2023-01-05 14:08:45 +08:00
..
2022-07-29 11:30:11 +08:00

threat summary report

ddos q2

https://gcorelabs.com/blog/ddos-attack-trends-in-q1q2-of-2022/

Spam and phishing in 2021

https://securelist.com/spam-and-phishing-in-2021/105713/

list:

  1. https://blog.google/threat-analysis-group/new-campaign-targeting-security-researchers/
  2. https://www.bleepingcomputer.com/news/security/lazarus-hackers-target-researchers-with-trojanized-ida-pro/
  3. https://blog.google/threat-analysis-group/new-campaign-targeting-security-researchers/
  4. https://blogs.jpcert.or.jp/en/2021/01/Lazarus_malware2.html
  5. http://blog.nsfocus.net/stumpzarus-apt-lazarus/
  6. https://blog.malwarebytes.com/awareness/2021/02/north-korean-hackers-charged-with-1-3-billion-of-cyberheists/
  7. https://securelist.com/lazarus-threatneedle/100803/
  8. https://blog.sygnia.co/lazarus-groups-mata-framework-leveraged-to-deploy-tflower-ransomware?hsLang=en
  9. https://blogs.jpcert.or.jp/en/2021/03/Lazarus_malware3.html
  10. https://www.welivesecurity.com/2021/04/08/are-you-afreight-dark-watch-out-vyveva-new-lazarus-backdoor/
  11. https://blog.group-ib.com/btc_changer
  12. https://blog.malwarebytes.com/threat-intelligence/2021/04/lazarus-apt-conceals-malicious-code-within-bmp-file-to-drop-its-rat/
  13. https://www.estsecurity.com/enterprise/security-center/notice/view/59449?category-id=
  14. https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/lazarus-recruitment/
  15. https://ti.qianxin.com/blog/articles/Analysis-of-attacks-by-Lazarus-using-Daewoo-shipyard-as-bait/
  16. https://mp.weixin.qq.com/s/MBH8ACSTfC6UGzf2h1BuhA
  17. https://cybersecurity.att.com/blogs/labs-research/lazarus-campaign-ttps-and-evolution
  18. https://ti.qianxin.com/blog/articles/Lazarus'-Recent-Attack-Campaign-Targeting-Blockchain-Finance-and-Energy-Sectors/
  19. https://securelist.com/apt-trends-report-q3-2021/104708/
  20. https://usa.kaspersky.com/about/press-releases/2021_apt-actor-lazarus-attacks-defense-industry-develops-supply-chain-attack-capabilities
  21. https://asec.ahnlab.com/ko/28527/
  22. https://twitter.com/esetresearch/status/1458438155149922312
  23. https://mp.weixin.qq.com/s/ZMnO3Q6MAxafmOOO2cQMfw
  24. https://www.nknews.org/pro/dprk-hackers-use-south-korean-servers-and-google-drive-to-hide-malware-attack/
  25. https://blog.alyac.co.kr/3489
  26. https://blog.alyac.co.kr/3525
  27. https://blog.alyac.co.kr/3536
  28. https://blog.alyac.co.kr/3550
  29. https://www.estsecurity.com/enterprise/security-center/notice/view/22734?category-id=5
  30. https://blog.alyac.co.kr/3624
  31. https://apt.360.cn/report/apts/171.html
  32. https://ti.qianxin.com/blog/articles/Analysis-on-the-attack-activities-of-Kimsuky-APT-using-the-Foreign-Ministry-of-South-Korea-as-bait/
  33. https://blog.malwarebytes.com/threat-intelligence/2021/06/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor/
  34. https://www.freebuf.com/articles/paper/278762.html
  35. https://mp.weixin.qq.com/s/y4TGzrhr2rvVk5EAca91hA
  36. https://asec.ahnlab.com/ko/25351/
  37. https://www.freebuf.com/articles/paper/281985.html
  38. https://mp.weixin.qq.com/s/BvP00a-33OOmbcdwDkeqeg
  39. https://www.boannews.com/media/view.asp?idx=99543
  40. https://www.boannews.com/media/view.asp?idx=99543
  41. https://inquest.net/blog/2021/08/23/kimsuky-espionage-campaign
  42. https://blog.alyac.co.kr/4130
  43. https://asec.ahnlab.com/ko/27166/
  44. https://mp.weixin.qq.com/s/sautIOi__PCf4Y_tfdj1zg
  45. https://blog.talosintelligence.com/2021/11/kimsuky-abuses-blogs-delivers-malware.html%EF%BB%BF
