Update readme.md
This commit is contained in:
@@ -1,3 +1,146 @@
|
||||
2024 MID OF YEAR
|
||||
|
||||
[1]https://mp.weixin.qq.com/s/Mflg1NZVrHC6JuVm0rW6GQ
|
||||
[2]https://asec.ahnlab.com/ko/62771/
|
||||
[3]https://asec.ahnlab.com/ko/65495/
|
||||
[4]https://mp.weixin.qq.com/s/84lUaNSGo4lhQlpnCVUHfQ
|
||||
[5]https://www.chainalysis.com/blog/2024-crypto-money-laundering/
|
||||
[6]https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-rootkit-beyond-byovd-with-an-admin-to-kernel-zero-day/
|
||||
[7]https://decoded.avast.io/luiginocamastra/from-byovd-to-a-0-day-unveiling-advanced-exploits-in-cyber-recruiting-scams/
|
||||
[8]https://mp.weixin.qq.com/s/kKNkTAlUpLL2skXq3TcBfw
|
||||
[9]https://asec.ahnlab.com/ko/61666/
|
||||
[10]https://asec.ahnlab.com/ko/62117/
|
||||
[11]https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/springtail-kimsuky-backdoor-espionage
|
||||
[12]https://mp.weixin.qq.com/s/Pog2WXQ8uZTTZKybJFy1Ow
|
||||
[13]https://mp.weixin.qq.com/s/YhaEq6ogz3p5OQO_PyI-OQ
|
||||
[14]https://www.securonix.com/blog/securonix-threat-research-security-advisory-new-deepgosu-attack-campaign/
|
||||
[15]https://www.genians.co.kr/blog/threat_intelligence/dropbox
|
||||
[16]https://mp.weixin.qq.com/s/7vnxz8dYmWf7Z8Cmaa8sVg
|
||||
[17]https://www.kroll.com/en/insights/publications/cyber/screenconnect-vulnerability-exploited-to-deploy-babyshark
|
||||
[18]https://www.genians.co.kr/blog/threat_intelligence/webinar-apt
|
||||
[19]https://www.sentinelone.com/labs/a-glimpse-into-future-scarcruft-campaigns-attackers-gather-strategic-intelligence-and-target-cybersecurity-professionals/
|
||||
[20]https://mp.weixin.qq.com/s/yzd0aVq2wzi-v-eB73F6lQ
|
||||
[21]https://mp.weixin.qq.com/s/BOTyH6YTmVzhVInhTlzXww
|
||||
[22]https://mp.weixin.qq.com/s/JBX6AGPPGEPzo4SqcN9n9A
|
||||
[23]https://mp.weixin.qq.com/s/3GhWv3wsiAIZTClDBJxG-g
|
||||
[24]https://mp.weixin.qq.com/s/K-FUaffQx4g6d_hweXxCTg
|
||||
[25]https://www.nextron-systems.com/2024/03/22/unveiling-kamikakabot-malware-analysis/
|
||||
[26]https://www.group-ib.com/blog/dark-pink-apt/
|
||||
[27]https://mp.weixin.qq.com/s/eFxoX3cwpPee5z2_3G3wXw
|
||||
[28]https://mp.weixin.qq.com/s/_gBnAlghd3gbP-PQ5M-7yQ
|
||||
[29]https://mp.weixin.qq.com/s/wR7IgBmEuqqGQ9SCAV39Uw
|
||||
[30]https://www.welivesecurity.com/en/eset-research/vajraspy-patchwork-espionage-apps/
|
||||
[31]https://mp.weixin.qq.com/s/SAt5NU-hCbS0D6jI8gkkFQ
|
||||
[32]https://mp.weixin.qq.com/s/I_s5HrRWdbTW99B99udl1w
|
||||
[33]https://mp.weixin.qq.com/s/ENDm2bVzw89TlkljZYFdbw
|
||||
[34]https://www.sentinelone.com/labs/capratube-remix-transparent-tribes-android-spyware-targeting-gamers-weapons-enthusiasts/
|
||||
[35]https://mp.weixin.qq.com/s/NBFwjxnm2yIwPfMn87vbRQ
|
||||
[36]https://blogs.blackberry.com/en/2024/05/transparent-tribe-targets-indian-government-defense-and-aerospace-sectors
|
||||
[37]https://mp.weixin.qq.com/s/FT7xvyGdk-WaB9nfYWPMUg
|
||||
[38]https://www.seqrite.com/blog/pakistani-apts-escalate-attacks-on-indian-gov-seqrite-labs-unveils-threats-and-connections/
