31.12.19 |
Microsoft sued North Korea-linked Thallium group |
APT |
Securityaffairs |
|
26.12.19 |
How Organizations Can Defend Against Advanced Persistent Threats |
APT |
Thehackernews |
|
24.12.19 |
Op Wocao – China-linked APT20 was able to bypass 2FA |
APT |
Securityaffairs |
20.12.19 |
Chinese Rancor APT Refreshes Malware Kit for Espionage Attacks |
APT |
Bleepingcomputer |
20.12.19 |
Lazarus Hackers Target Linux, Windows With New Dacls Malware |
APT
Virus |
Bleepingcomputer |
|
18.12.19 |
Gangnam Industrial Style APT campaign targets industrial firms worldwide |
APT |
Securityaffairs |
17.12.19 |
OilRig’s Poison Frog – old samples, same trick |
APT |
Securelist |
12.12.19 |
Trickbot gang and Lazarus APT, the hidden link behind an epochal phenomena |
APT |
Securityaffairs |
|
12.12.19 |
Lazarus APT Collaborates with Trickbot’s Anchor Project |
APT |
Threatpost |
|
8.12.19 |
Vietnam-linked Ocean Lotus hacked BMW and Hyundai networks |
APT |
Securityaffairs |
|
7.12.19 |
Stealthy MacOS Malware Tied to Lazarus APT |
Apple APT |
Threatpost |
|
5.12.19 |
The evolutions of APT28 attacks |
APT |
Securityaffairs |
5.12.19 |
Iran-Linked APT groups target energy, industrial sectors with ZeroCleare Wiper |
APT |
Securityaffairs |
|
4.12.19 |
Iran-Linked ZeroCleare Wiper Targets Energy, Industrial Sectors in Middle East |
APT |
Securityweek |
4.12.19 |
APT review: what the world’s threat actors got up to in 2019 |
APT |
Securelist |
28.11.19 |
RevengeHotels: cybercrime targeting hotel front desks worldwide |
APT |
Securelist |
21.11.19 |
Ransomware Gangs Adopt APT Tactics in Targeted Attacks |
APT
Ransomware |
Bleepingcomputer |
15.11.19 | |
APT |
Threatpost |
14.11.19 |
Tracking Iran-linked APT33 group via its own VPN networks |
APT |
Securityaffairs |
11.11.19 |
Platinum Cyberspies Use Sophisticated Backdoor in Attacks |
APT |
Securityweek |
10.11.19 |
New Stealthy Backdoor Used by Platinum APT in Recent Attacks |
APT |
Bleepingcomputer |
10.11.19 |
The Platinum APT group adds the Titanium backdoor to its arsenal |
APT |
Securityaffairs |
9.11.19 |
Platinum APT Shines Up New Titanium Backdoor |
APT |
Threatpost |
8.11.19 |
Titanium: the Platinum group strikes again |
APT |
Securelist |
7.11.19 |
DarkUniverse APT Stayed Hidden for 8 Years, Updated Regularly |
APT |
Bleepingcomputer |
|
7.11.19 |
DarkUniverse APT Emerges to Deliver Sophisticated, Targeted Spy Attacks |
APT |
Threatpost |
6.11.19 |
Anonymous and LulzSecITA hacked professional orders and telephone operator Lyca Mobile |
APT |
Securityaffairs |
6.11.19 |
Mysterious DarkUniverse APT remained undetected for 8 years |
APT |
Securityaffairs |
6.11.19 |
DarkUniverse APT Uses Just-in-Time Malware Creation |
APT |
Securityweek |
5.11.19 |
DarkUniverse – the mysterious APT framework #27 |
APT |
Securelist |
1.11.19 | |
APT |
Threatpost |
31.10.19 |
China-linked APT41 group targets telecommunications companies with new backdoor |
APT |
Securityaffairs |
30.10.19 | |
APT |
Threatpost |
29.10.19 | |
APT |
Threatpost |
29.10.19 |
Fancy Bear continues to target sporting and anti-doping organizations |
APT |
Securityaffairs |
|
25.10.19 |
Experts attribute NukeSped RAT to North Korea-Linked hackers |
