2025-05-05 21:33:11 +08:00
2021-05-26 11:27:29 +08:00
2025-05-03 17:53:52 +08:00
2025-05-02 13:46:37 +08:00
2019-05-07 15:34:10 +08:00
2025-04-30 16:08:28 +08:00
2024-02-28 16:29:38 +08:00
2019-06-26 11:58:47 +08:00
2022-11-08 11:04:10 +08:00
2023-03-31 22:34:12 +08:00
2023-03-30 11:09:34 +08:00
2024-12-30 11:23:45 +08:00
2021-04-22 14:06:17 +08:00
2023-05-22 19:31:39 +08:00
2022-08-12 10:55:41 +08:00
2023-12-21 10:35:22 +08:00
2023-04-20 15:29:27 +08:00
2019-07-24 18:21:28 +08:00
2024-08-16 13:15:19 +08:00
2022-04-19 11:48:07 +08:00
2019-04-23 10:57:31 +08:00
2024-12-13 19:06:12 +08:00
2024-12-17 09:37:10 +08:00
2024-11-14 10:45:18 +08:00
2020-09-17 10:59:10 +08:00
2020-04-13 23:21:44 +08:00
2025-05-02 13:37:32 +08:00
2021-11-11 23:29:09 +08:00
2021-12-25 21:23:31 +02:00
2020-05-14 14:54:41 +08:00
2019-09-06 10:48:10 +08:00
2019-09-25 10:56:16 +08:00
2021-10-08 14:27:17 +08:00
2023-05-05 12:02:21 +08:00
2022-02-23 15:59:36 +08:00
2025-01-13 14:45:19 +08:00
2020-04-23 22:54:56 +08:00
2024-12-06 17:32:16 +08:00
2023-03-03 10:25:48 +08:00
2024-10-16 17:05:56 +08:00
2021-12-30 11:30:12 +08:00
2024-07-19 23:51:04 +08:00
2023-10-07 11:04:56 +08:00
2022-02-23 11:20:31 +08:00
2025-02-18 11:24:25 +08:00
2019-08-06 15:30:48 +08:00
2019-09-26 18:28:03 +08:00
2022-09-26 12:02:56 +08:00
2019-08-01 23:01:32 +08:00
2020-07-16 15:24:39 +08:00
2023-04-20 16:20:18 +08:00
2020-05-11 22:34:31 +08:00
2024-05-09 14:49:12 +08:00
2022-04-29 17:31:56 +08:00
2021-03-24 12:58:01 +08:00
2024-11-20 17:51:45 +08:00
2022-01-11 14:30:17 +08:00
2019-09-23 09:58:16 +08:00
2024-05-06 15:15:06 +08:00
2024-01-11 15:39:46 +08:00
2021-07-08 11:45:27 +08:00
2021-01-14 14:23:13 +08:00
2019-10-09 10:21:36 +08:00
2023-01-11 12:57:29 +08:00
2025-04-30 21:27:39 +08:00
2021-12-08 20:34:17 +08:00
2019-08-29 14:11:47 +08:00
2019-09-05 17:42:55 +08:00
2019-09-19 17:58:44 +08:00
2020-08-21 10:22:27 +08:00
2023-09-20 10:08:45 +08:00
2024-07-19 14:37:43 +08:00
2019-09-09 16:34:54 +08:00
2022-10-18 16:19:21 +08:00
2024-02-20 14:57:04 +08:00
2022-05-20 11:13:41 +08:00
2019-05-27 14:28:00 +08:00
2019-05-17 23:11:08 +08:00
2024-08-05 14:44:30 +08:00
2019-06-16 16:02:06 +08:00

APT_REPORT collected by @blackorbird https://twitter.com/blackorbird

Interesting apt report & sample & malware & technology & intellegence collection

APT Group for country

Threat Actor Groups Tracked by Palo Alto Networks Unit 42

https://unit42.paloaltonetworks.com/threat-actor-groups-tracked-by-palo-alto-networks-unit-42/

Sample

Group123

▶ScarCruft continues to evolve, introduces Bluetooth harvester https://securelist.com/scarcruft-continues-to-evolve-introduces-bluetooth-harvester/90729/ (May 13, 2019)

