Update README.MD
This commit is contained in:
@@ -21,3 +21,211 @@ https://blog.chainalysis.com/reports/crypto-money-laundering-2022/
|
||||
2022 Year in Review
|
||||
|
||||
https://thedfirreport.com/2023/03/06/2022-year-in-review/
|
||||
|
||||
other 2022 link:
|
||||
1.https://ti.qianxin.com/blog/articles/SideCopy's-Golang-based-Linux-tool/
|
||||
2.https://mp.weixin.qq.com/s/xKKr5UV26npohwvyv79U0w
|
||||
3.https://lab52.io/blog/complete-dissection-of-an-apk-with-a-suspicious-c2-server/
|
||||
4.https://citizenlab.ca/2022/04/catalangate-extensive-mercenary-spyware-operation-againstcatalans-using-pegasus-candiru/
|
||||
5.https://mp.weixin.qq.com/s/1WtaS7htgiUGhtY_ovERxA
|
||||
6.https://blog.cyble.com/2022/08/09/bitter-apt-group-using-dracarys-android-spyware/
|
||||
7.https://www.mandiant.com/resources/blog/apt42-charms-cons-compromises
|
||||
8.https://medium.com/s2wblog/unveil-the-evolution-of-kimsuky-targeting-android-devices-withnewly-discovered-mobile-malware-280dae5a650f
|
||||
9.https://mp.weixin.qq.com/s/pd6fUs5TLdBtwUHauclDOQ
|
||||
10.https://labs.k7computing.com/index.php/lazarus-apts-operation-interception-uses-signedbinary/
|
||||
11.https://mp.weixin.qq.com/s/1pHp4WywrDnNcVBio8lq8w
|
||||
12.https://www.trellix.com/en-us/about/newsroom/stories/research/prime-ministers-officecompromised.html
|
||||
13.https://www.cisa.gov/uscert/ncas/alerts/aa22-047a
|
||||
14.https://blog.sekoia.io/turla-new-phishing-campaign-eastern-europe/
|
||||
15.https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/stonefly-north-koreaespionage
|
||||
16.https://www.microsoft.com/en-us/security/blog/2022/09/29/zinc-weaponizing-open-sourcesoftware/
|
||||
17.https://www.zscaler.com/blogs/security-research/new-espionage-attack-molerats-apttargeting-users-middle-east
|
||||
18.https://www.cnnindonesia.com/teknologi/20220120191930-185-749298/ahli-sebut-gengransomware-conti-yang-bobol-bi-peretas-berbahaya
|
||||
19.https://asec.ahnlab.com/en/38993/
|
||||
20.https://mp.weixin.qq.com/s/QkKrxXbz3rHveokjwEoW-w
|
||||
21.https://mp.weixin.qq.com/s/nnLqUBPX8xZ3hCr5u-iSjQ
|
||||
22.https://securelist.com/bluenoroff-methods-bypass-motw/108383/
|
||||
23.https://mp.weixin.qq.com/s/Xs54_RDKU5MvkvsPPCGKEw
|
||||
24.https://www.proofpoint.com/us/blog/threat-insight/buy-sell-steal-evilnum-targetscryptocurrency-forex-commodities
|
||||
25.https://mp.weixin.qq.com/s/1KIFSc3R5WrMklidXWSBaw
|
||||
26.https://asec.ahnlab.com/en/44680/
|
||||
27.https://mp.weixin.qq.com/s/PTWzKIPsO92XCP4-pXRDgg
|
||||
28.https://blog.google/threat-analysis-group/countering-threats-north-korea/
|
||||
29.https://twitter.com/ESETresearch/status/1559553324998955010
|
||||
30.https://labs.k7computing.com/index.php/lazarus-apts-operation-interception-uses-signedbinary/
|