APT
Virus |
Securityaffairs |
23.10.19 |
Experts believe the Magecart Group 5 could be linked to the Carbanak APT |
APT |
Securityaffairs |
22.10.19 |
Turla Compromises, Infiltrates Iranian APT Infrastructure |
APT |
Threatpost |
21.10.19 |
UK/US investigation revealed that Russian Turla APT masqueraded as Iranian hackers |
APT BigBrothers |
Securityaffairs |
|
19.10.19 |
Cozy Bear Russian Hackers Spotted After Staying Undetected for Years |
APT |
Bleepingcomputer |
16.10.19 |
APT trends report Q3 2019 |
APT |
Securelist |
10.10.19 |
Multiple APT groups are exploiting VPN vulnerabilities, NSA warns |
APT |
Securityaffairs |
9.10.19 | |
APT |
Threatpost |
8.10.19 | |
APT BigBrothers |
Threatpost |
7.10.19 |
Iranian Hackers Said to Target Presidential Campaign |
APT BigBrothers |
Securityweek |
6.10.19 |
Iran-linked Phosphorus group hit a 2020 presidential campaign |
APT |
Securityaffairs |
6.10.19 |
UK NCSC agency warns of APTs exploiting Enterprise VPN vulnerabilities |
APT BigBrothers |
Securityaffairs |
|
5.10.19 |
APTs Exploiting Enterprise VPN Vulnerabilities, UK Govt Warns |
APT BigBrothers
Vulnerebility |
Securityweek |
4.10.19 |
Cyber-Spy Group Active Since 2013 Now Tied to Chinese State Actor |
APT CyberSpy |
Bleepingcomputer |
4.10.19 |
6 cyber-espionage campaigns since 2013 attributed to PKPLUG China-linked group |
APT CyberSpy |
Securityaffairs |
26.9.19 |
Study shows connections between 2000 malware samples used by Russian APT groups |
APT |
Securityaffairs |
24.9.19 |
APT or not APT? What’s Behind the Aggah Campaign |
APT |
Securityaffairs |
24.9.19 |
Russian APT Map Reveals 22,000 Connections Between 2000 Malware Samples |
APT |
Thehackernews |
|
14.9.19 | |
APT
Phishing |
Threatpost |
|
14.9.19 |
The US Treasury placed sanctions on North Korea linked APT Groups |
APT |
Securityaffairs |
9.9.19 |
Symantec uncovered the link between China-Linked Thrip and Billbug groups |
APT |
Securityaffairs |
9.9.19 |
China-Linked 'Thrip' Cyberspies Continue Attacks on Southeast Asia |
APT |
Securityweek |
|
9.9.19 |
China-linked APT3 was able to modify stolen NSA cyberweapons |
APT |
Securityaffairs |
|
6.9.19 | |
APT |
Threatpost |
|
28.8.19 |
Lyceum APT made the headlines with attacks in Middle East |
APT |
Securityaffairs |
22.8.19 |
China-linked APT41 group targets US-Based Research University |
APT |
Securityaffairs |
22.8.19 |
Russian APT 'Silence' Steals $3.5 Million in One Year |
APT |
Securityweek |
21.8.19 |
Damage from Silence APT operations increases fivefold. The gang deploys new tools on its “worldwide tour” |
APT |
Securityaffairs |
|
12.8.19 |
Recent Cloud Atlas activity |
APT |
Securelist |
7.8.19 |
OilRig APT group: the evolution of attack techniques over time |
APT |
Securityaffairs |
6.8.19 |
Russian APT Abuses IoT Devices to Infiltrate Corporate Targets |
APT |
Bleepingcomputer |
6.8.19 |
The Evolution of Aggah: From Roma225 to the RG Campaign |
APT |
Securityaffairs |
6.8.19 |
Russia-linked STRONTIUM APT targets IoT devices to hack corporate networks |
APT |
Securityaffairs |
|
3.8.19 | |
APT BigBrothers |
Threatpost |
1.8.19 |
APT trends report Q2 2019 |
Analysis APT |
