Dataset Viewer
Auto-converted to Parquet Duplicate
id
stringlengths
14
16
text
stringlengths
2
3.37k
source
stringlengths
4
237
a7d6ee979b1a-0
Threat actor: Big Panda UUID: 4777aa1a-1bc4-4f81-8c1d-9c50c739d314 First seen: Source last modified: 2020-04-19 Threat actor aliases Big Panda (CrowdStrike) Description A threat actor mentioned in a summary report only, so we don't know who they are yet. Sponsor type and motivation Sponsor: Motivation: Count...
Big_Panda.md
21fc39088816-0
Reference for threat actor for "Big Panda" Title: CrowdStrike Falcon Traces Attacks Back To Hackers Source: http://www.darkreading.com/attacks-and-breaches/crowdstrike-falcon-traces-attacks-back-to-hackers/d/d-id/1110402 Content
CrowdStrike_Falcon_Traces_Attacks_Back_To_Hackers.md
21fc39088816-1
CrowdStrike Falcon Traces Attacks Back To HackersDark Reading is part of the Informa Tech Division of Informa PLCInforma PLC|ABOUT US|INVESTOR RELATIONS|TALENTThis site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, Lo...
CrowdStrike_Falcon_Traces_Attacks_Back_To_Hackers.md
21fc39088816-2
is, what did they do [on your network], what did they take, which commands did they execute?" The service works in part by running a small (400 KB) "sensor" on Windows 7 and Mac OS X systems, bolstered by DNS, email and API sensors on servers, to track the types of attacks that are being launched. CrowdStrike then corr...
CrowdStrike_Falcon_Traces_Attacks_Back_To_Hackers.md
21fc39088816-3
targeting."CrowdStrike has grouped attackers into "adversary groups" -- to date, about 48 in total -- named for country characteristics: "pandas" for groups operating from China; "cats" as in Persian cats for Iran; "bears" for Russia; "saints" for Georgia; and "tigers" for India. "Some in the community refer to the adv...
CrowdStrike_Falcon_Traces_Attacks_Back_To_Hackers.md
21fc39088816-4
legal action against that individual or the company," he said. "A lot of companies are multinationals, so you can actually sue them in the United States -- or in a jurisdiction of your choosing overseas, and get criminal damages or injunctive relief for stolen information."Alperovitch said that when it comes to respond...
CrowdStrike_Falcon_Traces_Attacks_Back_To_Hackers.md
21fc39088816-5
Talent & Tel Aviv's Light RailCISO Corner: DoD Regs, Neurodiverse Talent & Tel Aviv's Light RailbyTara Seals, Managing Editor, News, Dark ReadingFeb 9, 20249 Min ReadA survey asking is stress good or bad Сloud SecurityIvanti Gets Poor Marks for Cyber Incident ResponseIvanti Gets Poor Marks for Cyber Incident Responseby...
CrowdStrike_Falcon_Traces_Attacks_Back_To_Hackers.md
c66693ce84f3-0
Threat actor: Boulder Bear UUID: fb8e2216-5e84-49ad-b187-58b457cfa95f First seen: Source last modified: 2020-04-19 Threat actor aliases Boulder Bear (CrowdStrike) Description A threat actor mentioned in a summary report only, so we don't know who they are yet. Sponsor type and motivation Sponsor: Motivation: ...
Boulder_Bear.md
2d9170f36175-0
Threat actor: Clockwork Spider UUID: 93000251-ee2f-4865-9972-3ffe37bc62dd First seen: Source last modified: 2020-04-19 Threat actor aliases Clockwork Spider (CrowdStrike) Description A threat actor mentioned in a summary report only, so we don't know who they are yet. Sponsor type and motivation Sponsor: Moti...
Clockwork_Spider.md
4cd2e1e6de27-0
Threat actor: Corsair Jackal UUID: 232c92dc-f380-4291-beca-a2e59b502449 First seen: Source last modified: 2020-04-22 Threat actor aliases Corsair Jackal (CrowdStrike), TunisianCyberArmy (?) Description A threat actor mentioned in a summary report only, so we don't know who they are yet. Sponsor type and motivat...
