Behavioral task
behavioral1
Sample
The Art of Cyberwarfare An Investigators Guide to Espionage, Ransomware, and Organized Cybercrime (Jon DiMaggio) (z-lib.org).pdf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
The Art of Cyberwarfare An Investigators Guide to Espionage, Ransomware, and Organized Cybercrime (Jon DiMaggio) (z-lib.org).pdf
Resource
win10v2004-20220901-en
General
-
Target
The Art of Cyberwarfare An Investigators Guide to Espionage, Ransomware, and Organized Cybercrime (Jon DiMaggio) (z-lib.org).pdf
-
Size
6.5MB
-
MD5
b25ebb6077133af1adb1376a8e395fe1
-
SHA1
295488d012e3cfeb45e1d230d61bc195d46c2dc5
-
SHA256
4163bd52f0df10413cdd78d70531c5325ec21ebf4a6540cc6f344a11acd87f4f
-
SHA512
a0a55622bad512bd173d10c2ca3e8bf5e89ff4bad18639c78a1b01692989220d329c13086d1e33b197604535934c72d8d79456bba3425a7da573bf3054cc1ee9
-
SSDEEP
196608:yPfJPeP3J4RrrCcGXmpsrrOKRcbM3UZr7+I:yP0JurrvpnKRVq7h
Malware Config
Signatures
Files
-
The Art of Cyberwarfare An Investigators Guide to Espionage, Ransomware, and Organized Cybercrime (Jon DiMaggio) (z-lib.org).pdf.pdf
-
https://www.fbi.gov/wanted/cyber/anatoliy-sergeyevich-kovalev/
-
https://whoisology.com/
-
https://archive.org/
-
https://virustotal.com/
-
https://www.hybrid-analysis.com/
-
https://deeponionweb.com/
-
https://docs.broadcom.com/doc/the-black-vine-cyberespionage-group
-
https://www.trendmicro.com/vinfo/de/security/news/cyber-attacks/us-opm-hack-exposes-data-of-4-million-federal-employees
-
https://foreignpolicy.com/2020/12/21/china-stolen-us-data-exposed-cia-operatives-spy-networks/
-
https://www.reuters.com/article/us-anthem-cyber-settlement-idUSKBN19E2ML
-
https://www.vox.com/2015/1/20/18089084/sony-hack-north-korea
-
https://www.justice.gov/opa/pr/north-korean-regime-backed-programmer-charged-conspiracy-conduct-multiple-cyber-attacks-and
-
https://www.zdnet.com/article/cyberwarfare-comes-of-age-the-internet-is-now-officially-a-battlefield/
-
https://zh.wikipedia.org/wiki/%E4%B8%AD%E5%8D%8E%E4%BA%BA%E6%B0%91%E5%85%B1%E5%92%8C%E5%9B%BD%E5%9B%BD%E9%98%B2%E9%83%A8%E9%83%A8%E9%95%BF
-
https://zh.wikipedia.org/wiki/%E4%B8%AD%E5%9B%BD%E4%BA%BA%E6%B0%91%E8%A7%A3%E6%94%BE%E5%86%9B%E5%9B%BD%E9%98%B2%E7%A7%91%E6%8A%80%E5%A4%A7%E5%AD%A6%E7%94%B5%E5%AD%90%E5%AF%B9%E6%8A%97%E5%AD%A6%E9%99%A2
-
https://community.apan.org/wg/tradoc-g2/fmso/m/fmso-books/195631
-
https://www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/
-
https://scholarship.shu.edu/student_scholarship/488
-
https://www.academia.edu/32222445/_Investigating_Titan_Rain_Cyber_Espionage_Cyber_Security_and_Cyber_Operations
-
https://www.wired.com/images_blogs/threatlevel/2013/09/hidden_lynx_final.pdf
-
https://krebsonsecurity.com/tag/bit9-breach/
-
https://www.eweek.com/security/government-agencies-utilities-among-targets-of-voho-cyber-spy-attacks
-
https://www.nbcnews.com/news/us-news/exclusive-secret-nsa-map-shows-china-cyber-attacks-us-targets-n401211
-
https://www.fmprc.gov.cn/mfa_eng/zxxx_662805/t1300771.shtml
-
http://www.chinadaily.com.cn/world/2015xivisitus/2015-09/26/content_21988239_6.htm
-
https://docs.broadcom.com/doc/istr-22-2017-en
-
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/thrip-apt-south-east-asia
-
