Click here to download all references as Bib-File.•
| 2024-12-26
            
            ⋅
            
            
            ⋅
            
            Weixin
            ⋅ Analysis of the attack activities of APT-C-26 (Lazarus) using weaponized IPMsg software ComeBacker | 
| 2024-10-15
            
            ⋅
            
            
            ⋅
            
            Weixin
            ⋅ Analysis of the attack activities of APT-C-35 (belly brain worm) against a manufacturing company in South Asia Unidentified 117 (Donot Loader) | 
| 2024-07-05
            
            ⋅
            
            
            ⋅
            
            Weixin
            ⋅ APT-C-26 (Lazarus) uses PyPI to attack Windows, Linux, and macOS platforms SimpleTea SimpleTea | 
| 2023-08-28
            
            ⋅
            
            
            ⋅
            
            360
            ⋅ APT-C-55 (Kimsuky) organization uses Korean domain names for malicious activities | 
| 2022-12-06
            
            ⋅
            
            
            ⋅
            
            360 Threat Intelligence Center
            ⋅ Analysis of suspected APT-C-56 (Transparent Tribe) attacks against terrorism AhMyth Meterpreter SpyNote AsyncRAT | 
| 2022-08-17
            
            ⋅
            
            
            ⋅
            
            360
            ⋅ Kasablanka organizes attacks against political groups and non-profit organizations in the Middle East SpyNote Loda Nanocore RAT NjRAT | 
| 2022-05-18
            
            ⋅
            
            
            ⋅
            
            Weixin
            ⋅ filesyncshell.dll hijacked? APT-C-24 Sidewinder Briefing on the Latest Attack Activity | 
| 2022-04-12
            
            ⋅
            
            
            ⋅
            
            360 Threat Intelligence Center
            ⋅ Recent attacks by Bahamut group revealed Bahamut | 
| 2022-04-02
            
            ⋅
            
            
            ⋅
            
            institute for advanced threats
            ⋅ WAVES LURKING IN THE CALM OF THE WIND AND WAVES: A DYNAMIC ANALYSIS OF THE ATTACK ACTIVITIES OF THE APT-C-00 (SEALOTUS) ORGANIZATION | 
| 2022-03-22
            
            ⋅
            
            
            ⋅
            
            360 Threat Intelligence Center
            ⋅ Quantum Attack System – NSA "APT-C-40" Hacking Organization High-end Cyber Attack Weapon Technical Analysis Report (I) | 
| 2022-02-23
            
            ⋅
            
            
            ⋅
            
            Weixin
            ⋅ APT-C-58 (Gorgon Group) attack warning Agent Tesla | 
| 2021-11-19
            
            ⋅
            
            
            ⋅
            
            360 Threat Intelligence Center
            ⋅ It is suspected that the APT-C-55 organization used the commercial software Web Browser Password Viewer to carry out the attack | 
| 2021-09-01
            
            ⋅
            
            
            ⋅
            
            360 Threat Intelligence Center
            ⋅ APT-C-56 (Transparent Tribe) Latest Attack Analysis and Associated Suspected Gorgon Group Attack Analysis Alert Crimson RAT NetWire RC | 
| 2021-08-02
            
            ⋅
            
            
            ⋅
            
            360 Threat Intelligence Center
            ⋅ Operation Hunting - The latest attack by the CNC (APT-C-48) has been revealed | 
| 2021-07-27
            
            ⋅
            
            
            ⋅
            
            360 Threat Intelligence Center
            ⋅ Summary of Kimsuky's secret stealing activities in the first half of 2021 | 
| 2021-07-16
            
            ⋅
            
            
            ⋅
            
            360 Threat Intelligence Center
            ⋅ APT-C-61 attacks against South Asia | 
| 2021-06-15
            
            ⋅
            
            
            ⋅
            
            360 Threat Intelligence Center
            ⋅ PJobRAT: Spyware targeting Indian military personnel PjobRAT | 
| 2021-04-20
            
            ⋅
            
            
            ⋅
            
            360 Threat Intelligence Center
            ⋅ Transparent Tribe uses the new crown vaccine hotspot to analyze the targeted attacks on the Indian medical industry Crimson RAT | 
| 2021-01-26
            
            ⋅
            
            
            ⋅
            
            360 Threat Intelligence Center
            ⋅ Shell Break-Lazarus (APT-C-26) organized targeted attacks against security researchers to reveal the secret | 
| 2021-01-21
            
            ⋅
            
            
            ⋅
            
            360 Threat Intelligence Center
            ⋅ Disclosure of Manling Flower Organization (APT-C-08) using Warzone RAT attack Ave Maria | 
| 2020-12-16
            
            ⋅
            
            
            ⋅
            
            360 Threat Intelligence Center
            ⋅ 旺刺组织(APT-C-47)使用ClickOnce技术的攻击活动披露 | 
| 2020-12-15
            
            ⋅
            
            
            ⋅
            
            360 Threat Intelligence Center
            ⋅ Operation Falling Eagle-the secret of the most influential supply chain attack in history SUNBURST | 
| 2020-11-09
            
            ⋅
            
            
            ⋅
            
            360
            ⋅ Analysis of the latest targeted attacks by Lugansk against Ukraine | 
| 2020-10-23
            
            ⋅
            
            
            ⋅
            
            360
            ⋅ APT28携小众压缩包诱饵对北约、中亚目标的定向攻击分析 Zebrocy | 
| 2020-08-25
            
            ⋅
            
            
            ⋅
            
            360 Threat Intelligence Center
            ⋅ Darkhotel (APT-C-06) organized multiple attacks using the Thinmon backdoor framework to reveal the secrets ThinMon | 
| 2020-07-01
            
            ⋅
            
            
            ⋅
            
            360
            ⋅ 游走在东欧和中亚的奇幻熊 Zebrocy |