Click here to download all references as Bib-File.•
2020-05-06
⋅
Twitter (@moranned)
⋅
Tweet on side effects of Doxing in the context OilRig |
2015-08-10
⋅
shadowserver
⋅
The Italian Connection: An analysis of exploit supply chains and digital quartermasters smac APT20 |
2014-11-21
⋅
FireEye
⋅
Operation Double Tap pirpi |
2014-09-30
⋅
FireEye
⋅
OPERATION QUANTUM ENTANGLEMENT NewCT DragonOK |
2014-09-03
⋅
FireEye
⋅
Darwin’s Favorite APT Group EtumBot ThreeByte WaterSpout APT12 |
2014-08-13
⋅
FireEye
⋅
OPERATION SAFFRON ROSE Flying Kitten |
2014-03-25
⋅
FireEye
⋅
Spear Phishing the News Cycle: APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370 APT30 Naikon |
2014-03-12
⋅
FireEye
⋅
A Detailed Examination of the Siesta Campaign APT1 Siesta |
2013-12-12
⋅
FireEye Inc
⋅
OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs Tidepool APT15 |
2013-11-10
⋅
FireEye
⋅
Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method 9002 RAT |
2013-10-31
⋅
FireEye
⋅
Know Your Enemy: Tracking A Rapidly Evolving APT Actor Bozok Poison Ivy TEMPER PANDA |
2013-09-24
⋅
FireEye
⋅
Now You See Me - H-worm by Houdini Houdini |
2013-09-21
⋅
FireEye
⋅
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets DeputyDog APT17 |
2013-09-21
⋅
FireEye
⋅
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets DeputyDog |
2013-09-06
⋅
FireEye
⋅
Evasive Tactics: Taidoor taidoor Taleret |
2013-08-23
⋅
FireEye
⋅
Operation Molerats: Middle East Cyber Attacks Using Poison Ivy Poison Ivy Molerats |
2013-08-12
⋅
FireEye
⋅
Survival of the Fittest: New York Times Attackers Evolve Quickly yayih |
2013-05-20
⋅
FireEye
⋅
Ready for Summer: The Sunshop Campaign 9002 RAT |
2013-05-01
⋅
Norman Shark
⋅
Operation Hangover Smackdown |