id stringlengths 14 16 | text stringlengths 2 3.37k | source stringlengths 4 237 |
|---|---|---|
a7d6ee979b1a-0 | Threat actor: Big Panda
UUID: 4777aa1a-1bc4-4f81-8c1d-9c50c739d314
First seen:
Source last modified: 2020-04-19
Threat actor aliases
Big Panda (CrowdStrike)
Description
A threat actor mentioned in a summary report only, so we don't know who they are yet.
Sponsor type and motivation
Sponsor:
Motivation:
Count... | Big_Panda.md |
21fc39088816-0 | Reference for threat actor for "Big Panda"
Title: CrowdStrike Falcon Traces Attacks Back To Hackers
Source: http://www.darkreading.com/attacks-and-breaches/crowdstrike-falcon-traces-attacks-back-to-hackers/d/d-id/1110402
Content | CrowdStrike_Falcon_Traces_Attacks_Back_To_Hackers.md |
21fc39088816-1 | CrowdStrike Falcon Traces Attacks Back To HackersDark Reading is part of the Informa Tech Division of Informa PLCInforma PLC|ABOUT US|INVESTOR RELATIONS|TALENTThis site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, Lo... | CrowdStrike_Falcon_Traces_Attacks_Back_To_Hackers.md |
21fc39088816-2 | is, what did they do [on your network], what did they take, which commands did they execute?" The service works in part by running a small (400 KB) "sensor" on Windows 7 and Mac OS X systems, bolstered by DNS, email and API sensors on servers, to track the types of attacks that are being launched. CrowdStrike then corr... | CrowdStrike_Falcon_Traces_Attacks_Back_To_Hackers.md |
21fc39088816-3 | targeting."CrowdStrike has grouped attackers into "adversary groups" -- to date, about 48 in total -- named for country characteristics: "pandas" for groups operating from China; "cats" as in Persian cats for Iran; "bears" for Russia; "saints" for Georgia; and "tigers" for India. "Some in the community refer to the adv... | CrowdStrike_Falcon_Traces_Attacks_Back_To_Hackers.md |
21fc39088816-4 | legal action against that individual or the company," he said. "A lot of companies are multinationals, so you can actually sue them in the United States -- or in a jurisdiction of your choosing overseas, and get criminal damages or injunctive relief for stolen information."Alperovitch said that when it comes to respond... | CrowdStrike_Falcon_Traces_Attacks_Back_To_Hackers.md |
21fc39088816-5 | Talent & Tel Aviv's Light RailCISO Corner: DoD Regs, Neurodiverse Talent & Tel Aviv's Light RailbyTara Seals, Managing Editor, News, Dark ReadingFeb 9, 20249 Min ReadA survey asking is stress good or bad Сloud SecurityIvanti Gets Poor Marks for Cyber Incident ResponseIvanti Gets Poor Marks for Cyber Incident Responseby... | CrowdStrike_Falcon_Traces_Attacks_Back_To_Hackers.md |
c66693ce84f3-0 | Threat actor: Boulder Bear
UUID: fb8e2216-5e84-49ad-b187-58b457cfa95f
First seen:
Source last modified: 2020-04-19
Threat actor aliases
Boulder Bear (CrowdStrike)
Description
A threat actor mentioned in a summary report only, so we don't know who they are yet.
Sponsor type and motivation
Sponsor:
Motivation:
... | Boulder_Bear.md |
2d9170f36175-0 | Threat actor: Clockwork Spider
UUID: 93000251-ee2f-4865-9972-3ffe37bc62dd
First seen:
Source last modified: 2020-04-19
Threat actor aliases
Clockwork Spider (CrowdStrike)
Description
A threat actor mentioned in a summary report only, so we don't know who they are yet.
Sponsor type and motivation
Sponsor:
Moti... | Clockwork_Spider.md |
4cd2e1e6de27-0 | Threat actor: Corsair Jackal
UUID: 232c92dc-f380-4291-beca-a2e59b502449
First seen:
Source last modified: 2020-04-22
Threat actor aliases
Corsair Jackal (CrowdStrike), TunisianCyberArmy (?)
Description
A threat actor mentioned in a summary report only, so we don't know who they are yet.
Sponsor type and motivat... | Corsair_Jackal.md |
9d1b3dffcca3-0 | Reference for threat actor for "Corsair Jackal"
Title: Research & Threat Intel Archives - crowdstrike.com
Source: https://www.crowdstrike.com/blog/regional-conflict-and-cyber-blowback/
Content
Research & Threat Intel Archives - crowdstrike.com
Research & Threat Intel
TRY CROWDSTRIKE FREE FOR 15 DAYS
GET STARTED W... | Research_&_Threat_Intel_Archives_-_crowdstrike.com.md |
50c724dcca17-0 | Threat actor: Dextorous Spider
UUID: e7fb49f3-44b5-427d-93fc-570fcd7b4573
First seen:
Source last modified: 2022-12-31
Threat actor aliases
Dextorous Spider (CrowdStrike)
Description
A threat actor mentioned in a summary report only, so we don't know who they are yet.