Corsair_Jackal.md
9d1b3dffcca3-0
Reference for threat actor for "Corsair Jackal" Title: Research & Threat Intel Archives - crowdstrike.com Source: https://www.crowdstrike.com/blog/regional-conflict-and-cyber-blowback/ Content Research & Threat Intel Archives - crowdstrike.com Research & Threat Intel TRY CROWDSTRIKE FREE FOR 15 DAYS GET STARTED W...
Research_&_Threat_Intel_Archives_-_crowdstrike.com.md
50c724dcca17-0
Threat actor: Dextorous Spider UUID: e7fb49f3-44b5-427d-93fc-570fcd7b4573 First seen: Source last modified: 2022-12-31 Threat actor aliases Dextorous Spider (CrowdStrike) Description A threat actor mentioned in a summary report only, so we don't know who they are yet. Sponsor type and motivation Sponsor: Moti...
Dextorous_Spider.md
858e2f380084-0
Threat actor: Dizzy Panda UUID: d15c1ebf-af3b-4672-9900-e99ca12fa672 First seen: Source last modified: 2022-12-31 Threat actor aliases Dizzy Panda (CrowdStrike), LadyBoyle (FireEye) Description A threat actor mentioned in a summary report only, so we don't know who they are yet. Sponsor type and motivation Spo...
Dizzy_Panda.md
f54c534ab5fd-0
Threat actor: Electric Panda UUID: 8910334c-3302-4ecd-9119-8d78a02b58ea First seen: Source last modified: 2020-04-19 Threat actor aliases Electric Panda (CrowdStrike) Description A threat actor mentioned in a summary report only, so we don't know who they are yet. Sponsor type and motivation Sponsor: Motivati...
Electric_Panda.md
85df15c08c49-0
Reference for threat actor for "Electric Panda" Title: CrowdCasts Monthly: You Have an Adversary Problem | PPT Source: http://www.slideshare.net/CrowdStrike/crowd-casts-monthly-you-have-an-adversary-problem Content CrowdCasts Monthly: You Have an Adversary Problem | PPTSubmit SearchUploadCrowdCasts Monthly: You Hav...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
85df15c08c49-1
Read moreCrowdCasts Monthly: You Have an Adversary Problem1 of 35Download NowDownload to read offlineRecommendedCyber espionage nation state-apt_attacks_on_the_riseCyber espionage nation state-apt_attacks_on_the_riseCyphort You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prev...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
85df15c08c49-2
for the masses: Storytelling with ATT&CKKnowledge for the masses: Storytelling with ATT&CKMITRE ATT&CK Cyber Threat IntelligenceCyber Threat Intelligenceseadeloitte Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-onSplunk Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving f...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
85df15c08c49-3
Data Sources for Minimum Viable Detection; ...MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ... MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,... MITRE ATT&CKcon 2.0: ATT&CK Upda...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
85df15c08c49-4
for ICS Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence Similar to CrowdCasts Monthly: You Have an Adversary ProblemCrowdCast Monthly: Operationalizing IntelligenceCrowdC...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
85df15c08c49-5
no more chewy centers- the zero trust modelForrester no more chewy centers- the zero trust modelCristian Garcia G. Is Your Organization in Crisis?Is Your Organization in Crisis?BlackBerry Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Priv...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
85df15c08c49-6
11 terp_breuer_disclosure_master Data science unit introductionData science unit introduction A Report On The Attack Automation StrategyA Report On The Attack Automation Strategy Forrester no more chewy centers- the zero trust modelForrester no more chewy centers- the zero trust model Is Your Organization in Crisis...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
85df15c08c49-7
Journal & Pyresso: A Python-Based Framework for Debugging JavaJava Journal & Pyresso: A Python-Based Framework for Debugging JavaCrowdStrike Venom Venom CrowdStrike CrowdCasts Monthly: Going Beyond the IndicatorCrowdCasts Monthly: Going Beyond the IndicatorCrowdStrike CrowdCasts Monthly: Mitigating Pass the HashCrowdCa...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
85df15c08c49-8
Morphing Beyond The Ability Of Standard ... How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security Battling Unknown Malware with Machine Learning Battling Un...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
85df15c08c49-9