|
||||
[39]https://cyble.com/blog/the-overlapping-cyber-strategies-of-transparent-tribe-and-sidecopy-against-india/
|
||||
[40]https://mp.weixin.qq.com/s/Uf708Khax2rJaUhNo1Mz1Q
|
||||
[41]https://www.trendmicro.com/en_us/research/24/a/pawn-storm-uses-brute-force-and-stealth.html
|
||||
[42]https://www.microsoft.com/en-us/security/blog/2024/04/22/analyzing-forest-blizzards-custom-post-compromise-tool-for-exploiting-cve-2022-38028-to-obtain-credentials/
|
||||
[43]https://go.recordedfuture.com/hubfs/reports/CTA-RU-2024-0530.pdf
|
||||
[44]https://www.trendmicro.com/en_us/research/24/e/router-roulette.html
|
||||
[45]https://www.ic3.gov/Media/News/2024/240227.pdf
|
||||
[46]https://www.clearskysec.com/wp-content/uploads/2024/02/DoppelgangerNG_ClearSky.pdf
|
||||
[47]https://securityintelligence.com/x-force/itg05-leverages-malware-arsenal/
|
||||
[48]https://cert.pl/posts/2024/05/apt28-kampania/
|
||||
[49]https://labs.withsecure.com/publications/kapeka
|
||||
[50]https://www.sentinelone.com/labs/acidpour-new-embedded-wiper-variant-of-acidrain-appears-in-ukraine/
|
||||
[51]https://cert.gov.ua/article/6278706
|
||||
[52]https://cloud.google.com/blog/topics/threat-intelligence/apt44-unearthing-sandworm
|
||||
[53]https://blog.talosintelligence.com/tinyturla-ng-tooling-and-c2/
|
||||
[54]https://blog.talosintelligence.com/tinyturla-full-kill-chain/
|
||||
[55]https://www.welivesecurity.com/en/eset-research/moon-backdoors-lunar-landing-diplomatic-missions/
|
||||
[56]https://www.mandiant.com/resources/blog/apt29-wineloader-german-political-parties
|
||||
[57]https://blogs.blackberry.com/en/2024/04/fin7-targets-the-united-states-automotive-industry
|
||||
[58]https://www.esentire.com/blog/fin7-uses-trusted-brands-and-sponsored-google-ads-to-distribute-msix-payloads
|
||||
[59]https://www.microsoft.com/en-us/security/blog/2024/01/17/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs/
|
||||
[60]https://www.deepinstinct.com/blog/muddyc2go-latest-c2-framework-used-by-iranian-apt-muddywater-spotted-in-israel
|
||||
[61]https://www.deepinstinct.com/blog/darkbeatc2-the-latest-muddywater-attack-framework
|
||||
[62]https://harfanglab.io/en/insidethelab/muddywater-rmm-campaign/
|
||||
[63]https://x.com/MsftSecIntel/status/1737895717870440609
|
||||
[64]https://www.nextron-systems.com/2024/01/29/analysis-of-falsefont-backdoor-used-by-peach-sandstorm-threat-actor/
|
||||
[65]https://unit42.paloaltonetworks.com/curious-serpens-falsefont-backdoor/#post-133071-_re5lfhtpycch
|
||||
[66]https://www.welivesecurity.com/en/eset-research/arid-viper-poisons-android-apps-with-aridspy/
|
||||
[67]https://www.esentire.com/blog/blind-eagles-north-american-journey
|
||||
[68]https://mp.weixin.qq.com/s/tPVw-fbu3pQvKTYMzxb4Bw
|
||||
[69]https://blog.talosintelligence.com/starry-addax/
|
||||
[70]https://blog.eclecticiq.com/operation-flightnight-indian-government-entities-and-energy-sector-targeted-by-cyber-espionage-campaign
|
||||
[71]https://www.huntandhackett.com/blog/turkish-espionage-campaigns