||||
31.https://www.welivesecurity.com/2022/12/07/fantasy-new-agrius-wiper-supply-chain-attack/
|
||||
32.https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/
|
||||
33.https://unit42.paloaltonetworks.com/trident-ursa/
|
||||
34.https://www.zscaler.com/blogs/security-research/lyceum-net-dns-backdoor
|
||||
35.https://ti.qianxin.com/blog/articles/king-of-phishing-analysis-of-kimsuky's-recent-spearphishing-attacks-targeting-south-korea-with-multiple-topics
|
||||
36.https://ti.qianxin.com/blog/articles/spikes-from-the-kimsuky-organization-targeted-killing-ofsouth-korea-with-multiple-assault-weapons/
|
||||
37.https://ti.qianxin.com/blog/articles/the-tiger-of-the-forest-entrenched-on-foyan-mountain/
|
||||
38.https://cluster25.io/2022/01/03/konni-targets-the-russian-diplomatic-sector/
|
||||
39.https://mp.weixin.qq.com/s/GPpOF-SSJbVR3ZHsx8eXgA
|
||||
40.https://www.malwarebytes.com/blog/threat-intelligence/2022/01/north-koreas-lazarus-aptleverages-windows-update-client-github-in-latest-campaign
|
||||
41.https://asec.ahnlab.com/en/31089/
|
||||
42.https://blog.alyac.co.kr/4501
|
||||
43.https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/suspected-darkhotel-aptactivity-update.html
|
||||
44.https://asec.ahnlab.com/en/32958/
|
||||
45.https://securelist.com/lazarus-trojanized-defi-app/106195/
|
||||
46.https://ti.qianxin.com/blog/articles/analysis-of-the-lazarus-group-attacks-on-koreancompanies/
|
||||
47.https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lazarus-dream-jobchemical
|
||||
48.https://www.cisa.gov/uscert/ncas/alerts/aa22-108a
|
||||
49.https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/stonefly-north-koreaespionage
|
||||
50.https://ti.qianxin.com/blog/articles/lazarus-armory-update-analysis-of-recent-andarielattacks/
|
||||
51.https://research.nccgroup.com/2022/05/05/north-koreas-lazarus-and-their-initial-access-tradecraft-using-social-media-and-social-engineering/
|
||||
52.https://asec.ahnlab.com/en/34461/
|
||||
53.https://asec.ahnlab.com/en/34694/
|
||||
54.https://asec.ahnlab.com/ko/34883/
|
||||
55.https://mp.weixin.qq.com/s/ZV8AOTd7YGUgCTTTZtTktQ
|
||||
56.https://blogs.jpcert.or.jp/en/2022/07/yamabot.html
|
||||
57.https://mp.weixin.qq.com/s/USitU4jAg9y2XkQxbwcAPQ
|
||||
58.https://www.securonix.com/blog/stiffbizon-detection-new-attack-campaign-observed/
|
||||
59.https://www.volexity.com/blog/2022/07/28/sharptongue-deploys-clever-mail-stealing-browserextension-sharpext/
|
||||
60.https://securelist.com/andariel-deploys-dtrack-and-maui-ransomware/107063/
|
||||
61.https://mp.weixin.qq.com/s/R8fvBQDHrTA5-VnKINO5Wg
|
||||
62.https://securelist.com/kimsukys-golddragon-cluster-and-its-c2-operations/107258/
|
||||
63.https://blog.alyac.co.kr/4892
|
||||