https://2001-2009.state.gov/r/pa/ho/time/rd/104253.htm
-
https://www.csoonline.com/article/2131745/10-hacks-that-made-headlines.html
-
https://securelist.com/penquins-moonlit-maze/77883/
-
https://medium.com/@chris_doman/the-first-sophistiated-cyber-attacks-how-operation-moonlight-maze-made-history-2adb12cc43f7
-
http://greenspun.com/bboard/q-and-a-fetch-msg.tcl?msg_id=001OlE
-
https://www.iss.europa.eu/content/hacks-leaks-and-disruptions-%E2%80%93-russian-cyber-strategies
-
https://www.politico.com/magazine/story/2016/03/russia-cyber-war-fred-kaplan-book-213746
-
http://news.bbc.co.uk/2/hi/europe/country_profiles/1107800.stm
-
https://www.wired.com/2007/08/ff-estonia/
-
https://www.bbc.com/news/39655415
-
https://apps.dtic.mil/dtic/tr/fulltext/u2/a545578.pdf
-
https://www.netsurion.com/articles/looking-back-operation-buckshot-yankee-agent-btz
-
https://www.wired.com/author/noah-shachtman
-
https://www.wired.com/2010/08/insiders-doubt-2008-pentagon-hack-was-foreign-spy-attack/
-
https://www.washingtonpost.com/national/national-security/cyber-intruder-sparks-response-debate/2011/12/06/gIQAxLuFgO_print.html?noredirect=on
-
https://securelist.com/red-october-diplomatic-cyber-attacks-investigation/36740/
-
https://www.cs.bu.edu/~goldbe/teaching/HW55815/presos/redoct.pdf
-
https://securelist.com/red-october-detailed-malware-description-1-first-stage-of-attack/36830/
-
https://foreignpolicy.com/2018/01/22/u-s-sanction-abet-iranian-internet-censorship/
-
https://rethinkingislam-sultanshahin.blogspot.com/2010/07/cyber-wars-in-iran.html
-
https://web.archive.org/web/20141115174547/http://www.defenddemocracy.org/behrouz-kamalian
-
https://web.archive.org/web/20190222004609/http://rdfi.org/index.php?option=com_content&view=article&id=407:wikipedia-army-of-the-guardians-of-the-islamic-revolution&catid=49:irgc-watch&Itemid=70/
-
https://web.archive.org/web/20140305043650/http://forum.internet-haganah.com/forum/iran-%7C-islamic-revolution/891-behrouz-kamalian-irgc-cyber-operative-and-eu-designated-human-rights-abuser
-
https://www.newsweek.com/irans-cyber-warfare-program-now-major-threat-united-states-745427
-
https://web.archive.org/web/20140719231638/http://defcon.org/images/defcon-18/dc-18-presentations/Amit/DEFCON-18-Amit-Cyber-Crime.pdf
-
https://web.archive.org/web/20140305043650if_/http://forum.internet-haganah.com/forum/iran-%7C-islamic-revolution/891-behrouz-kamalian-irgc-cyber-operative-and-eu-designated-human-rights-abuser
-
https://www.theguardian.com/world/2011/jun/24/jailed-iran-opposition-activists-rape
-
https://www.justice.gov/opa/file/834996/download
-
https://www.criticalthreats.org/analysis/iranian-cyberattacks-what-the-justice-departments-indictment-means-and-what-it-doesnt
-
https://www.recordedfuture.com/ashiyane-forum-history/
-
http://www.google.co.uk/support/forum/p/gmail/thread?tid=2da6158b094b225a&hl=en
-
https://security.googleblog.com/2011/08/update-on-attempted-man-in-middle.html
-
https://doi.org/10.13140/2.1.2456.7364
-
https://media.threatpost.com/wp-content/uploads/sites/103/2011/09/07061400/rapport-fox-it-operation-black-tulip-v1-0.pdf
-
https://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html
-
https://pastebin.com/HqAgaQRj