Presentation_Overview_ISO_16140-3_Method_verification_20210322.pptxssuser796efb Navigating the Never Normal Strategies for Portfolio LeadersNavigating the Never Normal Strategies for Portfolio LeadersOnePlan Solutions Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...Getting Started with M...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
85df15c08c49-10
(Taka) Wang Recently uploaded (20)Towards a Docker-based architecture for open multi-agent systemsTowards a Docker-based architecture for open multi-agent systems Centre of Circumference - Shot List.docxCentre of Circumference - Shot List.docx Unlocking Hidden Profits: How GenAI Supercharges Industrial OTUnlocking H...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
85df15c08c49-11
MMCOE - ML CampaignGDSC MMCOE - ML Campaign Connector Corner: Connect to your processes with UiPath Integration Service...Connector Corner: Connect to your processes with UiPath Integration Service... Apollo Price Model - 20180521Apollo Price Model - 20180521 Apollo Cloud Edge Solution - 20180518Apollo Cloud Edge S...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
85df15c08c49-12
ADVERSARY PROBLEM. Who’s Targeting You and Why?
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
85df15c08c49-13
@CROWDSTRIKE | #CROWDCASTS AGENDA YOU HAVE AN ADVERSARY PROBLEM. 1. INTELLIGENCE-DRIVEN SECURITY 2. ADVERSARY CATEGORIZATION 3. ADVERSARY GROUPS - OVERVIEW 4. NOTABLE ACTIVITY – Q3 5. NEW ACTORS 6. ACTIONALIZING INTELLIGENCE 2013 CrowdStrike, Inc. All rights reserved. @CROWDSTRIKE | #CROWDCASTS Today’s...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
85df15c08c49-14
Adversary Categorization CATEGORIZATION| Adversary Groups Tactics, Techniques, and Practices Never assume relationships exist Between indicators Recognize adversaries are constantly changing But RECOGNIZE they are HUMAN CATEGORIZATION 2013 Crowdstrike, Inc. All rights reserved. Intelligence: Adversary Groups @...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
85df15c08c49-15
Notable Activity – Q3 NEW ADVERSARIES STONE PANDA | NIGHTSHADE PANDA | GOBLIN PANDA | CORSAIR JACKAL NOTABLE ACTIVITY DEADEYE JACKAL | NUMBERED PANDA | SILENT CHOLLIMA 2013 Crowdstrike, Inc. All rights reserved. 11 NEW ACTORS 2013 CrowdStrike, Inc. All rights reserved. 12 Intelligence: STONE PANDA OPERATIONAL ...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
85df15c08c49-16
15 @CROWDSTRIKE | #CROWDCASTS Target Sectors: Media; NGO/Int’l Relations; Universities WHO IS NIGHTSHADE PANDA? Delivery: Likely spearphishing Malware: PlugX and Poison Ivy Known Poison Ivy passwords: synnia C2 Indicators: www.adv138mail.com; pu.flowershow.org; tech.network-sec.net; 184.105.178.83; 199.59.243.106...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
85df15c08c49-17
TOOLS Cross Site Scripting (XSS) 2013 CrowdStrike, Inc. All rights reserved. 19 @CROWDSTRIKE | #CROWDCASTS Timeline: CORSAIR JACKAL 2012 XTnR3v0LT colludes with Anonymous group XL3gi0n January 25, 2013 New members added January 22, 2013 XTnR3v0LT announce formation of TCA March 1 2013 Announced compromise of ...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
85df15c08c49-18
23 @CROWDSTRIKE | #CROWDCASTS Timeline: DEADEYE JACKAL August 26, 2011 May 5, 2011 SEA Mohammad Ahmad Fall 2011 – Spring 2013 Officially Formed Kabbani Killed Web Defacements Facebook Spamming September 2011 Harvard Defacement July 2013 3rd Party Provider Breaches February 2013 Twitter Account Takeovers August...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
85df15c08c49-19
2007 to Present @CROWDSTRIKE | #CROWDCASTS TARGETING Multiple targets in ROK Global Targets of Opportunity OBJECTIVES Recon Criminal Monetization Lateral movement Data Destruction TOOLS Custom Malware 2013 CrowdStrike, Inc. All rights reserved. 28 @CROWDSTRIKE | #CROWDCASTS Target Sectors: Media WHO IS SI...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
85df15c08c49-20
Adversary Microsite COMING SOON TRACK: Track current Adversaries against other Industry nomenclature OVERVIEW: Gain insight Into adversary – new groups Added weekly 2013 Crowdstrike, Inc. All rights reserved. 32 @CROWDSTRIKE | #CROWDCASTS RESOURCES Next up: Enterprise Activity Monitoring The Power to HUNT Novemb...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
d2e2025ce999-0