Sponsor type and motivation
Sponsor:
Moti... | Dextorous_Spider.md |
858e2f380084-0 | Threat actor: Dizzy Panda
UUID: d15c1ebf-af3b-4672-9900-e99ca12fa672
First seen:
Source last modified: 2022-12-31
Threat actor aliases
Dizzy Panda (CrowdStrike), LadyBoyle (FireEye)
Description
A threat actor mentioned in a summary report only, so we don't know who they are yet.
Sponsor type and motivation
Spo... | Dizzy_Panda.md |
f54c534ab5fd-0 | Threat actor: Electric Panda
UUID: 8910334c-3302-4ecd-9119-8d78a02b58ea
First seen:
Source last modified: 2020-04-19
Threat actor aliases
Electric Panda (CrowdStrike)
Description
A threat actor mentioned in a summary report only, so we don't know who they are yet.
Sponsor type and motivation
Sponsor:
Motivati... | Electric_Panda.md |
85df15c08c49-0 | Reference for threat actor for "Electric Panda"
Title: CrowdCasts Monthly: You Have an Adversary Problem | PPT
Source: http://www.slideshare.net/CrowdStrike/crowd-casts-monthly-you-have-an-adversary-problem
Content
CrowdCasts Monthly: You Have an Adversary Problem | PPTSubmit SearchUploadCrowdCasts Monthly: You Hav... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
85df15c08c49-1 | Read moreCrowdCasts Monthly: You Have an Adversary Problem1 of 35Download NowDownload to read offlineRecommendedCyber espionage nation state-apt_attacks_on_the_riseCyber espionage nation state-apt_attacks_on_the_riseCyphort You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prev... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
85df15c08c49-2 | for the masses: Storytelling with ATT&CKKnowledge for the masses: Storytelling with ATT&CKMITRE ATT&CK Cyber Threat IntelligenceCyber Threat Intelligenceseadeloitte Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-onSplunk Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving f... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
85df15c08c49-3 | Data Sources for Minimum Viable Detection; ...MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ... MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,... MITRE ATT&CKcon 2.0: ATT&CK Upda... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
85df15c08c49-4 | for ICS Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence Similar to CrowdCasts Monthly: You Have an Adversary ProblemCrowdCast Monthly: Operationalizing IntelligenceCrowdC... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
85df15c08c49-5 | no more chewy centers- the zero trust modelForrester no more chewy centers- the zero trust modelCristian Garcia G. Is Your Organization in Crisis?Is Your Organization in Crisis?BlackBerry Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Priv... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
85df15c08c49-6 | 11 terp_breuer_disclosure_master Data science unit introductionData science unit introduction A Report On The Attack Automation StrategyA Report On The Attack Automation Strategy Forrester no more chewy centers- the zero trust modelForrester no more chewy centers- the zero trust model Is Your Organization in Crisis... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
85df15c08c49-7 | Journal & Pyresso: A Python-Based Framework for Debugging JavaJava Journal & Pyresso: A Python-Based Framework for Debugging JavaCrowdStrike Venom Venom CrowdStrike CrowdCasts Monthly: Going Beyond the IndicatorCrowdCasts Monthly: Going Beyond the IndicatorCrowdStrike CrowdCasts Monthly: Mitigating Pass the HashCrowdCa... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
85df15c08c49-8 | Morphing Beyond The Ability Of Standard ... How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security Battling Unknown Malware with Machine Learning Battling Un... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
85df15c08c49-9 | Presentation_Overview_ISO_16140-3_Method_verification_20210322.pptxssuser796efb Navigating the Never Normal Strategies for Portfolio LeadersNavigating the Never Normal Strategies for Portfolio LeadersOnePlan Solutions Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...Getting Started with M... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
85df15c08c49-10 | (Taka) Wang Recently uploaded (20)Towards a Docker-based architecture for open multi-agent systemsTowards a Docker-based architecture for open multi-agent systems Centre of Circumference - Shot List.docxCentre of Circumference - Shot List.docx Unlocking Hidden Profits: How GenAI Supercharges Industrial OTUnlocking H... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
85df15c08c49-11 | MMCOE - ML CampaignGDSC MMCOE - ML Campaign Connector Corner: Connect to your processes with UiPath Integration Service...Connector Corner: Connect to your processes with UiPath Integration Service... Apollo Price Model - 20180521Apollo Price Model - 20180521 Apollo Cloud Edge Solution - 20180518Apollo Cloud Edge S... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
85df15c08c49-12 | ADVERSARY PROBLEM.