  46. https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
  47. https://www.volexity.com/blog/2021/08/17/north-korean-apt-inkysquid-infects-victims-using-browser-exploits/
  48. https://blog.malwarebytes.com/threat-intelligence/2021/08/new-variant-of-konni-malware-used-in-campaign-targetting-russia/
  49. https://www.volexity.com/blog/2021/08/24/north-korean-bluelight-special-inkysquid-deploys-rokrat/
  50. https://securelist.com/scarcruft-surveilling-north-korean-defectors-and-human-rights-activists/105074/
  51. https://mp.weixin.qq.com/s/nyxZFXgrtm2-tBiV3-wiMg
  52. https://www.anomali.com/blog/primitive-bear-gamaredon-targets-ukraine-with-timely-themes
  53. https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/
  54. https://blog.netlab.360.com/rotajakiro_vs_oceanlotus_cn/
  55. https://ti.qianxin.com/blog/articles/Operation-OceanStorm:The-OceanLotus-hidden-under-the-abyss-of-the-deep/
  56. https://www.amnestyusa.org/reports/vietnamese-activists-targeted-by-notorious-hacking-group/
  57. https://mp.weixin.qq.com/s/WnKc0JbjA5_IsjPFSzFoYA
  58. https://mp.weixin.qq.com/s/NUjR3qVE0PJXULgGc3Edow
  59. https://mp.weixin.qq.com/s/8nP27nQKD_6OE-igggFDww
  60. https://www.4hou.com/posts/2Drj
  61. https://ti.qianxin.com/blog/articles/%22operation-magichm%22:CHM-file-release-and-subsequent-operation-of-BITTER-organization/
  62. https://ti.qianxin.com/blog/articles/Donot-uses-Google-Drive-to-distribute-malware/
  63. https://ti.qianxin.com/blog/articles/Analysis-of-the-Donot-group's-attack-campaign-using-RTF-template-injection-against-the-neighbourhood/
  64. https://mp.weixin.qq.com/s/RC1S7yrYT-o9oyPHkPE-ow
  65. https://ti.qianxin.com/blog/articles/Sidecopy-dual-platform-weapon/
  66. https://mp.weixin.qq.com/s/C09P0al1nhsyyujHRp0FAw
  67. https://ti.dbappsecurity.com.cn/blog/articles/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack-cn/
  68. https://resources.lookout.com/blog/lookout-discovers-novel-confucius-apt-android-spyware-linked-to-india-pakistan-conflict
  69. https://www.antiy.com/response/20210222.html
  70. https://mp.weixin.qq.com/s/ELYDvdMiiy4FZ3KpmAddZQ
  71. https://blog.cyble.com/2021/04/21/donot-team-apt-group-is-back-to-using-old-malicious-patterns/
  72. https://blog.talosintelligence.com/2021/05/transparent-tribe-infra-and-targeting.html
  73. https://ti.qianxin.com/blog/articles/SideWinder-arsenal-update:Analysis-of-attack-activity-against-Pakistan-using-foreign-policy/
  74. https://ti.qianxin.com/blog/articles/Analysis-of-the-APT-Group-Donot's-Attack-Campaign-Using-the-Impact-of-the-Afghan-Withdrawal-as-Bait/
  75. https://ti.qianxin.com/blog/articles/Analysis-of-recent-attacks-by-Transparent-Tribe-using-Indian-Defense-Ministry-meeting-minutes-as-bait/
  76. https://www.trendmicro.com/en_us/research/21/h/confucius-uses-pegasus-spyware-related-lures-to-target-pakistani.html
  77. https://mp.weixin.qq.com/s/_LHJYgf6l9uFYMN23fUQAA
  78. https://mp.weixin.qq.com/s/AhxP5HmROtMsFBiUxj0cFg
  79. https://blog.cyble.com/2021/09/14/apt-group-targets-indian-defense-officials-through-enhanced-ttps/
  80. https://www.amnesty.org/en/latest/news/2021/10/togo-activist-targeted-with-spyware-by-notorious-hacker-group/
  81. https://ti.qianxin.com/blog/articles/Analysis-of-BITTER-APT-Group-for-the-Military-Industry-New-Attack-Activity/
  82. https://mp.weixin.qq.com/s/CGHDuJAb4dav_th25yYpWA
  83. https://mp.weixin.qq.com/s/MQgEVZVqQmcyOXVlEgpezA
  84. http://blog.nsfocus.net/apt-sidecopy/
  85. https://blog.malwarebytes.com/threat-intelligence/2021/12/sidecopy-apt-connecting-lures-to-victims-payloads-to-infrastructure/