|
||||
[72]https://arcticwolf.com/resources/blog/follow-on-extortion-campaign-targeting-victims-of-akira-and-royal-ransomware/
|
||||
[73]https://www.securonix.com/blog/securonix-threat-research-security-advisory-new-returgence-attack-campaign-turkish-hackers-target-mssql-servers-to-deliver-domain-wide-mimic-ransomware/
|
||||
[74]https://blog.talosintelligence.com/decryptor-babuk-tortilla/
|
||||
[75]https://unit42.paloaltonetworks.com/medusa-ransomware-escalation-new-leak-site/
|
||||
[76]https://asec.ahnlab.com/en/60440/
|
||||
[77]https://mp.weixin.qq.com/s/Css8y2rPykyNPrLkJNq9ig
|
||||
[78]https://asec.ahnlab.com/ko/60744/
|
||||
[79]https://mp.weixin.qq.com/s/XV0x10YV-Wrs1ZI6tNHjLA
|
||||
[80]https://www.trendmicro.com/en_us/research/24/a/kasseika-ransomware-deploys-byovd-attacks-abuses-psexec-and-expl.html
|
||||
[81]https://www.fortinet.com/blog/threat-research/phobos-ransomware-variant-launches-attack-faust
|
||||
[82]https://www.fortinet.com/blog/threat-research/ransomware-roundup-albabat
|
||||
[83]https://blog.morphisec.com/akira-ransomware-prevention-and-analysis
|
||||
[84]https://www.fortinet.com/blog/threat-research/ransomware-roundup-abyss-locker
|
||||
[85]https://www.trendmicro.com/en_us/research/24/b/threat-actor-groups-including-black-basta-are-exploiting-recent-.html
|
||||
[86]https://www.trendmicro.com/en_us/research/24/c/multistage-ra-world-ransomware.html
|
||||
[87]https://blog.talosintelligence.com/ghostsec-ghostlocker2-ransomware/
|
||||
[88]https://www.facct.ru/blog/shadow-ransomware/
|
||||
[89]https://medium.com/@Intel_Ops/phobos-ransomware-analysing-associated-infrastructure-used-by-8base-646560302a8d
|
||||
[90]https://mp.weixin.qq.com/s/8dIxwYN3v4U7y9IECPxa7g
|
||||
[91]https://mp.weixin.qq.com/s/fxYSDH9NrcRkE_QFgHVIiw
|
||||
[92]https://blog.sonicwall.com/en-us/2024/03/new-multi-stage-stopcrypt-ransomware/
|
||||
[93]https://www.trendmicro.com/en_us/research/24/c/teamcity-vulnerability-exploits-lead-to-jasmin-ransomware.html
|
||||
[94]https://cert.360.cn/report/detail?id=65fceeb4c09f255b91b17f11
|
||||
[95]https://www.trendmicro.com/en_us/research/24/c/agenda-ransomware-propagates-to-vcenters-and-esxi-via-custom-pow.html
|
||||
[96]https://mp.weixin.qq.com/s/_KuFPPs6XFOICNpRjzn5AA
|
||||
[97]https://www.stormshield.com/news/technical-analysis-of-ransomware-crypt888
|
||||
[98]https://www.netskope.com/blog/netskope-threat-coverage-evil-ant-ransomware
|
||||
[99]https://asec.ahnlab.com/ko/64345/
|
||||
[100]https://mp.weixin.qq.com/s/ewo2Lp5arhun3dM94Pcsrw
|
||||
[101]https://thedfirreport.com/2024/04/29/from-icedid-to-dagon-locker-ransomware-in-29-days/
|
||||
[102]https://cert.360.cn/report/detail?id=663c203cc09f255b91b17fd9
|
||||
[103]https://cyble.com/blog/in-the-shadow-of-venus-trinity-ransomwares-covert-ties/
|
||||
[104]https://blog.sekoia.io/mallox-ransomware-affiliate-leverages-purecrypter-in-microsoft-sql-exploitation-campaigns/
|
||||