Who’s Targeting You and Why? | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
85df15c08c49-13 | @CROWDSTRIKE | #CROWDCASTS
AGENDA
YOU HAVE AN ADVERSARY PROBLEM.
1.
INTELLIGENCE-DRIVEN SECURITY
2.
ADVERSARY CATEGORIZATION
3.
ADVERSARY GROUPS - OVERVIEW
4.
NOTABLE ACTIVITY – Q3
5.
NEW ACTORS
6.
ACTIONALIZING INTELLIGENCE
2013 CrowdStrike, Inc. All rights reserved.
@CROWDSTRIKE | #CROWDCASTS
Today’s... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
85df15c08c49-14 | Adversary Categorization
CATEGORIZATION| Adversary Groups
Tactics, Techniques, and Practices
Never assume relationships exist
Between indicators
Recognize adversaries are constantly changing
But RECOGNIZE they are HUMAN
CATEGORIZATION
2013 Crowdstrike, Inc. All rights reserved.
Intelligence: Adversary Groups
@... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
85df15c08c49-15 | Notable Activity – Q3
NEW ADVERSARIES
STONE PANDA | NIGHTSHADE PANDA | GOBLIN PANDA | CORSAIR JACKAL
NOTABLE ACTIVITY
DEADEYE JACKAL | NUMBERED PANDA | SILENT CHOLLIMA
2013 Crowdstrike, Inc. All rights reserved.
11
NEW ACTORS
2013 CrowdStrike, Inc. All rights reserved.
12
Intelligence: STONE PANDA
OPERATIONAL
... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
85df15c08c49-16 | 15
@CROWDSTRIKE | #CROWDCASTS
Target Sectors: Media; NGO/Int’l
Relations; Universities
WHO IS
NIGHTSHADE
PANDA?
Delivery: Likely spearphishing
Malware: PlugX and Poison Ivy
Known Poison Ivy passwords: synnia
C2 Indicators: www.adv138mail.com;
pu.flowershow.org; tech.network-sec.net;
184.105.178.83; 199.59.243.106... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
85df15c08c49-17 | TOOLS
Cross Site Scripting (XSS)
2013 CrowdStrike, Inc. All rights reserved.
19
@CROWDSTRIKE | #CROWDCASTS
Timeline: CORSAIR JACKAL
2012 XTnR3v0LT
colludes with Anonymous
group XL3gi0n
January 25, 2013 New
members added
January 22, 2013
XTnR3v0LT announce
formation of TCA
March 1 2013 Announced
compromise of ... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
85df15c08c49-18 | 23
@CROWDSTRIKE | #CROWDCASTS
Timeline: DEADEYE JACKAL
August 26, 2011
May 5, 2011 SEA Mohammad Ahmad Fall 2011 – Spring 2013
Officially Formed Kabbani Killed
Web Defacements
Facebook
Spamming
September 2011
Harvard
Defacement
July 2013 3rd Party
Provider Breaches
February 2013
Twitter Account
Takeovers
August... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
85df15c08c49-19 | 2007 to Present
@CROWDSTRIKE | #CROWDCASTS
TARGETING
Multiple targets in ROK
Global Targets of Opportunity
OBJECTIVES
Recon
Criminal Monetization
Lateral movement
Data Destruction
TOOLS
Custom Malware
2013 CrowdStrike, Inc. All rights reserved.
28
@CROWDSTRIKE | #CROWDCASTS
Target Sectors: Media
WHO IS
SI... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
85df15c08c49-20 | Adversary Microsite
COMING SOON
TRACK: Track current
Adversaries against other
Industry nomenclature
OVERVIEW: Gain insight
Into adversary – new groups
Added weekly
2013 Crowdstrike, Inc. All rights reserved.
32
@CROWDSTRIKE | #CROWDCASTS
RESOURCES
Next up: Enterprise Activity Monitoring
The Power to HUNT
Novemb... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
d2e2025ce999-0 | Threat actor: Eloquent Panda
UUID: b01e489b-df53-40aa-9b98-d9d856de7074
First seen:
Source last modified: 2020-04-19
Threat actor aliases
Eloquent Panda (CrowdStrike)
Description
A threat actor mentioned in a summary report only, so we don't know who they are yet.