  86. https://ti.qianxin.com/blog/articles/SideCopy-APT-Group-Takes-Advantage-of-the-Fire/
  87. https://www.cert.ssi.gouv.fr/uploads/CERTFR-2021-CTI-005.pdf
  88. https://unit42.paloaltonetworks.com/ironnetinjector
  89. https://ti.qianxin.com/blog/articles/Analysis-of-attack-activities-of-APT28-using-high-carbon-ferrochrome-manufacturer-registration-form-as-bait/
  90. https://blog.talosintelligence.com/2021/02/gamaredonactivities.html
  91. https://www.mimecast.com/incident-report/
  92. https://www.spiegel.de/politik/deutschland/russischer-hack-erneute-attacke-hack-auf-bundestag-sieben-abgeordnete-betroffen-a-75e1adbe-4462-4e30-bd94-96796aed6b8a
  93. https://www.anomali.com/blog/primitive-bear-gamaredon-targets-ukraine-with-timely-themes
  94. https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/
  95. https://msrc-blog.microsoft.com/2021/06/25/new-nobelium-activity/
  96. https://www.version2.dk/artikel/danmarks-nationalbank-hacket-led-verdens-mest-sofistikerede-hackerangreb-1092886
  97. https://mp.weixin.qq.com/s/bJrEwoq4QkDJvEk_ThvueQ
  98. https://www.bloomberg.com/news/articles/2021-07-06/russian-state-hackers-breached-republican-national-committee
  99. https://www.zscaler.com/blogs/security-research/cloudfall-targets-researchers-and-scientists-invited-international-military
  100. https://blog.talosintelligence.com/2021/09/tinyturla.html
  101. https://services.google.com/fh/files/misc/gcat_threathorizons_full_nov2021.pdf
  102. http://blog.nsfocus.net/solarwinds-foggyweb/
  103. https://ti.qianxin.com/blog/articles/MKLG-Operation:Analysis-of-attacks-against-the-Middle-East-for-several-years/
  104. https://ti.qianxin.com/blog/articles/SnowLeopard:Surveillance-activities-against-Pakistani-users-disclosed/
  105. https://ti.qianxin.com/blog/articles/PyMICROPSIA-New-Trojan-for-AridViper/
  106. https://ti.qianxin.com/blog/articles/PROMETHIUM-forged-NotePad++-installation-package-attack-campaign/
  107. https://ti.qianxin.com/blog/articles/Molerats-Latest-Mobile-Attack-Tracking-Disclosure/
  108. https://blog.certfa.com/posts/charming-kitten-christmas-gift/
  109. https://www.anomali.com/blog/probable-iranian-cyber-actors-static-kitten-conducting-cyberespionage-campaign-targeting-uae-and-kuwait-government-agencies
  110. https://ti.qianxin.com/blog/articles/MKLG-Operation:Analysis-of-attacks-against-the-Middle-East-for-several-years/
  111. https://research.checkpoint.com/2021/irans-apt34-returns-with-an-updated-arsenal/
  112. https://about.fb.com/wp-content/uploads/2021/04/Technical-threat-report-Arid-Viper-April-2021.pdf
  113. https://mp.weixin.qq.com/s/o_EVjBVN2sQ1q7cl4rUXoQ
  114. https://www.trendmicro.com/en_us/research/21/g/strongpity-apt-group-deploys-android-malware-for-the-first-time.html
  115. https://ti.qianxin.com/blog/articles/SnowLeopard:Surveillance-activities-against-Pakistani-users-disclosed/
  116. https://securelist.com/lyceum-group-reborn/104586/
  117. https://ti.qianxin.com/blog/articles/APT-Q-63-Attack-Targeting-Palestinian-Areas-Using-Election-Information-as-Bait/
  118. https://ti.qianxin.com/blog/articles/PROMETHIUM-forged-NotePad++-installation-package-attack-campaign/
  119. https://ti.qianxin.com/blog/articles/PyMICROPSIA-New-Trojan-for-AridViper/
  120. https://ti.qianxin.com/blog/articles/Operation-EICAR:-Targeted-hunting-activities-for-the-securities-and-finance-industry/
  121. https://ti.qianxin.com/blog/articles/APT-Q-12-Attack-the-Trade-Industry/
  122. https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/new-apt-group-chamelgang/#id0
  123. https://research.checkpoint.com/2021/indra-hackers-behind-recent-attacks-on-iran/