Click here to download all references as Bib-File.•
2023-11-09
⋅
Mandiant
⋅
Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology CaddyWiper |
2023-07-24
⋅
Mandiant
⋅
Pro-PRC HaiEnergy Campaign Exploits U.S. News Outlets via Newswire Services to Target U.S. Audiences; Evidence of Commissioned Protests in Washington, D.C. |
2023-05-25
⋅
Mandiant
⋅
COSMICENERGY: New OT Malware Possibly Related To Russian Emergency Response Exercises LIGHTWORK PIEHOP |
2023-03-30
⋅
Mandiant
⋅
Contracts Identify Cyber Operations Projects from Russian Company NTC Vulkan INCONTROLLER |
2023-03-22
⋅
Mandiant
⋅
We (Did!) Start the Fire: Hacktivists Increasingly Claim Targeting of OT Systems |
2022-08-04
⋅
Mandiant
⋅
Pro-PRC “HaiEnergy” Information Operations Campaign Leverages Infrastructure from Public Relations Firm to Disseminate Content on Inauthentic News Sites |
2022-07-26
⋅
Mandiant
⋅
Mandiant Red Team Emulates FIN11 Tactics To Control Operational Technology Servers Clop Industroyer MimiKatz Triton |
2022-04-25
⋅
Mandiant
⋅
INDUSTROYER.V2: Old Malware Learns New Tricks INDUSTROYER2 |
2022-04-13
⋅
Mandiant
⋅
INCONTROLLER: New State-Sponsored Cyber Attack Tools Target Multiple Industrial Control Systems |
2022-01-31
⋅
Mandiant
⋅
1 in 7 Ransomware Extortion Attacks Leak Critical Operational Technology Information |
2021-10-27
⋅
Mandiant
⋅
Portable Executable File Infecting Malware Is Increasingly Found in OT Networks CCleaner Backdoor Floxif neshta Ramnit Sality Virut |
2021-05-25
⋅
FireEye
⋅
Crimes of Opportunity: Increasing Frequency of Low Sophistication Operational Technology Compromises |
2020-07-15
⋅
Mandiant
⋅
Financially Motivated Actors Are Expanding Access Into OT: Analysis of Kill Lists That Include OT Processes Used With Seven Malware Families Clop DoppelPaymer LockerGoga Maze MegaCortex Nefilim Snake |