Logo
Explore Help
Sign In
admin/APT_REPORT
1
0
Fork 0
You've already forked APT_REPORT
mirror of https://github.com/blackorbird/APT_REPORT.git synced 2025-05-31 18:50:45 +00:00
Code Issues Packages Projects Releases Wiki Activity
APT_REPORT/APT28
History
blackorbird 4ef83f2c98
Add files via upload
2024-06-05 17:15:26 +08:00
..
decode
11
2019-04-08 15:46:31 +08:00
history-report-pdf
REPORT
2019-04-08 16:00:01 +08:00
IOC
Create 2019-04-09-ioc-mark.txt
2019-04-09 14:55:18 +08:00
yara
Create apt28_backdoor_cls.yar
2019-08-30 10:52:28 +08:00
2021-05_FancyBear.pdf
Add files via upload
2021-06-04 09:39:23 +08:00
APT28_CERTFR_2023_EN.pdf
Add files via upload
2023-10-29 21:52:35 -05:00
BlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support Espionage Activities.pdf
Add files via upload
2023-06-21 18:01:48 +08:00
DoppelgangerNG_ClearSky.pdf
Add files via upload
2024-02-26 15:24:06 +08:00
GRU's BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns.pdf
Add files via upload
2024-05-31 19:05:40 +08:00
logpoint-etpr-forest-blizzard.pdf
Add files via upload
2024-06-05 17:15:26 +08:00
README.MD
Update README.MD
2024-02-26 15:25:04 +08:00

README.MD

RELATED REPORT

2024.2

Doppelgänger | Russia-Aligned Influence Operation Targets Germany

https://www.sentinelone.com/labs/doppelganger-russia-aligned-influence-operation-targets-germany/

About APT28

[1] https://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-full.pdf

[2] https://www.welivesecurity.com/2017/05/09/sednit-adds-two-zero-day-exploits-using-trumps-attack-syria-decoy/

[3] https://www.emanueledelucia.net/apt28-targeting-military-institutions/

[4] https://www.emanueledelucia.net/apt28-sofacy-seduploader-under-the-christmas-tree/

[5] https://unit42.paloaltonetworks.com/unit42-sofacy-continues-global-attacks-wheels-new-cannon-trojan/

[6] https://unit42.paloaltonetworks.com/dear-joohn-sofacy-groups-global-campaign/

[7] https://unit42.paloaltonetworks.com/sofacy-creates-new-go-variant-of-zebrocy-tool/

[8] https://blog.trendmicro.co.jp/archives/19829

[9] https://www.welivesecurity.com/2018/11/20/sednit-whats-going-zebrocy/

[10] https://www.carbonblack.com/2019/04/05/cb-threat-intelligence-notification-hunting-apt28-downloaders/

[11] https://www.securityartwork.es/2019/04/04/ukraine-election-2019-polls-maldoc-analysis/

[12] https://threatvector.cylance.com/en_us/home/inside-the-apt28-dll-backdoor-blitz.html

Powered by Gitea Version: 1.23.1 Page: 62ms Template: 4ms
English
Bahasa Indonesia Deutsch English Español Français Gaeilge Italiano Latviešu Magyar nyelv Nederlands Polski Português de Portugal Português do Brasil Suomi Svenska Türkçe Čeština Ελληνικά Български Русский Українська فارسی മലയാളം 日本語 简体中文 繁體中文(台灣) 繁體中文(香港) 한국어
Licenses API