Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-09-02KrCertKrCERT
@techreport{krcert:20210902:ttps6:3198c89, author = {KrCERT}, title = {{TTPs#6 Targeted Watering Hole Attack Strategy Analysis (SILENT CHOLLIMA)}}, date = {2021-09-02}, institution = {KrCert}, url = {https://www.krcert.or.kr/filedownload.do?attach_file_seq=3277&attach_file_id=EpF3277.pdf}, language = {Korean}, urldate = {2021-09-09} } TTPs#6 Targeted Watering Hole Attack Strategy Analysis (SILENT CHOLLIMA)
Tiger RAT
2021-06-25KrCertKayoung Kim, Dongwook Kim, Taewoo Lee, Seulgi Lee
@techreport{kim:20210625:attack:d4ae440, author = {Kayoung Kim and Dongwook Kim and Taewoo Lee and Seulgi Lee}, title = {{Attack patterns in AD environment}}, date = {2021-06-25}, institution = {KrCert}, url = {https://www.boho.or.kr/filedownload.do?attach_file_seq=2808&attach_file_id=EpF2808.pdf}, language = {English}, urldate = {2021-06-29} } Attack patterns in AD environment
Clop
2021-04-27KISAKrCERT
@techreport{krcert:20210427:2020:6bbe129, author = {KrCERT}, title = {{2020 Ransomware Trends & Analysis Report}}, date = {2021-04-27}, institution = {KISA}, url = {https://www.boho.or.kr/filedownload.do?attach_file_seq=2716&attach_file_id=EpF2716.pdf}, language = {English}, urldate = {2021-06-21} } 2020 Ransomware Trends & Analysis Report
2020-12-15KISAKrCERT
@techreport{krcert:20201215:operation:4784750, author = {KrCERT}, title = {{Operation MUZABI}}, date = {2020-12-15}, institution = {KISA}, url = {https://www.boho.or.kr/filedownload.do?attach_file_seq=2652&attach_file_id=EpF2652.pdf}, language = {Korean}, urldate = {2021-06-04} } Operation MUZABI
Appleseed
2020-09-11KISAKrCERT
@techreport{krcert:20200911:analysis:490f2e3, author = {KrCERT}, title = {{Analysis of attacker's strategy of using malicious code}}, date = {2020-09-11}, institution = {KISA}, url = {https://www.boho.or.kr/filedownload.do?attach_file_seq=2517&attach_file_id=EpF2517.pdf}, language = {Korean}, urldate = {2020-09-15} } Analysis of attacker's strategy of using malicious code
2020-06-29KISAKrCERT
@techreport{krcert:20200629:operation:bbe9f5c, author = {KrCERT}, title = {{OPERATION BOOKCODES TTPs #2}}, date = {2020-06-29}, institution = {KISA}, url = {https://www.boho.or.kr/filedownload.do?attach_file_seq=2612&attach_file_id=EpF2612.pdf}, language = {English}, urldate = {2020-11-19} } OPERATION BOOKCODES TTPs #2
2020-04-01KISAKrCERT
@techreport{krcert:20200401:operation:d6916ea, author = {KrCERT}, title = {{OPERATION BOOKCODES TTPs #1}}, date = {2020-04-01}, institution = {KISA}, url = {https://www.boho.or.kr/filedownload.do?attach_file_seq=2452&attach_file_id=EpF2452.pdf}, language = {English}, urldate = {2020-11-19} } OPERATION BOOKCODES TTPs #1