Sponsor type and motivation
Sponsor:
Motivati... | Eloquent_Panda.md |
be950c94cf40-0 | Reference for threat actor for "Eloquent Panda"
Title: CrowdCasts Monthly: You Have an Adversary Problem | PPT
Source: http://www.slideshare.net/CrowdStrike/crowd-casts-monthly-you-have-an-adversary-problem
Content
CrowdCasts Monthly: You Have an Adversary Problem | PPTSubmit SearchUploadCrowdCasts Monthly: You Hav... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
be950c94cf40-1 | Read moreCrowdCasts Monthly: You Have an Adversary Problem1 of 35Download NowDownload to read offlineRecommendedCyber espionage nation state-apt_attacks_on_the_riseCyber espionage nation state-apt_attacks_on_the_riseCyphort You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prev... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
be950c94cf40-2 | for the masses: Storytelling with ATT&CKKnowledge for the masses: Storytelling with ATT&CKMITRE ATT&CK Cyber Threat IntelligenceCyber Threat Intelligenceseadeloitte Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-onSplunk Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving f... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
be950c94cf40-3 | Data Sources for Minimum Viable Detection; ...MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ... MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,... MITRE ATT&CKcon 2.0: ATT&CK Upda... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
be950c94cf40-4 | for ICS Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence Similar to CrowdCasts Monthly: You Have an Adversary ProblemCrowdCast Monthly: Operationalizing IntelligenceCrowdC... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
be950c94cf40-5 | no more chewy centers- the zero trust modelForrester no more chewy centers- the zero trust modelCristian Garcia G. Is Your Organization in Crisis?Is Your Organization in Crisis?BlackBerry Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Priv... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
be950c94cf40-6 | 11 terp_breuer_disclosure_master Data science unit introductionData science unit introduction A Report On The Attack Automation StrategyA Report On The Attack Automation Strategy Forrester no more chewy centers- the zero trust modelForrester no more chewy centers- the zero trust model Is Your Organization in Crisis... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
be950c94cf40-7 | Journal & Pyresso: A Python-Based Framework for Debugging JavaJava Journal & Pyresso: A Python-Based Framework for Debugging JavaCrowdStrike Venom Venom CrowdStrike CrowdCasts Monthly: Going Beyond the IndicatorCrowdCasts Monthly: Going Beyond the IndicatorCrowdStrike CrowdCasts Monthly: Mitigating Pass the HashCrowdCa... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
be950c94cf40-8 | Morphing Beyond The Ability Of Standard ... How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security Battling Unknown Malware with Machine Learning Battling Un... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
be950c94cf40-9 | Presentation_Overview_ISO_16140-3_Method_verification_20210322.pptxssuser796efb Navigating the Never Normal Strategies for Portfolio LeadersNavigating the Never Normal Strategies for Portfolio LeadersOnePlan Solutions Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...Getting Started with M... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
be950c94cf40-10 | (Taka) Wang Recently uploaded (20)Towards a Docker-based architecture for open multi-agent systemsTowards a Docker-based architecture for open multi-agent systems Centre of Circumference - Shot List.docxCentre of Circumference - Shot List.docx Unlocking Hidden Profits: How GenAI Supercharges Industrial OTUnlocking H... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
be950c94cf40-11 | MMCOE - ML CampaignGDSC MMCOE - ML Campaign Connector Corner: Connect to your processes with UiPath Integration Service...Connector Corner: Connect to your processes with UiPath Integration Service... Apollo Price Model - 20180521Apollo Price Model - 20180521 Apollo Cloud Edge Solution - 20180518Apollo Cloud Edge S... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
be950c94cf40-12 | ADVERSARY PROBLEM.
Who’s Targeting You and Why? | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
be950c94cf40-13 | @CROWDSTRIKE | #CROWDCASTS
AGENDA
YOU HAVE AN ADVERSARY PROBLEM.
1.
INTELLIGENCE-DRIVEN SECURITY
2.
ADVERSARY CATEGORIZATION
3.
ADVERSARY GROUPS - OVERVIEW
4.
NOTABLE ACTIVITY – Q3
5.
NEW ACTORS
6.
ACTIONALIZING INTELLIGENCE
2013 CrowdStrike, Inc. All rights reserved.
@CROWDSTRIKE | #CROWDCASTS
Today’s... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
be950c94cf40-14 | Adversary Categorization
CATEGORIZATION| Adversary Groups
Tactics, Techniques, and Practices
Never assume relationships exist
Between indicators
Recognize adversaries are constantly changing
But RECOGNIZE they are HUMAN
CATEGORIZATION
2013 Crowdstrike, Inc. All rights reserved.
Intelligence: Adversary Groups
@... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
be950c94cf40-15 | Notable Activity – Q3
NEW ADVERSARIES
STONE PANDA | NIGHTSHADE PANDA | GOBLIN PANDA | CORSAIR JACKAL
NOTABLE ACTIVITY
DEADEYE JACKAL | NUMBERED PANDA | SILENT CHOLLIMA
2013 Crowdstrike, Inc. All rights reserved.
11
NEW ACTORS
2013 CrowdStrike, Inc. All rights reserved.
12
Intelligence: STONE PANDA
OPERATIONAL
... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
be950c94cf40-16 | 15
@CROWDSTRIKE | #CROWDCASTS
Target Sectors: Media; NGO/Int’l
Relations; Universities
WHO IS
NIGHTSHADE
PANDA?
