Files
APT_REPORT/muddywater/README.MD
2019-06-11 18:19:35 +08:00

21 lines
842 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
## This report collection about member and attack technology. https://twitter.com/blackorbird
### member
Muddywaters: how MuddyWater hackers attacked a Turkish military electronics manufacturer
https://habr.com/ru/company/group-ib/blog/452540/
MUDDYWATER CYBER SPY
https://0xffff0800.blogspot.com/2019/06/a-muddywater-cyber-spy.html
### attack
MuddyWater Resurfaces, Uses Multi-Stage Backdoor POWERSTATS V3 and New Post-Exploitation Tools
https://blog.trendmicro.com/trendlabs-security-intelligence/muddywater-resurfaces-uses-multi-stage-backdoor-powerstats-v3-and-new-post-exploitation-tools/
Summary of recent attacks by MuddyWater against Tajikistan, Turkey and other places
https://mp.weixin.qq.com/s/a_LB0e4FiLFra54upu7X-Q
Iranian APT group MuddyWater Adds Exploits to Their Arsenal
https://www.clearskysec.com/muddywater2/