[105]https://www.proofpoint.com/us/blog/threat-insight/security-brief-millions-messages-distribute-lockbit-black-ransomware
|
||||
[106]https://www.microsoft.com/en-us/security/blog/2024/05/15/threat-actors-misusing-quick-assist-in-social-engineering-attacks-leading-to-ransomware/
|
||||
[107]https://www.sentinelone.com/blog/ikaruz-red-team-hacktivist-group-leverages-ransomware-for-attention-not-profit/
|
||||
[108]https://securelist.com/ransomware-abuses-bitlocker/112643/
|
||||
[109]https://cyble.com/blog/ransomware-menace-amplifies-for-vulnerable-industrial-control-systems-heightened-threats-to-critical-infrastructure/
|
||||
[110]https://arcticwolf.com/resources/blog/lost-in-the-fog-a-new-ransomware-threat/
|
||||
[111]https://symantec-enterprise-blogs.security.com/threat-intelligence/ransomhub-knight-ransomware
|
||||
[112]https://www.trendmicro.com/en_us/research/24/f/targetcompany-s-linux-variant-targets-esxi-environments.html
|
||||
[113]https://www.fortinet.com/blog/threat-research/ransomware-roundup-shinra-and-limpopo-ransomware
|
||||
[114]https://www.cadosecurity.com/blog/from-dormant-to-dangerous-p2pinfect-evolves-to-deploy-new-ransomware-and-cryptominer
|
||||
[115]https://mp.weixin.qq.com/s/xXUBLE43ZZorfVd62FWm4g
|
||||
[116]https://mp.weixin.qq.com/s/-vvj2RHNNkCxruLlMpfyrA
|
||||
[117]https://mp.weixin.qq.com/s/vvvCl1yv3JF6FPXRXT5F3A
|
||||
[118]https://www.secrss.com/articles/52018
|
||||
[119]https://www.antiy.cn/research/notice&report/research_report/TrojanControl_Analysis.html
|
||||
[120]https://mp.weixin.qq.com/s/hQhAVWEykfd2bP2vTRdwsw
|
||||
[121]https://mp.weixin.qq.com/s/UZ557zX-pr428e6d4jO5jw
|
||||
[122]https://mp.weixin.qq.com/s/rHGwLo6XBGHKSObSCD3u1Q
|
||||
[123]https://cert.360.cn/report/detail?id=6603e9fec09f255b91b17f3f
|
||||
[124]https://mp.weixin.qq.com/s/ui_BU1OhIP0--FXT-b6uLg
|
||||
[125]https://www.antiy.cn/research/notice&report/research_report/SwimSnake_Analysis_202404.html
|
||||
[126]https://mp.weixin.qq.com/s/XK_UE0uLS26SB_clMqFO4w
|
||||
[127]https://mp.weixin.qq.com/s/Qe_5k8US7nyZHEHLshmlBg
|
||||
[128]https://mp.weixin.qq.com/s/TbiOIATW-Qn2uWImGoEagw
|
||||
[129]https://mp.weixin.qq.com/s/tNofW88EQAIZXjkCrjp8kw
|
||||
[130]https://mp.weixin.qq.com/s/dIuE6sXutFQ5GS5l6yMqwA
|
||||
[131]https://www.antiy.cn/research/notice&report/research_report/SwimSnake_Analysis_202406.html
|
||||
[132]https://blog.xlab.qianxin.com/unveiling-the-mystery-of-bigpanzi/
|
||||
[133]https://ti.qianxin.com/blog/articles/Analysis-of-Recent-OneinStack-Supply-Chain-Poisoning-Event-CN/
|
||||
[134]https://mp.weixin.qq.com/s/R0kn5STsiwIUhIqVRwnNxw
|
||||
[135]https://www.antiy.cn/research/notice&report/research_report/DarkMozzie.html
|
||||
[136]https://mp.weixin.qq.com/s/7h5rMLnv16uh27RoVrDmCw
|
||||
[137]https://mp.weixin.qq.com/s/MEQp4I1Ilrxf91etb0yZyQ
|
||||
[138]https://mp.weixin.qq.com/s/OheNN_iR_ATCkOkyK8FLAg
|
||||
[139]https://mp.weixin.qq.com/s/yF48xZcWb4S5aMfMchrxwg
|
||||
|
||||
|
||||
Happy New Year!
|
||||
|
||||
2023 YEAR IN REVIEW
|
||||
|
||||
Reference in New Issue
Block a user