Threat actor: Eloquent Panda UUID: b01e489b-df53-40aa-9b98-d9d856de7074 First seen: Source last modified: 2020-04-19 Threat actor aliases Eloquent Panda (CrowdStrike) Description A threat actor mentioned in a summary report only, so we don't know who they are yet. Sponsor type and motivation Sponsor: Motivati...
Eloquent_Panda.md
be950c94cf40-0
Reference for threat actor for "Eloquent Panda" Title: CrowdCasts Monthly: You Have an Adversary Problem | PPT Source: http://www.slideshare.net/CrowdStrike/crowd-casts-monthly-you-have-an-adversary-problem Content CrowdCasts Monthly: You Have an Adversary Problem | PPTSubmit SearchUploadCrowdCasts Monthly: You Hav...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
be950c94cf40-1
Read moreCrowdCasts Monthly: You Have an Adversary Problem1 of 35Download NowDownload to read offlineRecommendedCyber espionage nation state-apt_attacks_on_the_riseCyber espionage nation state-apt_attacks_on_the_riseCyphort You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prev...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
be950c94cf40-2
for the masses: Storytelling with ATT&CKKnowledge for the masses: Storytelling with ATT&CKMITRE ATT&CK Cyber Threat IntelligenceCyber Threat Intelligenceseadeloitte Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-onSplunk Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving f...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
be950c94cf40-3
Data Sources for Minimum Viable Detection; ...MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ... MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,... MITRE ATT&CKcon 2.0: ATT&CK Upda...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
be950c94cf40-4
for ICS Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence Similar to CrowdCasts Monthly: You Have an Adversary ProblemCrowdCast Monthly: Operationalizing IntelligenceCrowdC...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
be950c94cf40-5
no more chewy centers- the zero trust modelForrester no more chewy centers- the zero trust modelCristian Garcia G. Is Your Organization in Crisis?Is Your Organization in Crisis?BlackBerry Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Priv...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
be950c94cf40-6
11 terp_breuer_disclosure_master Data science unit introductionData science unit introduction A Report On The Attack Automation StrategyA Report On The Attack Automation Strategy Forrester no more chewy centers- the zero trust modelForrester no more chewy centers- the zero trust model Is Your Organization in Crisis...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
be950c94cf40-7
Journal & Pyresso: A Python-Based Framework for Debugging JavaJava Journal & Pyresso: A Python-Based Framework for Debugging JavaCrowdStrike Venom Venom CrowdStrike CrowdCasts Monthly: Going Beyond the IndicatorCrowdCasts Monthly: Going Beyond the IndicatorCrowdStrike CrowdCasts Monthly: Mitigating Pass the HashCrowdCa...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
be950c94cf40-8
Morphing Beyond The Ability Of Standard ... How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security Battling Unknown Malware with Machine Learning Battling Un...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
be950c94cf40-9
Presentation_Overview_ISO_16140-3_Method_verification_20210322.pptxssuser796efb Navigating the Never Normal Strategies for Portfolio LeadersNavigating the Never Normal Strategies for Portfolio LeadersOnePlan Solutions Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...Getting Started with M...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
be950c94cf40-10
(Taka) Wang Recently uploaded (20)Towards a Docker-based architecture for open multi-agent systemsTowards a Docker-based architecture for open multi-agent systems Centre of Circumference - Shot List.docxCentre of Circumference - Shot List.docx Unlocking Hidden Profits: How GenAI Supercharges Industrial OTUnlocking H...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
be950c94cf40-11
MMCOE - ML CampaignGDSC MMCOE - ML Campaign Connector Corner: Connect to your processes with UiPath Integration Service...Connector Corner: Connect to your processes with UiPath Integration Service... Apollo Price Model - 20180521Apollo Price Model - 20180521 Apollo Cloud Edge Solution - 20180518Apollo Cloud Edge S...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
be950c94cf40-12
ADVERSARY PROBLEM. Who’s Targeting You and Why?