-
https://www.recordedfuture.com/iran-hacker-hierarchy/
-
https://www.bbc.com/news/uk-33676028
-
https://ciphermachines.com/purple
-
https://www.washingtonpost.com/outlook/the-cia-rigged-foreign-spy-devices-for-years-what-secrets-should-it-share-now/2020/02/28/b570a4ea-58ce-11ea-9000-f3cffee23036_story.html
-
https://www.atomicheritage.org/history/isotope-separation-methods
-
https://arstechnica.com/tech-policy/2011/07/how-digital-detectives-deciphered-stuxnet-the-most-menacing-malware-in-history/
-
https://www.afcea.org/committees/cyber/documents/TheHistoryofStuxnet.pdf
-
https://iranprimer.usip.org/resource/george-w-bush-administration
-
https://www.theatlantic.com/magazine/archive/2009/03/netanyahu-to-obama-stop-iran-or-i-will/307390/
-
https://www.cbsnews.com/news/iran-blames-us-israel-for-stuxnet-malware/
-
https://www.wired.com/2011/02/stuxnet-five-main-target/
-
https://www.wired.com/images_blogs/threatlevel/2010/11/w32_stuxnet_dossier.pdf
-
https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/
-
https://docs.broadcom.com/doc/stuxnet-missing-link-13-en
-
https://iranprimer.usip.org/blog/2019/jun/13/tanker-crisis-gulf
-
https://www.nytimes.com/2019/08/28/us/politics/us-iran-cyber-attack.html
-
https://iranprimer.usip.org/index.php/blog/2019/oct/25/invisible-us-iran-cyber-war
-
https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/08064459/Equation_group_questions_and_answers.pdf
-
https://www.theregister.com/2015/02/17/kaspersky_labs_equation_group/
-
https://www.cfr.org/cyber-operations/equation-group
-
https://www.wired.com/2015/02/kapersky-discovers-equation-group/
-
https://bits.blogs.nytimes.com/2014/11/24/symantec-discovers-spy-code-lurking-on-computer-networks/
-
https://www.spiegel.de/consent-a-?targetUrl=https%3A%2F%2Fwww.spiegel.de%2Fnetzwelt%2Fnetzpolitik%2Ftrojaner-regin-ist-ein-werkzeug-von-nsa-und-gchq-a-1004950.html
-
https://www.kaspersky.com/about/press-releases/2014_regin-a-malicious-platform-capable-of-spying-on-gsm-networks
-
https://theintercept.com/2014/12/13/belgacom-hack-gchq-inside-story/
-
https://www.standaard.be/cnt/dmf20141212_01426880
-
https://www.nrc.nl/nieuws/2014/12/13/verantwoording-en-documenten-a1420301
-
https://cyber-peace.org/wp-content/uploads/2015/01/regin-analysis.pdf
-
https://threatpost.com/experts-question-legality-of-use-of-regin-malware-by-intel-agencies/109566/
-
https://www.aljazeera.com/features/2011/6/20/north-korea-recruits-hackers-at-school
-
https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/July-August-2017/Tosi-North-Korean-Cyber-support/
-
https://www.darkreading.com/application-security/cybercrime-is-north-koreas-biggest-threat/a/d-id/735548
-
https://www.justice.gov/opa/pr/four-chinese-nationals-and-chinese-company-indicted-conspiracy-defraud-united-states-and
-
https://www.voanews.com/a/north-korea-cyber-army/4666459.html
-
https://www.nbcnews.com/storyline/sony-hack/ex-sony-chief-amy-pascal-acknowledges-she-was-fired-n305281
-
https://www.nytimes.com/2013/01/09/technology/online-banking-attacks-were-work-of-iran-us-officials-say.html
-
https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=d5fc6afb-02e8-423f-8feb-f77c68ec7c8a&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments
