From 4c0ad845dd15593e45db9db3a777f8781a278d8c Mon Sep 17 00:00:00 2001 From: blackorbird <137812951@qq.com> Date: Mon, 8 Apr 2019 15:49:28 +0800 Subject: [PATCH 1/3] Update and rename REALTED_REPORT.org to README.org --- APT28/{REALTED_REPORT.org => README.org} | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) rename APT28/{REALTED_REPORT.org => README.org} (94%) diff --git a/APT28/REALTED_REPORT.org b/APT28/README.org similarity index 94% rename from APT28/REALTED_REPORT.org rename to APT28/README.org index c166d51..1165c94 100644 --- a/APT28/REALTED_REPORT.org +++ b/APT28/README.org @@ -1,3 +1,5 @@ +RELATED REPORT + https://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-full.pdf https://www.welivesecurity.com/2017/05/09/sednit-adds-two-zero-day-exploits-using-trumps-attack-syria-decoy/ https://www.emanueledelucia.net/apt28-targeting-military-institutions/ @@ -9,4 +11,4 @@ https://blog.trendmicro.co.jp/archives/19829 https://www.welivesecurity.com/2018/11/20/sednit-whats-going-zebrocy/ https://twitter.com/DrunkBinary https://github.com/williballenthin/idawilli/blob/master/scripts/yara_fn/yara_fn.py -https://twitter.com/r0ny_123 \ No newline at end of file +https://twitter.com/r0ny_123 From 01aa1e4a895c5669431137af74a5ac7e8d43ce04 Mon Sep 17 00:00:00 2001 From: blackorbird <137812951@qq.com> Date: Mon, 8 Apr 2019 15:52:18 +0800 Subject: [PATCH 2/3] Update README.org --- APT28/README.org | 25 ++++++++++++------------- 1 file changed, 12 insertions(+), 13 deletions(-) diff --git a/APT28/README.org b/APT28/README.org index 1165c94..a74e606 100644 --- a/APT28/README.org +++ b/APT28/README.org @@ -1,14 +1,13 @@ -RELATED REPORT +### RELATED REPORT + +[1] https://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-full.pdf +[2] https://www.welivesecurity.com/2017/05/09/sednit-adds-two-zero-day-exploits-using-trumps-attack-syria-decoy/ +[3] https://www.emanueledelucia.net/apt28-targeting-military-institutions/ +[4] https://www.emanueledelucia.net/apt28-sofacy-seduploader-under-the-christmas-tree/ +[5] https://unit42.paloaltonetworks.com/unit42-sofacy-continues-global-attacks-wheels-new-cannon-trojan/ +[6] https://unit42.paloaltonetworks.com/dear-joohn-sofacy-groups-global-campaign/ +[7] https://unit42.paloaltonetworks.com/sofacy-creates-new-go-variant-of-zebrocy-tool/ +[8] https://blog.trendmicro.co.jp/archives/19829 +[9] https://www.welivesecurity.com/2018/11/20/sednit-whats-going-zebrocy/ + -https://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-full.pdf -https://www.welivesecurity.com/2017/05/09/sednit-adds-two-zero-day-exploits-using-trumps-attack-syria-decoy/ -https://www.emanueledelucia.net/apt28-targeting-military-institutions/ -https://www.emanueledelucia.net/apt28-sofacy-seduploader-under-the-christmas-tree/ -https://unit42.paloaltonetworks.com/unit42-sofacy-continues-global-attacks-wheels-new-cannon-trojan/ -https://unit42.paloaltonetworks.com/dear-joohn-sofacy-groups-global-campaign/ -https://unit42.paloaltonetworks.com/sofacy-creates-new-go-variant-of-zebrocy-tool/ -https://blog.trendmicro.co.jp/archives/19829 -https://www.welivesecurity.com/2018/11/20/sednit-whats-going-zebrocy/ -https://twitter.com/DrunkBinary -https://github.com/williballenthin/idawilli/blob/master/scripts/yara_fn/yara_fn.py -https://twitter.com/r0ny_123 From 3bc197d33f7c541e801496834b53dd803872ba19 Mon Sep 17 00:00:00 2001 From: blackorbird <137812951@qq.com> Date: Mon, 8 Apr 2019 15:52:42 +0800 Subject: [PATCH 3/3] Update and rename README.org to README.MD --- APT28/{README.org => README.MD} | 9 +++++++++ 1 file changed, 9 insertions(+) rename APT28/{README.org => README.MD} (98%) diff --git a/APT28/README.org b/APT28/README.MD similarity index 98% rename from APT28/README.org rename to APT28/README.MD index a74e606..525d991 100644 --- a/APT28/README.org +++ b/APT28/README.MD @@ -1,13 +1,22 @@ ### RELATED REPORT [1] https://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-full.pdf + [2] https://www.welivesecurity.com/2017/05/09/sednit-adds-two-zero-day-exploits-using-trumps-attack-syria-decoy/ + [3] https://www.emanueledelucia.net/apt28-targeting-military-institutions/ + [4] https://www.emanueledelucia.net/apt28-sofacy-seduploader-under-the-christmas-tree/ + [5] https://unit42.paloaltonetworks.com/unit42-sofacy-continues-global-attacks-wheels-new-cannon-trojan/ + [6] https://unit42.paloaltonetworks.com/dear-joohn-sofacy-groups-global-campaign/ + [7] https://unit42.paloaltonetworks.com/sofacy-creates-new-go-variant-of-zebrocy-tool/ + [8] https://blog.trendmicro.co.jp/archives/19829 + [9] https://www.welivesecurity.com/2018/11/20/sednit-whats-going-zebrocy/ +