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
be950c94cf40-13
@CROWDSTRIKE | #CROWDCASTS AGENDA YOU HAVE AN ADVERSARY PROBLEM. 1. INTELLIGENCE-DRIVEN SECURITY 2. ADVERSARY CATEGORIZATION 3. ADVERSARY GROUPS - OVERVIEW 4. NOTABLE ACTIVITY – Q3 5. NEW ACTORS 6. ACTIONALIZING INTELLIGENCE 2013 CrowdStrike, Inc. All rights reserved. @CROWDSTRIKE | #CROWDCASTS Today’s...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
be950c94cf40-14
Adversary Categorization CATEGORIZATION| Adversary Groups Tactics, Techniques, and Practices Never assume relationships exist Between indicators Recognize adversaries are constantly changing But RECOGNIZE they are HUMAN CATEGORIZATION 2013 Crowdstrike, Inc. All rights reserved. Intelligence: Adversary Groups @...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
be950c94cf40-15
Notable Activity – Q3 NEW ADVERSARIES STONE PANDA | NIGHTSHADE PANDA | GOBLIN PANDA | CORSAIR JACKAL NOTABLE ACTIVITY DEADEYE JACKAL | NUMBERED PANDA | SILENT CHOLLIMA 2013 Crowdstrike, Inc. All rights reserved. 11 NEW ACTORS 2013 CrowdStrike, Inc. All rights reserved. 12 Intelligence: STONE PANDA OPERATIONAL ...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
be950c94cf40-16
15 @CROWDSTRIKE | #CROWDCASTS Target Sectors: Media; NGO/Int’l Relations; Universities WHO IS NIGHTSHADE PANDA? Delivery: Likely spearphishing Malware: PlugX and Poison Ivy Known Poison Ivy passwords: synnia C2 Indicators: www.adv138mail.com; pu.flowershow.org; tech.network-sec.net; 184.105.178.83; 199.59.243.106...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
be950c94cf40-17
TOOLS Cross Site Scripting (XSS) 2013 CrowdStrike, Inc. All rights reserved. 19 @CROWDSTRIKE | #CROWDCASTS Timeline: CORSAIR JACKAL 2012 XTnR3v0LT colludes with Anonymous group XL3gi0n January 25, 2013 New members added January 22, 2013 XTnR3v0LT announce formation of TCA March 1 2013 Announced compromise of ...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
be950c94cf40-18
23 @CROWDSTRIKE | #CROWDCASTS Timeline: DEADEYE JACKAL August 26, 2011 May 5, 2011 SEA Mohammad Ahmad Fall 2011 – Spring 2013 Officially Formed Kabbani Killed Web Defacements Facebook Spamming September 2011 Harvard Defacement July 2013 3rd Party Provider Breaches February 2013 Twitter Account Takeovers August...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
be950c94cf40-19
2007 to Present @CROWDSTRIKE | #CROWDCASTS TARGETING Multiple targets in ROK Global Targets of Opportunity OBJECTIVES Recon Criminal Monetization Lateral movement Data Destruction TOOLS Custom Malware 2013 CrowdStrike, Inc. All rights reserved. 28 @CROWDSTRIKE | #CROWDCASTS Target Sectors: Media WHO IS SI...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
be950c94cf40-20
Adversary Microsite COMING SOON TRACK: Track current Adversaries against other Industry nomenclature OVERVIEW: Gain insight Into adversary – new groups Added weekly 2013 Crowdstrike, Inc. All rights reserved. 32 @CROWDSTRIKE | #CROWDCASTS RESOURCES Next up: Enterprise Activity Monitoring The Power to HUNT Novemb...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
102417e244c9-0
Threat actor: Flyfox UUID: b958b665-65cf-4d36-9eb3-5cd95c566abf First seen: Source last modified: 2020-05-01 Threat actor aliases Flyfox (Kaspersky) Description A threat actor mentioned in a summary report only, so we don't know who they are yet. Sponsor type and motivation Sponsor: Motivation: Country of or...