-
https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdf
-
https://www.washingtonpost.com/world/national-security/suspected-north-korean-cyber-attack-on-a-bank-raises-fears-for-s-korea-allies/2011/08/07/gIQAvWwIoJ_story.html
-
https://www.cfr.org/cyber-operations/denial-service-attacks-against-us-banks-2012-2013
-
https://pastebin.com/mCHia4W5
-
https://www.reuters.com/article/us-iran-cyberattacks-idUSBRE88K12H20120921
-
https://blog.trendmicro.com/trendlabs-security-intelligence/mbr-wiping-trojan-other-attacks-hit-south-korea/
-
https://blog.avast.com/2013/03/19/analysis-of-chinese-attack-against-korean-banks/
-
https://securelist.com/south-korean-whois-team-attacks/65106
-
https://www.giac.org/paper/gsec/31524/tracing-lineage-darkseoul/126346
-
https://www.theregister.com/2013/03/25/sk_data_wiping_malware_latest/
-
https://www.darkreading.com/attacks-breaches/how-south-korean-bank-malware-spread/
-
https://ciaotest.cc.columbia.edu/wps/iwps/0032092/f_0032092_26113.pdf/
-
https://www.pymnts.com/news/security-and-risk/2017/ukraine-banks-targets-of-global-cyber-attacks/
-
https://www.ncsc.gov.uk/news/reckless-campaign-cyber-attacks-russian-military-intelligence-service-exposed
-
https://www.reuters.com/article/us-ukraine-cyber-attacks-idUSKBN19I1IJ
-
https://www.bbc.com/news/business-38365579
-
https://www.dni.gov/files/ODNI/documents/2019-ATA-SFR---SSCI.pdf
-
https://www.swift.com/about-us/discover-swift/messaging-and-standards
-
https://www.justice.gov/opa/press-release/file/1092091/download
-
https://baesystemsai.blogspot.com/2017/02/lazarus-watering-hole-attacks.html
-
https://sgp.fas.org/crs/row/R44912.pdf
-
https://www.swift.com/our-solutions/interfaces-and-integration/alliance-access
-
https://www.swift.com/resource/three-years-bangladesh-tackling-adversaries
-
https://www.reuters.com/article/us-usa-fed-bangladesh-typo-insight-idUSKCN0WC0TC
-
https://us-cert.cisa.gov/ncas/alerts/TA18-275A
-
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/fastcash-lazarus-atm-malware
-
https://us-cert.cisa.gov/ncas/alerts/aa20-239a
-
https://ems-solutionsinc.com/odinaff-another-threat-to-swift-banking-system/
-
https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=257dd693-5986-41bf-bc33-f9dc76d9c6a8&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments/
-
https://www.databreachtoday.com/sophisticated-carbanak-banking-malware-returns-upgrades-a-8523
-
https://www.washingtonpost.com/national-security/us-sanctions-north-korean-hackers-accused-in-sony-attack-dozens-of-other-incidents/2019/09/13/ac6b0070-d633-11e9-9610-fb56c5522e1c_story.html
-
https://www.businessinsider.com/iranian-cyberattacks-retaliation-for-stuxnet-virus-2013-1
-
https://www.amm.com/Article/3890250/How-the-Norsk-Hydro-cyberattack-unfolded.html
-
https://www.youtube.com/watch?v=FbZyADzEez4
-
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
-
https://documents.trendmicro.com/images/TEx/articles/lockergoga-1.png
-
https://www.justice.gov/opa/pr/two-iranian-men-indicted-deploying-ransomware-extort-hospitals-municipalities-and-public
-
https://www.cyclonis.com/ryuk-ransomware-creates-chaos-targets-government-hospital-institutions/
-