64.https://blog.talosintelligence.com/2022/09/lazarus-magicrat.html
|
||||
65.https://blog.talosintelligence.com/2022/09/lazarus-three-rats.html
|
||||
66.https://mp.weixin.qq.com/s/MElSffbcrQkBYdVKo3hzFg
|
||||
67.https://www.welivesecurity.com/2022/09/30/amazon-themed-campaigns-lazarus-netherlandsbelgium/
|
||||
68.https://asec.ahnlab.com/en/40830/
|
||||
69.https://ti.qianxin.com/blog/articles/job-hunting-trap-analysis-of-lazarus-attack-activitiesusing-recruitment-information-such-as-mizuho-bank-of-japan-as-bait/
|
||||
70.https://mp.weixin.qq.com/s/OaECtSaeClPzFHslN_WamA
|
||||
71.https://www.welivesecurity.com/2022/11/30/whos-swimming-south-korean-waters-meetscarcrufts-dolphin/
|
||||
72.https://www.volexity.com/blog/2022/12/01/buyer-beware-fake-cryptocurrency-applicationsserving-as-front-for-applejeus-malware/
|
||||
73.https://blog.google/threat-analysis-group/internet-explorer-0-day-exploited-by-north-koreanactor-apt37/
|
||||
74.https://slowmist.medium.com/slowmist-our-in-depth-investigation-of-north-korean-apts-largescale-phishing-attack-on-nft-users-362117600519
|
||||
75.https://www.netskope.com/blog/abusing-microsoft-office-using-malicious-web-archive-files
|
||||
76.https://ti.qianxin.com/blog/articles/Samples-of-the-OceanLotus-attack-using-the-Glitchplatform/
|
||||
77.https://mp.weixin.qq.com/s/5gXllrE1srnHtaFCc-86GA
|
||||
78.https://mp.weixin.qq.com/s/tBQSbv55lJUipaPWFr1fKw
|
||||
79.https://mp.weixin.qq.com/s/Ah3pFjYk5AOvKvZPwXod6g
|
||||
80.https://mp.weixin.qq.com/s/U9LIfVVP5kHBFFt0LN0Q-A
|
||||
81.https://mp.weixin.qq.com/s/u2iEmGMi-SN2G-Isnp2pdg
|
||||
82.https://mp.weixin.qq.com/s/LkiNNIx5-FlBO8YY4FxzZw
|
||||
83.https://mp.weixin.qq.com/s/v2wiJe-YPG0ng87ffBB9FQ
|
||||
84.https://mp.weixin.qq.com/s/NLe4JqmjiB58IQ5Kn6DSLQ
|
||||
85.https://blog.malwarebytes.com/threat-intelligence/2022/01/patchwork-apt-caught-in-its-ownweb/
|
||||
86.https://mp.weixin.qq.com/s/ZNhdLN_AgGfjdk8nG8kLmw
|
||||
87.https://mp.weixin.qq.com/s/T1-JbC9FsVV2UNnusYPJbw
|
||||
88.https://www.welivesecurity.com/2022/01/18/donot-go-do-not-respawn/
|
||||
89.https://mp.weixin.qq.com/s/UcAJRnZVG1hrv4VQTp4A5g
|
||||
90.https://mp.weixin.qq.com/s/epRGn7Tnzx6rXihYXIpIIg
|
||||
91.https://mp.weixin.qq.com/s/olI67y-qKpDfLGZTOIWXqw
|
||||
92.http://blog.nsfocus.net/apt-sidewinder-20220218/
|
||||
93.https://ti.dbappsecurity.com.cn/blog/articles/2022/03/11/bitter-nepal-army-day/
|
||||
94.https://blog.talosintelligence.com/2022/03/transparent-tribe-new-campaign.html
|
||||
95.https://ti.dbappsecurity.com.cn/blog/articles/2022/04/24/bitter-attack-bd/V
|
||||
96.https://mp.weixin.qq.com/s/xRumzCNzQ857I7VDg57mBg
|
||||
97.https://mp.weixin.qq.com/s/_KQJH2_VIjoBp2Msh71odg
|
||||
98.https://blog.talosintelligence.com/2022/05/bitter-apt-adds-bangladesh-to-their.html
|