Flyfox.md
5a8b9067a656-0
Reference for threat actor for "Flyfox" Title: APT Review of the year | Securelist Source: https://securelist.com/apt-review-of-the-year/89117/ Content APT Review of the year | Securelist Solutions for: Home Products Small Business 1-50 employees Medium Business 51-999 employees Enterprise 1000+ employees by Kas...
APT_Review_of_the_year_|_Securelist.md
5a8b9067a656-1
Transparency Corporate News Press Center Careers Innovation Hub Sponsorship Policy Blog Contacts GDPR Subscribe Dark mode off Login Securelist menu EnglishRussianSpanish Existing Customers Personal My Kaspersky Renew your product Update your product Customer support Business KSOS portal Kaspersky Business Hub ...
APT_Review_of_the_year_|_Securelist.md
5a8b9067a656-2
What were the most interesting developments in terms of APT activity throughout the year and what can we learn from them? Not an easy question to answer; everybody has partial visibility and it’s never possible to really understand the motivations of some attacks or the developments behind them. Still, with the benefit...
APT_Review_of_the_year_|_Securelist.md
5a8b9067a656-3
During the year we understood that Sofacy appears to be changing at a structural level and is possibly already being split into different subgroups. With the OlympicDestroyer analysis we learnt that this highly sophisticated false flag operation was somehow related to Sofacy. However, we later observed more activity by...
APT_Review_of_the_year_|_Securelist.md
5a8b9067a656-4
Finally, some potential CozyDuke activity was detected during November 2018, apparently targeting diplomatic and governmental entities in Europe. The TTPs do not seem to be those that are usually attributed to this actor, which opened the door to speculation about this malware being used by a different group. The facts...
APT_Review_of_the_year_|_Securelist.md
5a8b9067a656-5
The whole OlympicDestroyer story eventually resulted in the discovery of a new subset of activity related to both Sofacy and BlackEnergy that we call Hades. We will see how these more sophisticated false flags evolve in the future and how they are used to pursue less explicit goals. On the forgotten ones Throughout the...
APT_Review_of_the_year_|_Securelist.md
5a8b9067a656-6
Scarcruft used a new backdoor we call PoorWeb, deployed a 0-day in their campaign at the beginning of the year and used Android malware specially designed for Samsung devices. DarkHotel was also back with a 0-day and new activity, targeting their traditional victims. We were able to establish a connection with a medium...
APT_Review_of_the_year_|_Securelist.md
5a8b9067a656-7
In the Middle East we saw activity by LazyMerkaats, FruityArmor, OpParliament, DarkHydrus and DomesticKitten among others. Sets of activity such as that by the Gorgon group are a bit of an exception as they also target victims outside the region. Finally, we also detected new sets of activity that show an apparent inte...
APT_Review_of_the_year_|_Securelist.md
5a8b9067a656-8
We also observed several attacks against journalists, activists, political dissidents and NGOs around the world. Many of these attacks involved malware developed by companies that provide surveillance tools to governments. For instance, NSO and its Pegasus malware was discovered in more than 43 countries according to a...