https://global-uploads.webflow.com/5fffaaff80401ac09b3ae4ff/6189b8edd5e56c6d07905b0e_Metabase%20Q%20-%20EvilCorp%20Arrives%20to%20Mexico.pdf
-
https://www.cnbc.com/2015/10/14/hackers-being-hunted-after-using-dridex-malware-to-steal-over-30m.html
-
https://www.coveware.com/bitpaymer-ransomware-payment
-
https://home.treasury.gov/news/press-releases/sm845
-
https://www.fbi.gov/wanted/cyber/maksim-viktorovich-yakubets
-
https://www.wired.com/story/alleged-russian-hacker-evil-corp-indicted/
-
https://research.nccgroup.com/2020/06/23/wastedlocker-a-new-ransomware-variant-developed-by-the-evil-corp-group/
-
https://labs.sentinelone.com/wastedlocker-ransomware-abusing-ads-and-ntfs-file-attributes/
-
https://www.wired.com/story/garmin-ransomware-hack-warning/
-
https://www.forbes.com/sites/barrycollins/2020/07/28/garmin-risks-repeat-attack-if-it-paid-10-million-ransom/
-
https://www.bleepingcomputer.com/news/security/north-korean-hackers-used-hermes-ransomware-to-hide-recent-bank-heist/
-
https://blog.malwarebytes.com/threat-spotlight/2019/12/threat-spotlight-the-curious-case-of-ryuk-ransomware/
-
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/ryuk-ransomware-attack-rush-to-attribution-misses-the-point/
-
https://research.checkpoint.com/2018/ryuk-ransomware-targeted-campaign-break/
-
https://www.crowdstrike.com/blog/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware/
-
https://www.zdnet.com/article/megacortex-ransomware-slams-eu-firms-with-demands-of-up-to-5-8-million/
-
https://www.bleepingcomputer.com/news/security/new-lockergoga-ransomware-allegedly-used-in-altran-attack/
-
https://www.recordedfuture.com/cobalt-strike-servers/
-
https://www.foxbusiness.com/politics/biden-taskforce-colonial-pipeline-hackers-russia-operations-return
-
https://www.databreaches.net/we-are-apolitical-darkside-threat-actors/
-
https://www.nytimes.com/2021/05/10/us/politics/pipeline-hack-darkside.html
-
https://krebsonsecurity.com/2021/05/darkside-ransomware-gang-quits-after-servers-bitcoin-stash-seized
-
https://www.tripwire.com/state-of-security/featured/fbi-dont-pay-ransomware/
-
https://www.csmonitor.com/World/Passcode/2014/0617/Ukraine-election-narrowly-avoided-wanton-destruction-from-hackers
-
https://www.ibtimes.co.uk/equipment-installed-crimea-tap-lawmakers-phones-ukraine-security-services-chief-1438821
-
https://www.nytimes.com/2014/03/02/world/europe/ukraine.html?_r=0
-
https://www.globalsecurity.org/military/world/ukraine/election-2014.htm
-
https://web.archive.org/web/20150205233005/http://cyber-berkut.org/
-
https://www.ibtimes.com/meet-cyberberkut-pro-russian-hackers-waging-anonymous-style-cyberwarfare-against-2228902
-
https://web.archive.org/web/20150203192542/http://cyber-berkut.org/en/olden/index3.php
-
https://guardianlv.com/2014/05/cyberberkut-attempt-to-alter-ukrainian-election/
-
https://www.kp.ru/daily/26222/3105944/
-
https://doi.org/10.1080/01402390.2018.1559152
-
https://vimeo.com/7618090
-
https://www.vox.com/policy-and-politics/2016/10/28/13456368/how-john-podesta-email-got-hacked
-
https://www.justice.gov/opa/pr/grand-jury-indicts-12-russian-intelligence-officers-hacking-offenses-related-2016-election
-