Securelist |
24.7.19 |
China-Linked APT15 group is using a previously undocumented backdoor |
APT |
Securityaffairs |
23.7.19 |
China-Linked Threat Actor Using New Backdoor |
APT |
Securityweek |
22.7.19 |
New APT34 campaign uses LinkedIn to deliver fresh malware |
APT |
Securityaffairs |
20.7.19 |
Iran-Linked APT34 Invites Victims to LinkedIn for Fresh Malware Infections |
APT |
Threatpost |
19.7.19 |
Ke3chang APT Linked to Previously Undocumented Backdoor |
APT |
Threatpost |
17.7.19 | |
APT
Virus |
Threatpost |
17.7.19 |
Turla APT group adds Topinambour Trojan to its arsenal |
APT |
Securityaffairs |
16.7.19 |
Bulgaria Probes Russia-Linked Leak of Taxpayer Data |
APT |
Securityweek |
16.7.19 |
Russia-linked Hackers Use New Trojans in Recent Attacks |
APT |
Securityweek |
16.7.19 | |
APT |
Threatpost |
15.7.19 |
Turla renews its arsenal with Topinambour |
APT |
Securelist |
|
5.7.19 |
Outlook Flaw Exploited by Iranian APT33, US CyberCom Issues Alert |
APT |
Bleepingcomputer |
|
5.7.19 |
‘Twas the night before |
APT |
Securelist |
|
4.7.19 |
Bangladesh Cyber Heist 2.0: Silence APT goes global |
APT |
Securityaffairs |
2.7.19 |
OceanLotus APT Uses New Ratsnif Trojan for Network Attacks |
APT |
Bleepingcomputer |
1.7.19 |
Iran-linked APT33 updates infrastructure following its public disclosure |
APT |
Securityaffairs |
27.6.19 | |
APT |
Threatpost |
27.6.19 |
Similarities and differences between MuddyWater and APT34 |
APT |
Securityaffairs |
26.6.19 |
Platinum is back |
APT |
Securelist |
25.6.19 |
Zebrocy’s Multilanguage Malware Salad |
APT |
Securelist |
|
22.6.19 |
Turla Espionage Group Hacks OilRig APT Infrastructure |
APT |
Bleepingcomputer |
21.6.19 |
Russia-Linked Turla APT group Hijacked C2 of the Iranian OilRig |
APT |
Securityaffairs |
20.6.19 |
Russia-Linked Hackers Hijack Infrastructure of Iranian Threat Group |
APT |
Securityweek |
13.6.19 |
MuddyWater Updates POWERSTATS Backdoor For Multi-Stage Attacks |
APT |
Bleepingcomputer |
11.6.19 |
MuddyWater APT group updated its multi-stage PowerShell backdoor Powerstats |
APT |
Securityaffairs |
10.6.19 |
Hunting the ICEFOG APT group after years of silence |
APT |
Securityaffairs |
9.6.19 |
The MuddyWater APT Group Adds New Tools to Their Arsenal |
APT |
Bleepingcomputer |
8.6.19 |
Hunting the ICEFOG APT group after years of silence |
APT |
Securityaffairs |
6.6.19 |
Platinum APT and leverages steganography to hide C2 communications |
APT |
Securityaffairs |
6.6.19 |
Analyzing the APT34’s Jason project |
APT |
Securityaffairs |
5.6.19 | |
APT |
Threatpost |
3.6.19 |
ESET analyzes Turla APT’s usage of weaponized PowerShell |
APT |
Securityaffairs |
1.6.19 |
Researchers Dissect PowerShell Scripts Used by Russia-Linked Hackers |
APT |
Securityweek |
31.5.19 |
Emissary Panda APT group hit Government Organizations in the Middle East |
APT |
Securityaffairs |
29.5.19 |
New APT10 Activity Detected in Southeast Asia |
APT |
Securityweek |
28.5.19 |
APT10 is back with two new loaders and new versions of known payloads |
APT |
Securityaffairs |
21.5.19 |
MuddyWater Hacking Group Upgrades Arsenal to Avoid Detection |
APT |
Bleepingcomputer |
21.5.19 |