Delivery: Likely spearphishing
Malware: PlugX and Poison Ivy
Known Poison Ivy passwords: synnia
C2 Indicators: www.adv138mail.com;
pu.flowershow.org; tech.network-sec.net;
184.105.178.83; 199.59.243.106... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
be950c94cf40-17 | TOOLS
Cross Site Scripting (XSS)
2013 CrowdStrike, Inc. All rights reserved.
19
@CROWDSTRIKE | #CROWDCASTS
Timeline: CORSAIR JACKAL
2012 XTnR3v0LT
colludes with Anonymous
group XL3gi0n
January 25, 2013 New
members added
January 22, 2013
XTnR3v0LT announce
formation of TCA
March 1 2013 Announced
compromise of ... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
be950c94cf40-18 | 23
@CROWDSTRIKE | #CROWDCASTS
Timeline: DEADEYE JACKAL
August 26, 2011
May 5, 2011 SEA Mohammad Ahmad Fall 2011 – Spring 2013
Officially Formed Kabbani Killed
Web Defacements
Facebook
Spamming
September 2011
Harvard
Defacement
July 2013 3rd Party
Provider Breaches
February 2013
Twitter Account
Takeovers
August... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
be950c94cf40-19 | 2007 to Present
@CROWDSTRIKE | #CROWDCASTS
TARGETING
Multiple targets in ROK
Global Targets of Opportunity
OBJECTIVES
Recon
Criminal Monetization
Lateral movement
Data Destruction
TOOLS
Custom Malware
2013 CrowdStrike, Inc. All rights reserved.
28
@CROWDSTRIKE | #CROWDCASTS
Target Sectors: Media
WHO IS
SI... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
be950c94cf40-20 | Adversary Microsite
COMING SOON
TRACK: Track current
Adversaries against other
Industry nomenclature
OVERVIEW: Gain insight
Into adversary – new groups
Added weekly
2013 Crowdstrike, Inc. All rights reserved.
32
@CROWDSTRIKE | #CROWDCASTS
RESOURCES
Next up: Enterprise Activity Monitoring
The Power to HUNT
Novemb... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
102417e244c9-0 | Threat actor: Flyfox
UUID: b958b665-65cf-4d36-9eb3-5cd95c566abf
First seen:
Source last modified: 2020-05-01
Threat actor aliases
Flyfox (Kaspersky)
Description
A threat actor mentioned in a summary report only, so we don't know who they are yet.
Sponsor type and motivation
Sponsor:
Motivation:
Country of or... | Flyfox.md |
5a8b9067a656-0 | Reference for threat actor for "Flyfox"
Title: APT Review of the year | Securelist
Source: https://securelist.com/apt-review-of-the-year/89117/
Content
APT Review of the year | Securelist
Solutions for:
Home Products
Small Business 1-50 employees
Medium Business 51-999 employees
Enterprise 1000+ employees
by Kas... | APT_Review_of_the_year_|_Securelist.md |
5a8b9067a656-1 | Transparency
Corporate News
Press Center
Careers
Innovation Hub
Sponsorship
Policy Blog
Contacts
GDPR
Subscribe
Dark mode off
Login
Securelist menu
EnglishRussianSpanish
Existing Customers
Personal
My Kaspersky
Renew your product
Update your product
Customer support
Business
KSOS portal
Kaspersky Business Hub
... | APT_Review_of_the_year_|_Securelist.md |
5a8b9067a656-2 | What were the most interesting developments in terms of APT activity throughout the year and what can we learn from them?
Not an easy question to answer; everybody has partial visibility and it’s never possible to really understand the motivations of some attacks or the developments behind them. Still, with the benefit... | APT_Review_of_the_year_|_Securelist.md |
5a8b9067a656-3 | During the year we understood that Sofacy appears to be changing at a structural level and is possibly already being split into different subgroups. With the OlympicDestroyer analysis we learnt that this highly sophisticated false flag operation was somehow related to Sofacy. However, we later observed more activity by... | APT_Review_of_the_year_|_Securelist.md |
5a8b9067a656-4 | Finally, some potential CozyDuke activity was detected during November 2018, apparently targeting diplomatic and governmental entities in Europe. The TTPs do not seem to be those that are usually attributed to this actor, which opened the door to speculation about this malware being used by a different group. The facts... | APT_Review_of_the_year_|_Securelist.md |
5a8b9067a656-5 | The whole OlympicDestroyer story eventually resulted in the discovery of a new subset of activity related to both Sofacy and BlackEnergy that we call Hades. We will see how these more sophisticated false flags evolve in the future and how they are used to pursue less explicit goals.