https://www.justice.gov/opa/pr/six-russian-gru-officers-charged-connection-worldwide-deployment-destructive-malware-and
-
https://www.dhs.gov/news/2016/10/07/joint-statement-department-homeland-security-and-office-director-national
-
https://web.archive.org/web/20160707111315/http://dcleaks.com:80/index.php/hlr_hrc/
-
https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/
-
https://guccifer2.wordpress.com/2016/06/22/about-guccifer2/
-
https://guccifer2.wordpress.com/2016/06/15/dnc/
-
https://www.vice.com/en/article/yp3bbv/dnc-hacker-guccifer-20-full-interview-transcript
-
https://arstechnica.com/information-technology/2016/06/guccifer-leak-of-dnc-trump-research-has-a-russians-fingerprints-on-it/
-
https://www.globalsecurity.org/intell/world/russia/dzerzhinsky.htm
-
https://www.independent.co.uk/news/world/europe/french-voters-deluge-fake-news-stories-facebook-twitter-russian-influence-days-election-a7696506.html
-
https://www.justice.gov/opa/press-release/file/1328521/download
-
https://www.britannica.com/topic/En-Marche
-
https://www.politico.eu/article/macron-confirms-massive-hack-just-ahead-of-election/
-
https://www.atlanticcouncil.org/wp-content/uploads/2019/06/The_Macron_Leaks_Operation-A_Post-Mortem.pdf
-
https://cybersecurity.att.com/blogs/labs-research/macronleaks-a-timeline-of-events
-
https://www.france24.com/en/20170324-marine-le-pen-visits-russia-french-presidential-election-putin
-
https://www.bbc.com/news/world-europe-39478066
-
https://www.wired.com/2016/10/inside-cyberattack-shocked-us-government/
-
https://www.wada-ama.org/en/media/news/2016-09/wada-confirms-attack-by-russian-cyber-espionage-group
-
https://www.wired.com/2010/01/operation-aurora/
-
https://www.ibm.com/downloads/cas/RDEQK07R#:~:text=The%20average%20total%20cost%20of%20a%20data%20breach%20in%20the,the%20global%20average%20of%2025%2C575/
-
https://www.reuters.com/article/us-equifax-cyber/equifax-breach-could-be-most-costly-in-corporate-history-idUSKCN1GE257
-
https://boingboing.net/2019/02/13/was-that-huge-2017-equifax-dat.html
-
https://www.imperva.com/learn/ddos/slowloris/?redirect=Incapsula
-
https://www.imperva.com/learn/ddos/low-orbit-ion-cannon/
-
https://resources.infosecinstitute.com/topic/loic-dos-attacking-tool/
-
https://sourceforge.net/projects/loic/
-
https://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf
-
https://www.dni.gov/files/CTIIC/documents/ODNI_A_Guide_to_Cyber_Attribution.pdf
-
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/dragonfly-energy-sector-cyber-attacks
-
https://securelist.lat/sykipot-explota-una-nueva-vulnerabilidad-de-adobe-flash/66746/
-
https://pwc.blogs.com/cyber_security_updates/2017/05/index.html
-
https://en.wikipedia.org/w/index.php?title=UTC%2B08:00&oldid=1002196814
-
https://www.brannans.com/
-
https://docs.broadcom.com/doc/the-nitro-attacks-stealing-secrets-11-en
-
https://groups.google.com/g/wlaq-gg/c/XV76xu8IzKM/m/h4sk_NQ1_X4J/
-
https://contagiodump.blogspot.com/2010/06/
-
http://extreme-security.blogspot.com/2014/12/operation-mangal-win32-syndicasec-used.html
-
https://whois.domaintools.com/masseffect.space
-
https://web.archive.org/web/19970421165310/http://www.aol.com/
-