APT_Review_of_the_year_|_Securelist.md
5a8b9067a656-9
The US also provided details about a North Korean citizen suspected of being part of the Lazarus group that was behind the Sony Entertainment attack and WannaCry activity, and who is now wanted by the FBI. Maybe in an unrelated note, the US Cert was very active during the year in providing indicators of compromise and ...
APT_Review_of_the_year_|_Securelist.md
5a8b9067a656-10
That leads on to something we actually saw in the VPNFilter attack, in this case targeting networking devices on a massive scale. This campaign, attributed to a Russian-speaking set of activity, allowed attackers to infect hundreds of thousands of devices, providing control of the network traffic as well as allowing MI...
APT_Review_of_the_year_|_Securelist.md
5a8b9067a656-11
APT Industrial threats Lazarus Nation State Sponsored Espionage Olympic Destroyer Sofacy Targeted attacks Turla Authors Vicente Diaz Costin Raiu APT review of the year Your email address will not be published. Required fields are marked *Name * Email * Cancel GReAT webinars GReAT Ideas. Balalaika Edition Bor...
APT_Review_of_the_year_|_Securelist.md
5a8b9067a656-12
Subscribe In the same category HrServ – Previously unknown web shell used in APT attack Modern Asian APT groups’ tactics, techniques and procedures (TTPs) A cascade of compromise: unveiling Lazarus’ new campaign How to catch a wild triangle StripedFly: Perennially flying under the radar Latest Posts Malware des...
APT_Review_of_the_year_|_Securelist.md
5a8b9067a656-13
A cascade of compromise: unveiling Lazarus’ new campaign We unveil a Lazarus campaign exploiting security company products and examine its intricate connections with other campaigns How to catch a wild triangle How Kaspersky researchers obtained all stages of the Operation Triangulation campaign targeting iPhones an...
APT_Review_of_the_year_|_Securelist.md
13fd5db28e89-0
Threat actor: Foxy Panda UUID: d7c799fd-409a-4c6b-8785-4ece69624974 First seen: Source last modified: 2020-04-19 Threat actor aliases Foxy Panda (CrowdStrike) Description A threat actor mentioned in a summary report only, so we don't know who they are yet. Sponsor type and motivation Sponsor: Motivation: Cou...
Foxy_Panda.md
047723819c55-0
Threat actor: Ghost Jackal UUID: 681ddb54-e107-4bfc-a03a-22746088f3cb First seen: Source last modified: 2020-04-19 Threat actor aliases Ghost Jackal (CrowdStrike) Description A threat actor mentioned in a summary report only, so we don't know who they are yet. Sponsor type and motivation Sponsor: Motivation: ...
Ghost_Jackal.md
ce6688940ad1-0
Threat actor: Gibberish Panda UUID: 2e02e064-74f7-4bbe-8b3b-43be290f91f8 First seen: Source last modified: 2020-04-19 Threat actor aliases Gibberish Panda (CrowdStrike) Description A threat actor mentioned in a summary report only, so we don't know who they are yet. Sponsor type and motivation Sponsor: Motiva...