On the forgotten ones
Throughout the... | APT_Review_of_the_year_|_Securelist.md |
5a8b9067a656-6 | Scarcruft used a new backdoor we call PoorWeb, deployed a 0-day in their campaign at the beginning of the year and used Android malware specially designed for Samsung devices. DarkHotel was also back with a 0-day and new activity, targeting their traditional victims. We were able to establish a connection with a medium... | APT_Review_of_the_year_|_Securelist.md |
5a8b9067a656-7 | In the Middle East we saw activity by LazyMerkaats, FruityArmor, OpParliament, DarkHydrus and DomesticKitten among others. Sets of activity such as that by the Gorgon group are a bit of an exception as they also target victims outside the region.
Finally, we also detected new sets of activity that show an apparent inte... | APT_Review_of_the_year_|_Securelist.md |
5a8b9067a656-8 | We also observed several attacks against journalists, activists, political dissidents and NGOs around the world. Many of these attacks involved malware developed by companies that provide surveillance tools to governments.
For instance, NSO and its Pegasus malware was discovered in more than 43 countries according to a... | APT_Review_of_the_year_|_Securelist.md |
5a8b9067a656-9 | The US also provided details about a North Korean citizen suspected of being part of the Lazarus group that was behind the Sony Entertainment attack and WannaCry activity, and who is now wanted by the FBI. Maybe in an unrelated note, the US Cert was very active during the year in providing indicators of compromise and ... | APT_Review_of_the_year_|_Securelist.md |
5a8b9067a656-10 | That leads on to something we actually saw in the VPNFilter attack, in this case targeting networking devices on a massive scale. This campaign, attributed to a Russian-speaking set of activity, allowed attackers to infect hundreds of thousands of devices, providing control of the network traffic as well as allowing MI... | APT_Review_of_the_year_|_Securelist.md |
5a8b9067a656-11 | APT
Industrial threats
Lazarus
Nation State Sponsored Espionage
Olympic Destroyer
Sofacy
Targeted attacks
Turla
Authors
Vicente Diaz
Costin Raiu
APT review of the year
Your email address will not be published. Required fields are marked *Name *
Email *
Cancel
GReAT webinars
GReAT Ideas. Balalaika Edition
Bor... | APT_Review_of_the_year_|_Securelist.md |
5a8b9067a656-12 | Subscribe
In the same category
HrServ – Previously unknown web shell used in APT attack
Modern Asian APT groups’ tactics, techniques and procedures (TTPs)
A cascade of compromise: unveiling Lazarus’ new campaign
How to catch a wild triangle
StripedFly: Perennially flying under the radar
Latest Posts
Malware des... | APT_Review_of_the_year_|_Securelist.md |
5a8b9067a656-13 | A cascade of compromise: unveiling Lazarus’ new campaign
We unveil a Lazarus campaign exploiting security company products and examine its intricate connections with other campaigns
How to catch a wild triangle
How Kaspersky researchers obtained all stages of the Operation Triangulation campaign targeting iPhones an... | APT_Review_of_the_year_|_Securelist.md |
13fd5db28e89-0 | Threat actor: Foxy Panda
UUID: d7c799fd-409a-4c6b-8785-4ece69624974
First seen:
Source last modified: 2020-04-19
Threat actor aliases
Foxy Panda (CrowdStrike)
Description
A threat actor mentioned in a summary report only, so we don't know who they are yet.
Sponsor type and motivation
Sponsor:
Motivation:
Cou... | Foxy_Panda.md |
047723819c55-0 | Threat actor: Ghost Jackal
UUID: 681ddb54-e107-4bfc-a03a-22746088f3cb
First seen:
Source last modified: 2020-04-19
Threat actor aliases
Ghost Jackal (CrowdStrike)
Description
A threat actor mentioned in a summary report only, so we don't know who they are yet.
Sponsor type and motivation
Sponsor:
Motivation:
... | Ghost_Jackal.md |
ce6688940ad1-0 | Threat actor: Gibberish Panda
UUID: 2e02e064-74f7-4bbe-8b3b-43be290f91f8
First seen:
Source last modified: 2020-04-19
Threat actor aliases
Gibberish Panda (CrowdStrike)
Description
A threat actor mentioned in a summary report only, so we don't know who they are yet.