https://gallery.logrhythm.com/threat-intelligence-reports/shamoon-2-malware-analysis-logrhythm-labs-threat-intelligence-report.pdf
-
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/spotlight-on-shamoon/
-
https://hshrzd.wordpress.com/2016/03/19/introduction-to-ads-alternate-data-streams/
-
http://techgenix.com/alternate_data_streams/
-
https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=07799a0b-af41-450e-a730-effb95a0cfeb&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments
-
https://medium.com/threat-intel/cybercrime-investigation-insights-bachosens-e1d6312f6b3a
-
https://arstechnica.com/information-technology/2017/04/nsa-leaking-shadow-brokers-just-dumped-its-most-damaging-release-yet/
-
https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=b2b00f1b-e553-47df-920d-f79281a80269&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments
-
https://paper.seebug.org/papers/APT/APT_CyberCriminal_Campagin/2012/the-elderwood-project.pdf
-
https://www.fireeye.com/blog/jp-threat-research/2013/09/deputy-dog-part-1.html
-
https://web.archive.org/web/20181218221856/https:/www.navy.mil/ah_online/OPSEC/
-
https://www.farsightsecurity.com/tools/dnsdb-scout/
-
https://www.riskiq.com/products/passivetotal/
-
https://www.domaintools.com/products
-
https://code.google.com/archive/p/dnsmap/
-
https://support.virustotal.com/hc/en-us/articles/360001387057-VirusTotal-Intelligence-Introduction
-
https://www.joesandbox.com/#windows
-
https://tria.ge/
-
https://cuckoo.sh/docs/introduction/what.html
-
https://www.youtube.com/watch?v=NCdzOwsUfVQ
-
https://www.google.com/
-
https://www.nerdydata.com/reports/new
-
https://tweetdeck.twitter.com/
-
https://geminiadvisory.io/lockbit-launches-ransomware-blog/
-
https://torproject.org/
-
https://www.expressvpn.com/
-
https://nordvpn.com/
-
https://github.com/DefensePointSecurity/threat_note
-
https://www.misp-project.org/
-
https://analyst1.com/platform/features
-
https://www.devontechnologies.com/apps/devonthink
-
https://www.wireshark.org/
-
https://github.com/lanmaster53/recon-ng
-
https://github.com/laramies/theHarvester
-
https://www.spiderfoot.net/
-
https://www.maltego.com/downloads/
-
https://www.virustotal.com/gui/file/a301260b4887b1f2126821825cacce19dc5b8a8006ab04f0a26f098a9555750a/detection
-
https://web.archive.org/web/20131004152036/http://apec2013ceosummit.com/#host
-
http://www.nortoninternetsecurity.cc/2014/08/trojanmdropper.html
-
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0158
-
https://www.exefiles.com/en/dll/netid-dll/
-
https://docs.microsoft.com/en-us/troubleshoot/windows-client/deployment/dynamic-link-library
-
https://www.optimizationcore.com/security/imphash-usage-malware-analysis-categorizing-malware/
-
https://www.google.com/url?q=https://www.symantec.com/security-center/writeup/2011-090714-2907-99&sa=D&source=editors&ust=1619480146703000&usg=AOvVaw1Qs8KNRjXxoq6_f8vLH6e1
-
https://www.crowdstrike.com/blog/who-is-fancy-bear/
-
https://www.fireeye.com/offers/rpt-services-campaign-apt28.html
-
https://scout.dnsdb.info/dashboard
-
https://web.archive.org/web/20140724180721/http://academi.com/pages/about-us
-
https://www.eurosatory.com/home/the-exhibition/who-are-we/?lang=en
-
https://tolonews.com/about-us
- Show all
-