Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-12-05KISAKrCERT
TTPs#9: Analyzing the attack strategy monitoring the daily life of individuals
Chinotto
2021-09-02KrCertKrCERT
TTPs#6 Targeted Watering Hole Attack Strategy Analysis (SILENT CHOLLIMA)
Tiger RAT
2021-06-25KrCertDongwook Kim, Kayoung Kim, Seulgi Lee, Taewoo Lee
Attack patterns in AD environment
Clop
2021-06-25KrCertDongwook Kim, Kayoung Kim, Seulgi Lee, Taewoo Lee
Attack patterns in AD environment
Clop
2021-06-25KrCertDongwook Kim, Kayoung Kim, Seulgi Lee, Taewoo Lee
Attack patterns in AD environment
Clop
2021-06-25KrCertDongwook Kim, Kayoung Kim, Seulgi Lee, Taewoo Lee
Attack patterns in AD environment
Clop
2021-04-27KISAKrCERT
2020 Ransomware Trends & Analysis Report
2020-12-15KISAKrCERT
Operation MUZABI
Appleseed
2020-09-11KISAKrCERT
Analysis of attacker's strategy of using malicious code
2020-06-29KISAKrCERT
OPERATION BOOKCODES TTPs #2
BookCodes RAT
2020-04-01KISAKrCERT
OPERATION BOOKCODES TTPs #1
BookCodes RAT