Click here to download all references as Bib-File.
2020-05-06 ⋅ Twitter (@moranned) ⋅ Tweet on side effects of Doxing in the context OilRig |
2015-08-10 ⋅ shadowserver ⋅ The Italian Connection: An analysis of exploit supply chains and digital quartermasters smac APT20 |
2014-11-21 ⋅ FireEye ⋅ Operation Double Tap pirpi |
2014-09-30 ⋅ FireEye ⋅ OPERATION QUANTUM ENTANGLEMENT NewCT DragonOK |
2014-09-03 ⋅ FireEye ⋅ Darwin’s Favorite APT Group EtumBot ThreeByte WaterSpout APT12 |
2014-08-13 ⋅ FireEye ⋅ OPERATION SAFFRON ROSE Flying Kitten |
2014-03-25 ⋅ FireEye ⋅ Spear Phishing the News Cycle: APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370 APT30 Naikon |
2014-03-12 ⋅ FireEye ⋅ A Detailed Examination of the Siesta Campaign APT1 Siesta |
2013-12-12 ⋅ FireEye Inc ⋅ OPERATION “KE3CHANG”:Targeted Attacks Against Ministries of Foreign Affairs Tidepool APT15 |
2013-11-10 ⋅ FireEye ⋅ Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method 9002 RAT |
2013-10-31 ⋅ FireEye ⋅ Know Your Enemy: Tracking A Rapidly Evolving APT Actor Bozok Poison Ivy TEMPER PANDA |
2013-09-24 ⋅ FireEye ⋅ Now You See Me - H-worm by Houdini Houdini |
2013-09-21 ⋅ FireEye ⋅ Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets DeputyDog APT17 |
2013-09-21 ⋅ FireEye ⋅ Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets DeputyDog |
2013-09-06 ⋅ FireEye ⋅ Evasive Tactics: Taidoor taidoor Taleret |
2013-08-23 ⋅ FireEye ⋅ Operation Molerats: Middle East Cyber Attacks Using Poison Ivy Poison Ivy Molerats |
2013-08-12 ⋅ FireEye ⋅ Survival of the Fittest: New York Times Attackers Evolve Quickly yayih |
2013-05-20 ⋅ FireEye ⋅ Ready for Summer: The Sunshop Campaign 9002 RAT |
2013-05 ⋅ Norman Shark ⋅ Operation Hangover Smackdown |