▶Group123 Attempts to attack 'printing paper' APT disguised as a guide to organization and conferences https://blog.alyac.co.kr/2287 (May 2 , 2019)

▶Group123, APT attack impersonating Unification Ministry, spread malicious code to Google Drive https://blog.alyac.co.kr/2268 (April 22 , 2019)

▶ group123 APT organization, 'Operation High Expert' https://blog.alyac.co.kr/2226 (April 2 , 2019)

▶ Rocketman APT Campaign Returned to Operation Holiday Wiper https://blog.alyac.co.kr/2089 (Jan 23, 2019)

▶ 'Operation Blackbird', the mobile invasion of the ' https://blog.alyac.co.kr/2035 (Dec 13, 2018)

▶ group123 'Operation Korean Sword' is underway https://blog.alyac.co.kr/1985 (Nov. 16, 2018)

▶ group123 Group's latest APT campaign - 'Operation Rocket Man' https://blog.alyac.co.kr/1853 (Aug. 22, 2018)

▶ group123, Flash Player Zero-Day (CVE-2018-4878) Attack Attention https://blog.alyac.co.kr/1521 (Feb 02, 2018)

▶ 'group123' group 'survey on the total number of discovery of separated families in North and South' https://blog.alyac.co.kr/1767 (July 28, 2014)

▶ Rocketman APT campaign, 'Operation Golden Bird' https://blog.alyac.co.kr/2205 (March 20, 2013)

▶ Korea In The Crosshairs https://blog.talosintelligence.com/2018/01/korea-in-crosshairs.html (Jan 16, 2018)

▶FreeMilk: A Highly Targeted Spear Phishing Campaign https://unit42.paloaltonetworks.com/unit42-freemilk-highly-targeted-spear-phishing-campaign/ (Oct 5, 2017)

▶BabyShark Malware Part Two Attacks Continue Using KimJongRAT and PCRat (April 26, 2019) https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/

▶Operation Giant Baby, a giant threat (March 28, 2019) https://blog.alyac.co.kr/2223

▶ Malicious code installed with coin purse program(Alibaba) (March 15, 2019) https://asec.ahnlab.com/1209

▶ New BabyShark Malware Targets U.S. National Security Think Tanks (Feb. 22, 2019) https://unit42.paloaltonetworks.com/new-babyshark-malware-targets-u-s-national-security-think-tanks/

▶ Korea's latest APT attack, Operation Mystery Baby Attention! (Feb 11, 2018) https://blog.alyac.co.kr/1963

▶ Returned to Korea as Operation Baby Coin, APT attacker, overseas target in 2010 (Apr. 19, 2014) https://blog.alyac.co.kr/1640

kimsuky

▶Kimsuky, Blue House Green Support / Sangchunjae Estimate https://blog.alyac.co.kr/2645

▶Kimsuky, cyber security bureau Cryptographic Cases (May 28 , 2019) https://blog.alyac.co.kr/2338

▶Kimsuky, Korea Cryptographic Exchange Event Impersonation APT Attack (May 28 , 2019) https://blog.alyac.co.kr/2336

▶Kimsuky 'Fake striker' APT campaign aimed at Korea (May 20 , 2019) https://blog.alyac.co.kr/2315

▶ Analysis of "Smoke Screen" in APT campaign aimed at Korea and America (April 17 , 2019) https://blog.alyac.co.kr/2243

▶ Encrypted APT attack, Kimsuky organization's 'smoke screen' PART 2 (May 13 , 2019) https://blog.alyac.co.kr/2299

▶ Kimsuky Organization, Operation Stealth Power Silence Operation (April 3 , 2019) https://blog.alyac.co.kr/2234

▶ Kimsuky Organization, Watering Hole Started "Operation Low Kick"(March 21, 2019) https://blog.alyac.co.kr/2209

Jaku

▶ SiliVaccine: Inside North Koreas Anti-Virus (May 1, 2018) https://research.checkpoint.com/silivaccine-a-look-inside-north-koreas-anti-virus/

Lazarus

▶Lazarus Group Goes 'Fileless'an implant w/ remote download & in-memory execution https://objective-see.com/blog/blog_0x51.html

▶LAZARUS APT TARGETS MAC USERS WITH POISONED WORD DOCUMENT https://www.sentinelone.com/blog/lazarus-apt-targets-mac-users-poisoned-word-document/