MuddyWater BlackWater campaign used new anti-detection techniques |
APT |
Securityaffairs |
14.5.19 |
North Korea-linked ScarCruft APT adds Bluetooth Harvester to its arsenal |
APT |
Securityaffairs |
14.5.19 |
North Korea-Linked 'ScarCruft' Adds Bluetooth Harvester to Toolkit |
APT |
Securityweek |
14.5.19 | |
APT |
Threatpost |
9.5.19 |
FIN7.5: the infamous cybercrime rig “FIN7” continues its activities |
APT |
Securelist |
9.5.19 |
TURLA LIGHTNEURON |
APT |
Report |
8.5.19 |
LulZSec and Anonymous Ita hackers published sensitive data from 30,000 Roman lawyers |
APT |
Securityaffairs |
8.5.19 |
LightNeuron, a Turla’s backdoor used to compromise exchange mail servers |
APT |
Securityaffairs |
7.5.19 |
Buckeye APT group used Equation Group tools prior to ShadowBrokers leak |
APT |
Securityaffairs |
7.5.19 |
Turla Uses Sophisticated Backdoor to Hijack Exchange Mail Servers |
APT |
Securityweek |
7.5.19 |
Turla Backdoor Deployed in Attacks Against Worldwide Targets |
APT |
Bleepingcomputer |
3.5.19 |
APT34: Glimpse project |
APT |
Securityaffairs |
2.5.19 |
APT trends report Q1 2019 |
APT |
Securelist |
30.4.19 |
know what you did last summer, MuddyWater blending in the crowd |
APT |
Securelist |
30.4.19 |
MuddyWater APT Hones an Arsenal of Custom Tools |
APT |
Threatpost |
24.4.19 |
OilRig APT uses Karkoff malware along with DNSpionage in recent attacks |
APT |
Securityaffairs |
24.4.19 |
Vietnam-Linked Hackers Use Atypical Executables to Avoid Detection |
APT |
Securityweek |
22.4.19 |
Ride-Hailing Company operating in Iran exposes data of Iranian Drivers |
APT |
Securityaffairs |
22.4.19 |
Source Code of Iran-Linked Hacking Tools Posted Online |
APT |
Securityweek |
20.4.19 |
Source code of tools used by OilRig APT leaked on Telegram |
APT |
Securityaffairs |
19.4.19 |
Hacker Group Exposes Iranian APT Operations and Members |
APT |
Bleepingcomputer |
19.4.19 |
APT28 and Upcoming Elections: evidence of possible interference (Part II) |
APT |
Securityaffairs |
18.4.19 |
Russian TA505 threat actor target financial entities worldwide |
APT |
Securityaffairs |
12.4.19 |
APT28 and Upcoming Elections: evidence of possible interference |
APT |
Securityaffairs |
12.4.19 | |
APT |
Threatpost |
12.4.19 |
FBI/DHS MAR report details HOPLIGHT Trojan used by Hidden Cobra APT |
APT |
Securityaffairs |
12.4.19 |
Hamas-Linked Threat Actor's Infrastructure Disrupted |
APT |
Securityweek |
11.4.19 |
TajMahal APT Can Steal Data From CDs, Printer Queues |
APT |
Securityweek |
10.4.19 |
Sophisticated TajMahal APT Framework remained under the radar for 5 years |
APT |
Securityaffairs |
10.4.19 |
Sophisticated 'TajMahal APT Framework' Remained Undetected for 5 Years |
APT |
Thehackernews |
10.4.19 |
Gaza Cybergang Group1, operation SneakyPastes |
APT |
Securelist |
10.4.19 |
Project TajMahal – a sophisticated new APT framework |
APT |
Securelist |
4.4.19 | |
APT |
Threatpost |
4.4.19 |
OceanLotus APT group leverages a steganography-based loader to deliver backdoors |
APT |
Securityaffairs |
3.4.19 |
OceanLotus APT Uses Steganography to Load Backdoors |
APT |
Bleepingcomputer |
31.3.19 |
Microsoft took control of 99 domains used by Iran-linked Phosphorus APT |
APT |