||||
99.https://mp.weixin.qq.com/s/qsGxZIiTsuI7o-_XmiHLHg
|
||||
100.https://blog.group-ib.com/sidewinder-antibot
|
||||
101.https://mp.weixin.qq.com/s/PxFybr0SmA-lymDQ_L5W-Q
|
||||
102.https://mp.weixin.qq.com/s/8j_rHA7gdMxY1_X8alj8Zg
|
||||
103.https://mp.weixin.qq.com/s/YKSedzm7haO0vPttIqsUAQ
|
||||
104.https://it.rising.com.cn/anquan/19904.html
|
||||
105.https://www.secuinfra.com/en/techtalk/whatever-floats-your-boat-bitter-apt-continues-totarget-bangladesh/
|
||||
106.https://mp.weixin.qq.com/s/wqcBiOYqPOLlOI6owyHxEw
|
||||
107.https://blog.talosintelligence.com/2022/07/transparent-tribe-targets-education.html
|
||||
108.https://blog.checkpoint.com/2022/07/13/a-hit-is-made-suspected-india-based-sidewinderapt-successfully-cyber-attacks-pakistan-military-focused-targets/
|
||||
109.https://mp.weixin.qq.com/s/U7RiFIlyLGo0aTYttvPQfg
|
||||
110.https://blog.morphisec.com/apt-c-35-new-windows-framework-revealed
|
||||
111.https://paper.seebug.org/1943/#1
|
||||
112.https://mp.weixin.qq.com/s/YB32toWJWdiTBpnSnuypJA
|
||||
113.https://mp.weixin.qq.com/s/IZNl6N2K1LUU7e1hT4JeYw
|
||||
114.https://mp.weixin.qq.com/s/heWhL6ev_pigAF_HMR4oLQ
|
||||
115.https://www.zscaler.com/blogs/security-research/warhawk-new-backdoor-arsenalsidewinder-apt-group-0
|
||||
116.https://mp.weixin.qq.com/s/XMrWLx6KVeoDQ7WzvOcwqA
|
||||
117.https://mp.weixin.qq.com/s/IwcxY3TqkmyY-pBxnXuM1A
|
||||
118.https://mp.weixin.qq.com/s/BXjZ6fEgNmLY_l8cZt1FXQ
|
||||
119.https://www.a.com/blogs/security-research/apt-36-uses-new-ttps-and-new-tools-targetindian-governmental-organizations
|
||||
120.https://mp.weixin.qq.com/s/LOZTOz4Lo6cOpeD4mMC29g
|
||||
121.https://mp.weixin.qq.com/s/NOpFJx4LnMOWhTm0iluFfw
|
||||
122.https://www.securonix.com/blog/new-steppykavach-attack-campaign/
|
||||
123.https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/prime-ministers-officecompromised.html
|
||||
124.https://www.crowdstrike.com/blog/observations-from-the-stellarparticle-campaign/
|
||||
125.https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/shuckwormgamaredon-espionage-ukraine
|
||||
126.https://www.microsoft.com/security/blog/2022/02/04/actinium-targets-ukrainianorganizations/
|
||||
127.http://blog.nsfocus.net/apt-lorec53-20220216/
|
||||
128.https://www.cisa.gov/uscert/ncas/alerts/aa22-047a
|
||||
129.https://www.cisa.gov/uscert/ncas/alerts/aa22-054a
|
||||
130.https://unit42.paloaltonetworks.com/ukraine-targeted-outsteel-saintbot/
|
||||
131.https://mp.weixin.qq.com/s/j2w_cZgprGsM0zTQ5ngEWA
|
||||
132.https://mp.weixin.qq.com/s/_3DPj9N3nLhDqlWrqsUcfw
|
||||
133.https://lab52.io/blog/looking-for-penquins-in-the-wild/
|
||||
134.https://www.proofpoint.com/us/blog/threat-insight/asylum-ambuscade-state-actor-usescompromised-private-ukrainian-military-emails
