlj6v4qv29a0ge8,316cd38c3939a4f862b611888a489672c014b651,11/22/2017,2017
RSA_the-shadows-of-ghosts-carbanak-report(11-30-2017),Inside the Response of a Unique CARBANAK Intrusion,RSA,https://app.box.com/s/egwg3so00e433s191jow7xlb1o27z7m7,06c63b54de2848bff9557bc9c49bf75906273fb2,11/30/2017,2017
Clearsky_Charming_Kitten_2017(12-05-2017),Charming Kitten: Iranian Cyber Espionage Against Human Rights Activists,Clearsky,https://app.box.com/s/3eqrk7r3hvx4e61vznh61mmw75u3zira,bba8af0fe4254863c86aafeedb7d86f7af7b0e99,12/05/2017,2017
Clearsky_Charming-Kitten-2017(12-05-2017).csv,Charming Kitten: CSV Data,Clearsky,https://app.box.com/s/gair4givf0gt8ga4c65vtkj3na9wba2n,e55cf58e470f10affdb7dd0664868d014a2c8d13,12/05/2017,2017
Clearsky_Charming-Kitten-2017(12-05-2017),Charming Kitten: CSV Data,Clearsky,https://app.box.com/s/gair4givf0gt8ga4c65vtkj3na9wba2n,e55cf58e470f10affdb7dd0664868d014a2c8d13,12/05/2017,2017
Dragos_TRISIS-01(12-14-2017),TRISIS Malware,Dragos,https://app.box.com/s/lczcjm4izqlu3fuve5lf7yof2gpcxn0h,c9534efcbf1a9c020ba864ee090e0c0b03d32181,12/14/2017,2017
Fireeye_ICS-Attack-Framework-TRITON(12-14-2017),"Attackers Deploy New ICS Attack Framework ""TRITON"" and Cause Operational Disruption to Critical Infrastructure",FireEye,https://app.box.com/s/yvlm1esfazyp5ktx6ximkj2l9nkh6sk9,b0d8df40d920ddbd5372adef63486c23545a141c,12/14/2017,2017
ProofPoint_us-wp-north-korea-bitten-by-bitcoin-bug(12-19-2017),North Korea Bitten by Bitcoin Bug,Proofpoint,https://app.box.com/s/xez1hl78xz2l55mqe5cqvlwb5ytckhxf,d8ba9a371c7dc7e6608b92e8a671b82191d6c67a,12/19/2017,2017
Expand Down Expand Up @@ -664,7 +664,7 @@ Proofpoint_Russia-Aligned-TA499-Beleaguers-Targets-Video-Call-Requests(03-07-202
Checkpoint_Chinese-Espionage-Southeast-Asian-Government-Entities(03-07-2023),Pandas with a Soul: Chinese Espionage Attacks Against Southeast Asian Government Entities,Checkpoint,https://app.box.com/s/29jms8a3yoapqi7id90gi7fepknh155m,d1a6a9b7fbd5a94cdd7b325883da3e413d4f8ffc,03/07/2023,2023
Mandiant_LIGHTSHOW-1-North-Koreas-UNC2970(03-09-2023),Stealing the LIGHTSHOW (Part One) - North Korea's UNC2970,Mandiant,https://app.box.com/s/t1wj2s9hwf71dh65w5re5est9yhvh0mu,e9325a67d4681c8cdfc1e2a18783142e2e74826c,03/09/2023,2023
Mandiant_LIGHTSHOW-2-LIGHTSHIFT-and-LIGHTSHOW(03-09-2023),Stealing the LIGHTSHOW (Part Two) - LIGHTSHIFT and LIGHTSHOW,Mandiant,https://app.box.com/s/q3opc1veurizduac9fqpcptxcc7eztg0,604ce904b72ea33febb00802b7b26f4d782f6f67,03/09/2023,2023
360_APT-C-56-TransparentTribe-camouflage-campaign(02-13-2023),Analysis of APT-C-56 (Transparent Tribe) camouflage resume attack campaign,CoreSec360,https://app.box.com/s/rnoc7ldxv29za832xasqohm1ammp3g2d,39ab8916e64fe878e3198b82bc0bfd0b78c8e8cd,03/13/2023,2023
360_APT-C-56-TransparentTribe-camouflage-campaign(03-13-2023),Analysis of APT-C-56 (Transparent Tribe) camouflage resume attack campaign,CoreSec360,https://app.box.com/s/rnoc7ldxv29za832xasqohm1ammp3g2d,39ab8916e64fe878e3198b82bc0bfd0b78c8e8cd,03/13/2023,2023
ESET_Tick-APT-compromise-DLP-developer-East-Asia(03-14-2023),The slow Ticking time bomb: Tick APT group compromise of a DLP software developer in East Asia,ESET,https://app.box.com/s/m37w9blhczmsgr4cmhjfxu432zca4sdj,23219da0963e95373d5dacba4348f1ccd274fd59,03/14/2023,2023
Mandiant_Fortinet-Zero-Day-Suspected-Chinese-Operation(03-16-2023),Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation,mandiant,https://app.box.com/s/iii4w6dhgx5q3ty6wqw3blcwquf074rq,d4d5053d7057f5fd24a4e431de95c2efc33b3a59,03/16/2023,2023
ESET_apt-activity-report-q2-2023-q3-2023(10-26-2023),ESET APT Activity Report Q2-Q3 2023,ESET,https://app.box.com/s/k8lwb8mo9io4mzsu89jd8lwsu123hazd,7873f4b161d89a40f97a4b4104f212f4d556459a,10/26/2023,2023
Expand Down