Konni

▶Konni's APT Group conducts attacks with Russian-North Korean trade and economic investment documents https://blog.alyac.co.kr/2535

▶APT Campaign 'Konni' & 'Kimsuky' find commonality in organizations (June 10, 2019) https://blog.alyac.co.kr/2347

▶Korean Kusa Konni Organization, Blue Sky Utilizing 'Amadey' Russia Botnet (May 16, 2019) https://blog.alyac.co.kr/2308

▶The Konni APT Campaign and 'Operation Hunter Adonis' (Jan 1 ,2019) https://blog.alyac.co.kr/2061

Oceanlotus

▶Threat Spotlight: Ratsnif - New Network Vermin from OceanLotus (July 1, 2019) https://threatvector.cylance.com/en_us/home/threat-spotlight-ratsnif-new-network-vermin-from-oceanlotus.html

▶Analysis report on the attack on mobile devices by Oceanlotus (May 24, 2019)

https://mp.weixin.qq.com/s/L-tCvLPOOMhP0ndgdqhkNQ

▶ Oceanlotus in the first quarter of 2019 for the attack technology of China.(April 24, 2019) https://mp.weixin.qq.com/s/xPsEXp2J5IE7wNSMEVC24A

▶ Deobfuscating APT32 Flow Graphs with Cutter and Radare2 (April 24, 2019) https://research.checkpoint.com/deobfuscating-apt32-flow-graphs-with-cutter-and-radare2/

▶ OceanLotus Steganography Malware Analysis White Paper (April 2 , 2019) https://threatvector.cylance.com/en_us/home/report-oceanlotus-apt-group-leveraging-steganography.html

▶OceanLotus: macOS malware update(April 9 , 2019)

https://www.welivesecurity.com/2019/04/09/oceanlotus-macos-malware-update/

APT28

▶ CB TAU Threat Intelligence Notification: Hunting APT28 Downloaders (April 5 , 2019) https://www.carbonblack.com/2019/04/05/cb-threat-intelligence-notification-hunting-apt28-downloaders/

Turla

▶ A dive into Turla PowerShell usage (May 29 , 2019) https://www.welivesecurity.com/2019/05/29/turla-powershell-usage/

tick

▶ tick group new campaign, attack north korean and japan https://www.ahnlab.com/kr/site/securityinfo/secunews/secuNewsView.do?curPage=1&menu_dist=2&seq=28186 (April 1 , 2019)

Winnti

▶ bayer-says-has-detected-contained-cyber-attack (April 5 , 2019)

https://www.reuters.com/article/us-bayer-cyber/bayer-says-has-detected-contained-cyber-attack-idUSKCN1RG0NN

https://www.tagesschau.de/inland/hackerangriff-bayer-101.html

Middle East Asia

Muddywater

▶ Recent MuddyWater-associated BlackWater campaign shows signs of new anti-detection techniques(May 20,2019)

https://blog.talosintelligence.com/2019/05/recent-muddywater-associated-blackwater.html

ZooPark

▶ APT-C-38 attack activity revealed (May 27,2019) http://blogs.360.cn/post/analysis-of-APT-C-38.html

APT Group for finance

CARBANAK

▶ CARBANAK Week Part One: A Rare Occurrence (April 22, 2019) https://www.fireeye.com/blog/threat-research/2019/04/carbanak-week-part-one-a-rare-occurrence.html

londonblue (Nigeria)

▶ Evolving Tactics: London Blue Starts Spoofing Target Domains (April 4 , 2019) PDF is in the folder https://www.agari.com/email-security-blog/london-blue-evolving-tactics/

Fin6

▶ Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware(April 5 , 2019) https://www.fireeye.com/blog/threat-research/2019/04/pick-six-intercepting-a-fin6-intrusion.html

Fin7

▶ On the Hunt for FIN7: Pursuing an Enigmatic and Evasive Global Criminal Operation (August 01, 2018) https://www.fireeye.com/blog/threat-research/2018/08/fin7-pursuing-an-enigmatic-and-evasive-global-criminal-operation.html

Description
Interesting APT Report Collection And Some Special IOC
Readme 2.4 GiB
Languages
Python 58.5%
YARA 28.2%
C 12.9%
PHP 0.4%