|
||||
135.https://ti.qianxin.com/blog/articles/Analysis-of-attack-activities-of-suspectedaptorganization-unc1151-against-ukraine-and-other-countries/
|
||||
136.https://mp.weixin.qq.com/s/YsyeLQDR_LQLfKhigSm2_Q
|
||||
137.https://securityaffairs.co/wordpress/129337/apt/invisimole-targets-ukraine-government.html
|
||||
138.https://www.malwarebytes.com/blog/threat-intelligence/2022/04/new-uac-0056-activitytheres-a-go-elephant-in-the-room
|
||||
139.https://cert.gov.ua/article/39138
|
||||
140.https://inquest.net/blog/2022/04/18/nobelium-israeli-embassy-maldoc
|
||||
141.https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/shuckwormintense-campaign-ukraine
|
||||
142.https://businessinsights.bitdefender.com/deep-dive-into-the-elephant-framework-a-newcyber-threat-in-ukraine
|
||||
143.https://www.mandiant.com/resources/blog/tracking-apt29-phishing-campaigns
|
||||
144.https://cert.gov.ua/article/40102
|
||||
145.https://mp.weixin.qq.com/s/bIXX0hUITaPkeJ6yf0yWPw
|
||||
146.https://cluster25.io/2022/05/13/cozy-smuggled-into-the-box/
|
||||
147.https://www.welivesecurity.com/2022/05/20/sandworm-ukraine-new-version-arguepatchmalware-loader/
|
||||
148.https://mp.weixin.qq.com/s/a94G-QVTGbIc8vu9yL_nww
|
||||
149.https://mp.weixin.qq.com/s/gJFSlpIlbaI11lcClNN_Xw
|
||||
150.https://www.malwarebytes.com/blog/threat-intelligence/2022/06/russias-apt28-uses-fear-ofnuclear-war-to-spread-follina-docs-in-ukraine
|
||||
151.https://inquest.net/blog/2022/06/27/glowsand
|
||||
152.https://blog.malwarebytes.com/threat-intelligence/2022/07/cobalt-strikes-again-uac-0056-
|
||||
continues-to-target-ukraine-in-its-latest-campaign/
|
||||
153.https://ti.qianxin.com/blog/articles/analysis-of-apt29's-attack-activities-against-italy/
|
||||
154.https://blog.google/threat-analysis-group/continued-cyber-activity-in-eastern-europeobserved-by-tag/
|
||||
155.http://blog.nsfocus.net/gamaredon/
|
||||
156.https://www.mandiant.com/resources/apt29-continues-targeting-microsoft
|
||||
157.https://blog.talosintelligence.com/2022/09/gamaredon-apt-targets-ukrainian-agencies.html
|
||||
158.https://www.recordedfuture.com/russia-nexus-uac-0113-emulating-telecommunicationproviders-in-ukraine
|
||||
159.https://blog.cluster25.duskrise.com/2022/09/23/in-the-footsteps-of-the-fancy-bearpowerpoint-graphite/
|
||||
160.https://www.bleepingcomputer.com/news/security/new-ransomware-attacks-in-ukrainelinked-to-russian-sandworm-hackers/
|
||||
161.https://www.cyberscoop.com/apt28-fancy-bear-satellite/
|
||||
162.https://unit42.paloaltonetworks
|
||||
163.https://www.cybercom.mil/Media/News/Article/2897570/iranian-intel-cyber-suite-ofmalware-uses-open-source-tools/
|
||||
164.https://ti.qianxin.com/blog/articles/promethium-attack-activity-analysis-disguised-as-Winrar.