Securityaffairs |
29.3.19 | |
APT |
Threatpost |
28.3.19 |
Lazarus APT continues to target cryptocurrency businesses with Mac malware |
APT |
Securityaffairs |
28.3.19 |
Microsoft Retaliates Against APT35 Hacker Group by Seizing 99 Domains |
APT |
Bleepingcomputer |
27.3.19 |
Iran-Linked Cyberspy Group APT33 Continues Attacks on Saudi Arabia, U.S. |
APT |
Securityweek |
27.3.19 |
ASUS Admits Its Live Update Utility Was Backdoored by APT Group |
APT |
Bleepingcomputer |
26.3.19 | |
APT |
Threatpost |
26.3.19 |
Operation ShadowHammer |
APT |
Securelist |
26.3.19 |
Free Tools: spotting APTs through Malware streams |
APT |
Securityaffairs |
23.3.19 |
Russian APT groups target European governments ahead of May Elections |
APT |
Securityaffairs |
16.3.19 |
Recently Patched WinRAR Flaw Exploited in APT Attacks |
APT |
Securityweek |
14.3.19 |
CVE-2019-0797 Windows Zero-Day exploited by FruityArmor and SandCat APT Groups |
APT |
Securityaffairs |
12.3.19 | |
APT |
Threatpost |
6.3.19 |
APT40 cyberespionage group supporting growth of China’s naval sector |
APT |
Securityaffairs |
6.3.19 |
Iran-Linked Chafer APT recently used python-based backdoor |
APT |
Securityaffairs |
1.3.19 |
China's APT27 Hackers Use Array of Tools in Recent Attacks |
APT |
Securityweek |
27.2.19 | |
APT |
Threatpost |
21.2.19 |
Microsoft says Russian APT28 espionage group hit Democratic Institutions in Europe |
APT |
Securityaffairs |
21.2.19 |
North Korea’s Lazarus APT targets Russian Entities |
APT |
Securityaffairs |
21.2.19 |
Microsoft: Russia’s Fancy Bear Working to Influence EU Elections |
APT |
Threatpost |
20.2.19 |
North Korean APT Lazarus Targets Russian Entities with KEYMARBLE Backdoor |
APT |
Bleepingcomputer |
20.2.19 |
ThreatList: APT Adversaries Up the Ante on Speed, Target Telecom |
APT |
Threatpost |
20.2.19 |
North Korea's Lazarus Hackers Found Targeting Russian Entities |
APT |
Securityweek |
5.2.19 | |
APT |
Threatpost |
2.2.19 | |
APT |
Threatpost |
30.1.19 |
Iran-Linked APT39 group use off-the-shelf tools to steal data |
APT |
Securityaffairs |
30.1.19 |
Sofacy’s Zepakab Downloader Spotted In-The-Wild |
APT |
Securityaffairs |
25.1.19 |
"Cobalt" Hackers Use Google App Engine in Recent Attacks |
APT |
Securityweek |
25.1.19 |
Kaspersky links GreyEnergy and Zebrocy activities |
APT |
Securityaffairs |
24.1.19 |
GreyEnergy’s overlap with Zebrocy |
APT |
Securelist |
22.1.19 |
Remote Code Exeution Bug Patched in APT Linux Package Manager |
APT |
Bleepingcomputer |
22.1.19 |
Critical RCE Flaw in Linux APT Allows Remote Attackers to Hack Systems |
APT |
Thehackernews |
21.1.19 |
DarkHydrus Hackers Use Google Drive in Recent Attacks |
APT |
Securityweek |
20.1.19 |
DarkHydrus APT Uses Google Drive to Send Commands to RogueRobin Trojan |
APT |
Bleepingcomputer |
17.1.19 |
GreyEnergy: Welcome to 2019 |
APT |
Securityaffairs |
16.1.19 |
Experts link attack on Chilean interbank network Redbanc NK Lazarus APT |
APT |
Securityaffairs |
14.1.19 |
TA505 Group adds new ServHelper Backdoor and FlawedGrace RAT to its arsenal |
APT |
Securityaffairs |
11.1.19 |
Alleged Iran-linked APT groups behind global DNS Hijacking campaign |
APT |
Securityaffairs |
| | | |