Sponsor type and motivation
Sponsor:
Motiva... | Gibberish_Panda.md |
0573fb772c06-0 | Reference for threat actor for "Gibberish Panda"
Title: CrowdCasts Monthly: You Have an Adversary Problem | PPT
Source: http://www.slideshare.net/CrowdStrike/crowd-casts-monthly-you-have-an-adversary-problem
Content
CrowdCasts Monthly: You Have an Adversary Problem | PPTSubmit SearchUploadCrowdCasts Monthly: You Ha... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
0573fb772c06-1 | Read moreCrowdCasts Monthly: You Have an Adversary Problem1 of 35Download NowDownload to read offlineRecommendedCyber espionage nation state-apt_attacks_on_the_riseCyber espionage nation state-apt_attacks_on_the_riseCyphort You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prev... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
0573fb772c06-2 | for the masses: Storytelling with ATT&CKKnowledge for the masses: Storytelling with ATT&CKMITRE ATT&CK Cyber Threat IntelligenceCyber Threat Intelligenceseadeloitte Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-onSplunk Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving f... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
0573fb772c06-3 | Data Sources for Minimum Viable Detection; ...MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ... MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,... MITRE ATT&CKcon 2.0: ATT&CK Upda... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
0573fb772c06-4 | for ICS Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence Similar to CrowdCasts Monthly: You Have an Adversary ProblemCrowdCast Monthly: Operationalizing IntelligenceCrowdC... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
0573fb772c06-5 | no more chewy centers- the zero trust modelForrester no more chewy centers- the zero trust modelCristian Garcia G. Is Your Organization in Crisis?Is Your Organization in Crisis?BlackBerry Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Priv... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
0573fb772c06-6 | 11 terp_breuer_disclosure_master Data science unit introductionData science unit introduction A Report On The Attack Automation StrategyA Report On The Attack Automation Strategy Forrester no more chewy centers- the zero trust modelForrester no more chewy centers- the zero trust model Is Your Organization in Crisis... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
0573fb772c06-7 | Journal & Pyresso: A Python-Based Framework for Debugging JavaJava Journal & Pyresso: A Python-Based Framework for Debugging JavaCrowdStrike Venom Venom CrowdStrike CrowdCasts Monthly: Going Beyond the IndicatorCrowdCasts Monthly: Going Beyond the IndicatorCrowdStrike CrowdCasts Monthly: Mitigating Pass the HashCrowdCa... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
0573fb772c06-8 | Morphing Beyond The Ability Of Standard ... How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security Battling Unknown Malware with Machine Learning Battling Un... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
0573fb772c06-9 | Presentation_Overview_ISO_16140-3_Method_verification_20210322.pptxssuser796efb Navigating the Never Normal Strategies for Portfolio LeadersNavigating the Never Normal Strategies for Portfolio LeadersOnePlan Solutions Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...Getting Started with M... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
0573fb772c06-10 | (Taka) Wang Recently uploaded (20)Towards a Docker-based architecture for open multi-agent systemsTowards a Docker-based architecture for open multi-agent systems Centre of Circumference - Shot List.docxCentre of Circumference - Shot List.docx Unlocking Hidden Profits: How GenAI Supercharges Industrial OTUnlocking H... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
0573fb772c06-11 | MMCOE - ML CampaignGDSC MMCOE - ML Campaign Connector Corner: Connect to your processes with UiPath Integration Service...Connector Corner: Connect to your processes with UiPath Integration Service... Apollo Price Model - 20180521Apollo Price Model - 20180521 Apollo Cloud Edge Solution - 20180518Apollo Cloud Edge S... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
0573fb772c06-12 | ADVERSARY PROBLEM.
Who’s Targeting You and Why? | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
0573fb772c06-13 | @CROWDSTRIKE | #CROWDCASTS
AGENDA
YOU HAVE AN ADVERSARY PROBLEM.
1.
INTELLIGENCE-DRIVEN SECURITY
2.
ADVERSARY CATEGORIZATION
3.
ADVERSARY GROUPS - OVERVIEW
4.
NOTABLE ACTIVITY – Q3
5.
NEW ACTORS
6.
ACTIONALIZING INTELLIGENCE
2013 CrowdStrike, Inc. All rights reserved.
@CROWDSTRIKE | #CROWDCASTS
Today’s... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
0573fb772c06-14 | Adversary Categorization
CATEGORIZATION| Adversary Groups
Tactics, Techniques, and Practices
Never assume relationships exist
Between indicators
Recognize adversaries are constantly changing
But RECOGNIZE they are HUMAN
CATEGORIZATION
2013 Crowdstrike, Inc. All rights reserved.
Intelligence: Adversary Groups
@... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
0573fb772c06-15 | Notable Activity – Q3
NEW ADVERSARIES
STONE PANDA | NIGHTSHADE PANDA | GOBLIN PANDA | CORSAIR JACKAL
NOTABLE ACTIVITY
DEADEYE JACKAL | NUMBERED PANDA | SILENT CHOLLIMA
2013 Crowdstrike, Inc. All rights reserved.
11
NEW ACTORS
2013 CrowdStrike, Inc. All rights reserved.
12
Intelligence: STONE PANDA
OPERATIONAL
... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
0573fb772c06-16 | 15
@CROWDSTRIKE | #CROWDCASTS
Target Sectors: Media; NGO/Int’l
Relations; Universities
WHO IS
NIGHTSHADE
PANDA?