|
||||
exe/
|
||||
165.https://ti.qianxin.com/blog/articles/the-lyceum-organization-uses-military-hotspot-events-asbait-to-target-targeted-attacks-on-the-middle-east/
|
||||
166.https://research.checkpoint.com/2022/apt35-exploits-log4j-vulnerability-to-distribute-newmodular-powershell-toolkit/
|
||||
167.https://www.sentinelone.com/labs/wading-through-muddy-waters-recent-activity-of-aniranian-state-sponsored-threat-actor/
|
||||
168.https://ti.qianxin.com/blog/articles/Summary-of-MuddyWater's-recent-attack-activity/
|
||||
169.https://team-cymru.com/blog/2022/01/26/analysis-of-a-management-ip-address-linked-tomolerats-apt/
|
||||
170.https://blog.talosintelligence.com/2022/01/iranian-apt-muddywater-targets-turkey.html
|
||||
171.https://www.cybereason.com/blog/research/powerless-trojan-iranian-apt-phosphorus-addsnew-powershell-backdoor-for-espionage
|
||||
172.https://blog.talosintelligence.com/2022/02/arid-viper-targets-palestine.html
|
||||
173.https://www.proofpoint.com/us/blog/threat-insight/ugg-boots-4-sale-tale-palestinianaligned-espionage
|
||||
174.https://mp.weixin.qq.com/s/_BQzqAjroi7TBxmT191Vjg
|
||||
175.https://www.mandiant.com/resources/blog/telegram-malware-iranian-espionage
|
||||
176.https://www.cisa.gov/uscert/sites/default/files/publications/AA22-055A_Iranian_GovernmentSponsored_Actors_Conduct_Cyber_Operations.pdf
|
||||
177.https://blog.talosintelligence.com/2022/03/iranian-supergroup-muddywater.html
|
||||
178.https://thedfirreport.com/2022/03/21/apt35-automates-initial-access-using-proxyshell/
|
||||
179.https://blog.morphisec.com/vmware-identity-manager-attack-backdoor
|
||||
180.https://www.cybereason.com/blog/operation-bearded-barbie-apt-c-23-campaign-targetingisraeli-officials
|
||||
181.https://www.malwarebytes.com/blog/threat-intelligence/2022/05/apt34-targets-jordangovernment-using-new-saitama-backdoor
|
||||
182.https://mp.weixin.qq.com/s/yjcCYJNUQq6smc3YsBmYhA
|
||||
183.https://mp.weixin.qq.com/s/WBCGGLog3IwJhXZmbjxoTQ
|
||||
184.https://lab52.io/blog/muddywaters-light-first-stager-targetting-middle-east/
|
||||
185.https://mp.weixin.qq.com/s/1uJaPS-nuGNI8lQ1-ZekIA
|
||||
186.https://www.avertium.com/resources/threat-reports/in-depth-look-at-apt35-aka-charmingkitten
|
||||
187.https://www.deepinstinct.com/blog/new-muddywater-threat-old-kitten-new-tricks
|
||||
188.https://securityintelligence.com/posts/hive00117-fileless-malware-delivery-eastern-europe/
|
||||
189.https://mp.weixin.qq.com/s/eyIfchJVi9kJq_the8TIBQ
|
||||
190.https://www.microsoft.com/security/blog/2022/07/27/untangling-knotweed-europeanprivate-sector-offensive-actor-using-0-day-exploits/
|
||||
191.https://mp.weixin.qq.com/s/mstwBMkS0G3Et4GOji2mwA
|
||||
192.https://www.mandiant.com/resources/blog/suspected-iranian-actor-targeting-israeli-shipping
|
||||
193.http://blog.nsfocus.net/murenshark/
|
||||
194.https://www.mandiant.com/resources/blog/dprk-whatsapp-phishing
|
||||
195.https://www.sentinelone.com/labs/the-mystery-of-metador-an-unattributed-threat-hiding-intelcos-isps-and-universities/
|
||||
196.https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/witchettysteganography-espionage
|
||||
197.https://www.mandiant.com/resources/blog/trojanized-windows-installers-ukrainiangovernment
|
||||
198.https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/
|
||||
view#gid=0
|
||||
199.https://www.volexity.com/blog/2022/06/15/driftingcloud-zero-day-sophos-firewallexploitation-and-an-insidious-breach/
|
||||
200.https://decoded.avast.io/janvojtesek/the-return-of-candiru-zero-days-in-the-middle-east/
|
||||
201.https://www.ncsgroup.vn/blog/warning-new-attack-campaign-utilized-a-new-0day-rcevulnerability-on-microsoft-exchange-server-12715.html
|
||||
202.https://mp.weixin.qq.com/s/VeyE0LVqWXsQ2slahU5AWQ
|
||||
203.https://ti.qianxin.com/blog/articles/operation-dragon-breath-(apt-q-27)-dimensionalityreduction-blow-to-the-gambling-industry/
|
||||
|
||||
Reference in New Issue
Block a user