Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-07-28CISACISA, Australian Cyber Security Centre (ACSC), NCSC UK, FBI
@online{cisa:20210728:top:78a1031, author = {CISA and Australian Cyber Security Centre (ACSC) and NCSC UK and FBI}, title = {{Top Routinely Exploited Vulnerabilities}}, date = {2021-07-28}, organization = {CISA}, url = {https://us-cert.cisa.gov/ncas/alerts/aa21-209a}, language = {English}, urldate = {2021-07-29} } Top Routinely Exploited Vulnerabilities
2021-07-19NCSC UKNCSC UK
@online{uk:20210719:uk:8ecd954, author = {NCSC UK}, title = {{UK and allies hold Chinese state responsible for pervasive pattern of hacking}}, date = {2021-07-19}, organization = {NCSC UK}, url = {https://www.ncsc.gov.uk/news/uk-allies-hold-chinese-state-responsible-for-pervasive-pattern-of-hacking}, language = {English}, urldate = {2021-07-22} } UK and allies hold Chinese state responsible for pervasive pattern of hacking
APT31 Leviathan
2021-07-19GOV.UKNCSC UK, Dominic Raab
@online{uk:20210719:uk:9674820, author = {NCSC UK and Dominic Raab}, title = {{UK and allies hold Chinese state responsible for a pervasive pattern of hacking}}, date = {2021-07-19}, organization = {GOV.UK}, url = {https://www.gov.uk/government/news/uk-and-allies-hold-chinese-state-responsible-for-a-pervasive-pattern-of-hacking}, language = {English}, urldate = {2021-07-22} } UK and allies hold Chinese state responsible for a pervasive pattern of hacking
APT31 HAFNIUM Leviathan
2021-07-01CISA, FBI, NSA, NCSC UK
@techreport{cisa:20210701:russian:4127fc7, author = {CISA and FBI and NSA and NCSC UK}, title = {{Russian GRU (APT28) Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments}}, date = {2021-07-01}, institution = {}, url = {https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/1/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF}, language = {English}, urldate = {2021-07-11} } Russian GRU (APT28) Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments
reGeorg
2021-05-07GCHQNCSC UK, CISA, FBI, NSA
@techreport{uk:20210507:further:400b6a8, author = {NCSC UK and CISA and FBI and NSA}, title = {{Further TTPs associated with SVR cyber actors: Use of multiple publicly available exploits and Sliver framework to target organisations globally}}, date = {2021-05-07}, institution = {GCHQ}, url = {https://www.ncsc.gov.uk/files/Advisory-further-TTPs-associated-with-SVR-cyber-actors.pdf}, language = {English}, urldate = {2021-05-08} } Further TTPs associated with SVR cyber actors: Use of multiple publicly available exploits and Sliver framework to target organisations globally
2020-07-27NCSC UKNCSC UK, CISA
@techreport{uk:20200727:alert:de33046, author = {NCSC UK and CISA}, title = {{Alert: Potential legacy risk from malware targeting QNAP NAS devices}}, date = {2020-07-27}, institution = {NCSC UK}, url = {https://www.ncsc.gov.uk/files/NCSC%20CISA%20Alert%20-QNAP%20NAS%20Devices.pdf}, language = {English}, urldate = {2020-07-30} } Alert: Potential legacy risk from malware targeting QNAP NAS devices
QSnatch
2020-07-27CISANCSC UK, CISA
@online{uk:20200727:alert:31c9b38, author = {NCSC UK and CISA}, title = {{Alert (AA20-209A): Potential Legacy Risk from Malware Targeting QNAP NAS Devices}}, date = {2020-07-27}, organization = {CISA}, url = {https://us-cert.cisa.gov/ncas/alerts/aa20-209a}, language = {English}, urldate = {2020-07-30} } Alert (AA20-209A): Potential Legacy Risk from Malware Targeting QNAP NAS Devices
QSnatch
2020-07-16NCSC UKNCSC UK