Delivery: Likely spearphishing
Malware: PlugX and Poison Ivy
Known Poison Ivy passwords: synnia
C2 Indicators: www.adv138mail.com;
pu.flowershow.org; tech.network-sec.net;
184.105.178.83; 199.59.243.106... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
0573fb772c06-17 | TOOLS
Cross Site Scripting (XSS)
2013 CrowdStrike, Inc. All rights reserved.
19
@CROWDSTRIKE | #CROWDCASTS
Timeline: CORSAIR JACKAL
2012 XTnR3v0LT
colludes with Anonymous
group XL3gi0n
January 25, 2013 New
members added
January 22, 2013
XTnR3v0LT announce
formation of TCA
March 1 2013 Announced
compromise of ... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
0573fb772c06-18 | 23
@CROWDSTRIKE | #CROWDCASTS
Timeline: DEADEYE JACKAL
August 26, 2011
May 5, 2011 SEA Mohammad Ahmad Fall 2011 – Spring 2013
Officially Formed Kabbani Killed
Web Defacements
Facebook
Spamming
September 2011
Harvard
Defacement
July 2013 3rd Party
Provider Breaches
February 2013
Twitter Account
Takeovers
August... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
0573fb772c06-19 | 2007 to Present
@CROWDSTRIKE | #CROWDCASTS
TARGETING
Multiple targets in ROK
Global Targets of Opportunity
OBJECTIVES
Recon
Criminal Monetization
Lateral movement
Data Destruction
TOOLS
Custom Malware
2013 CrowdStrike, Inc. All rights reserved.
28
@CROWDSTRIKE | #CROWDCASTS
Target Sectors: Media
WHO IS
SI... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
0573fb772c06-20 | Adversary Microsite
COMING SOON
TRACK: Track current
Adversaries against other
Industry nomenclature
OVERVIEW: Gain insight
Into adversary – new groups
Added weekly
2013 Crowdstrike, Inc. All rights reserved.
32
@CROWDSTRIKE | #CROWDCASTS
RESOURCES
Next up: Enterprise Activity Monitoring
The Power to HUNT
Novemb... | CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md |
c54206032fcd-0 | Threat actor: HolyWater
UUID: fd63031c-4147-4479-b8de-1f2f56289b36
First seen:
Source last modified: 2020-07-30
Threat actor aliases
HolyWater (Kaspersky)
Description
Not much is known about this actor yet.
Sponsor type and motivation
Sponsor:
Motivation:
Country of origin
[Unknown]
Observed attacked secto... | HolyWater.md |
ec1e38a246fb-0 | Reference for threat actor for "HolyWater"
Title: Holy water: ongoing targeted water-holing attack in Asia | Securelist
Source: https://securelist.com/holy-water-ongoing-targeted-water-holing-attack-in-asia/96311/
Content
Holy water: ongoing targeted water-holing attack in Asia | Securelist
Solutions for:
Home Pr... | Holy_water:_ongoing_targeted_water-holing_attack_in_Asia_|_Securelist.md |
ec1e38a246fb-1 | About Us
Transparency
Corporate News
Press Center
Careers
Innovation Hub
Sponsorship
Policy Blog
Contacts
GDPR
Subscribe
Dark mode off
Login
Securelist menu
EnglishRussianSpanish
Existing Customers
Personal
My Kaspersky
Renew your product
Update your product
Customer support
Business
KSOS portal
Kaspersky Bus... | Holy_water:_ongoing_targeted_water-holing_attack_in_Asia_|_Securelist.md |
ec1e38a246fb-2 | APT reports
Holy water: ongoing targeted water-holing attack in Asia
APT reports
31 Mar 2020
minute read
Authors
Ivan Kwiatkowski
Félix Aime
Pierre Delcher
On December 4, 2019, we discovered watering hole websites that were compromised to selectively trigger a drive-by download attack with fake Adobe Flash upd... | Holy_water:_ongoing_targeted_water-holing_attack_in_Asia_|_Securelist.md |
End of preview. Expand in Data Studio
No dataset card yet
- Downloads last month
- 13