@techreport{uk:20200716:advisory:d2a121d, author = {NCSC UK}, title = {{Advisory: APT29 targets COVID-19 vaccine development}}, date = {2020-07-16}, institution = {NCSC UK}, url = {https://www.ncsc.gov.uk/files/Advisory-APT29-targets-COVID-19-vaccine-development.pdf}, language = {English}, urldate = {2020-09-01} } Advisory: APT29 targets COVID-19 vaccine development
WellMail elf.wellmess SoreFang WellMess
2020-02-20NCSC UKNCSC UK
@online{uk:20200220:uk:576d9ff, author = {NCSC UK}, title = {{UK condemns Russia's GRU over Georgia cyber-attacks}}, date = {2020-02-20}, organization = {NCSC UK}, url = {https://www.gov.uk/government/news/uk-condemns-russias-gru-over-georgia-cyber-attacks}, language = {English}, urldate = {2020-09-19} } UK condemns Russia's GRU over Georgia cyber-attacks
2019-10-21NCSC UKNCSC UK
@online{uk:20191021:advisory:8f9f0e8, author = {NCSC UK}, title = {{Advisory: Turla group exploits Iranian APT to expand coverage of victims}}, date = {2019-10-21}, organization = {NCSC UK}, url = {https://www.ncsc.gov.uk/news/turla-group-exploits-iran-apt-to-expand-coverage-of-victims}, language = {English}, urldate = {2020-01-06} } Advisory: Turla group exploits Iranian APT to expand coverage of victims
Nautilus Neuron
2018-10-11NCSC UKNCSC UK
@techreport{uk:20181011:joint:d7901ac, author = {NCSC UK}, title = {{Joint report on publicly available hacking tools: How to limit the effectiveness of tools commonly used by malicious actors}}, date = {2018-10-11}, institution = {NCSC UK}, url = {https://www.ncsc.gov.uk/content/files/protected_files/article_files/Joint%20report%20on%20publicly%20available%20hacking%20tools%20%28NCSC%29.pdf}, language = {English}, urldate = {2019-11-20} } Joint report on publicly available hacking tools: How to limit the effectiveness of tools commonly used by malicious actors
Codoso Stone Panda
2018-10-04NCSC UKNCSC UK
@online{uk:20181004:indicators:65560f3, author = {NCSC UK}, title = {{Indicators of Compromise for Malware used by APT28}}, date = {2018-10-04}, organization = {NCSC UK}, url = {https://www.ncsc.gov.uk/alerts/indicators-compromise-malware-used-apt28}, language = {English}, urldate = {2020-01-07} } Indicators of Compromise for Malware used by APT28
X-Tunnel (.NET)
2018-10-04NCSC UKNCSC UK
@techreport{uk:20181004:indicators:af0d14a, author = {NCSC UK}, title = {{Indicators of Compromise for Malware used by APT28}}, date = {2018-10-04}, institution = {NCSC UK}, url = {https://www.thecssc.com/wp-content/uploads/2018/10/4OctoberIOC-APT28-malware-advisory.pdf}, language = {English}, urldate = {2019-11-29} } Indicators of Compromise for Malware used by APT28
X-Agent
2018-04-04NCSC UKNCSC UK
@online{uk:20180404:hostile:4ec4505, author = {NCSC UK}, title = {{Hostile state actors compromising UK organisations with focus on engineering and industrial control companies}}, date = {2018-04-04}, organization = {NCSC UK}, url = {https://www.ncsc.gov.uk/alerts/hostile-state-actors-compromising-uk-organisations-focus-engineering-and-industrial-control}, language = {English}, urldate = {2019-10-23} } Hostile state actors compromising UK organisations with focus on engineering and industrial control companies
Goodor
2018-01-17NCSC UKNCSC UK
@online{uk:20180117:turla:7563012, author = {NCSC UK}, title = {{Turla group malware}}, date = {2018-01-17}, organization = {NCSC UK}, url = {https://www.ncsc.gov.uk/alerts/turla-group-malware}, language = {English}, urldate = {2020-01-06} } Turla group malware
Nautilus Neuron