Gibberish_Panda.md
0573fb772c06-0
Reference for threat actor for "Gibberish Panda" Title: CrowdCasts Monthly: You Have an Adversary Problem | PPT Source: http://www.slideshare.net/CrowdStrike/crowd-casts-monthly-you-have-an-adversary-problem Content CrowdCasts Monthly: You Have an Adversary Problem | PPTSubmit SearchUploadCrowdCasts Monthly: You Ha...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
0573fb772c06-1
Read moreCrowdCasts Monthly: You Have an Adversary Problem1 of 35Download NowDownload to read offlineRecommendedCyber espionage nation state-apt_attacks_on_the_riseCyber espionage nation state-apt_attacks_on_the_riseCyphort You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prev...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
0573fb772c06-2
for the masses: Storytelling with ATT&CKKnowledge for the masses: Storytelling with ATT&CKMITRE ATT&CK Cyber Threat IntelligenceCyber Threat Intelligenceseadeloitte Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-onSplunk Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving f...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
0573fb772c06-3
Data Sources for Minimum Viable Detection; ...MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ... MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,...MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK,... MITRE ATT&CKcon 2.0: ATT&CK Upda...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
0573fb772c06-4
for ICS Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence Similar to CrowdCasts Monthly: You Have an Adversary ProblemCrowdCast Monthly: Operationalizing IntelligenceCrowdC...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
0573fb772c06-5
no more chewy centers- the zero trust modelForrester no more chewy centers- the zero trust modelCristian Garcia G. Is Your Organization in Crisis?Is Your Organization in Crisis?BlackBerry Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Priv...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
0573fb772c06-6
11 terp_breuer_disclosure_master Data science unit introductionData science unit introduction A Report On The Attack Automation StrategyA Report On The Attack Automation Strategy Forrester no more chewy centers- the zero trust modelForrester no more chewy centers- the zero trust model Is Your Organization in Crisis...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
0573fb772c06-7
Journal & Pyresso: A Python-Based Framework for Debugging JavaJava Journal & Pyresso: A Python-Based Framework for Debugging JavaCrowdStrike Venom Venom CrowdStrike CrowdCasts Monthly: Going Beyond the IndicatorCrowdCasts Monthly: Going Beyond the IndicatorCrowdStrike CrowdCasts Monthly: Mitigating Pass the HashCrowdCa...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
0573fb772c06-8
Morphing Beyond The Ability Of Standard ... How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security Battling Unknown Malware with Machine Learning Battling Un...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
0573fb772c06-9
Presentation_Overview_ISO_16140-3_Method_verification_20210322.pptxssuser796efb Navigating the Never Normal Strategies for Portfolio LeadersNavigating the Never Normal Strategies for Portfolio LeadersOnePlan Solutions Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...Getting Started with M...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
0573fb772c06-10
(Taka) Wang Recently uploaded (20)Towards a Docker-based architecture for open multi-agent systemsTowards a Docker-based architecture for open multi-agent systems Centre of Circumference - Shot List.docxCentre of Circumference - Shot List.docx Unlocking Hidden Profits: How GenAI Supercharges Industrial OTUnlocking H...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
0573fb772c06-11
MMCOE - ML CampaignGDSC MMCOE - ML Campaign Connector Corner: Connect to your processes with UiPath Integration Service...Connector Corner: Connect to your processes with UiPath Integration Service... Apollo Price Model - 20180521Apollo Price Model - 20180521 Apollo Cloud Edge Solution - 20180518Apollo Cloud Edge S...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
0573fb772c06-12
ADVERSARY PROBLEM. Who’s Targeting You and Why?
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
0573fb772c06-13
@CROWDSTRIKE | #CROWDCASTS AGENDA YOU HAVE AN ADVERSARY PROBLEM. 1. INTELLIGENCE-DRIVEN SECURITY 2. ADVERSARY CATEGORIZATION 3. ADVERSARY GROUPS - OVERVIEW 4. NOTABLE ACTIVITY – Q3 5. NEW ACTORS 6. ACTIONALIZING INTELLIGENCE 2013 CrowdStrike, Inc. All rights reserved. @CROWDSTRIKE | #CROWDCASTS Today’s...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
0573fb772c06-14
Adversary Categorization CATEGORIZATION| Adversary Groups Tactics, Techniques, and Practices Never assume relationships exist Between indicators Recognize adversaries are constantly changing But RECOGNIZE they are HUMAN CATEGORIZATION 2013 Crowdstrike, Inc. All rights reserved. Intelligence: Adversary Groups @...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
0573fb772c06-15
Notable Activity – Q3 NEW ADVERSARIES STONE PANDA | NIGHTSHADE PANDA | GOBLIN PANDA | CORSAIR JACKAL NOTABLE ACTIVITY DEADEYE JACKAL | NUMBERED PANDA | SILENT CHOLLIMA 2013 Crowdstrike, Inc. All rights reserved. 11 NEW ACTORS 2013 CrowdStrike, Inc. All rights reserved. 12 Intelligence: STONE PANDA OPERATIONAL ...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
0573fb772c06-16
15 @CROWDSTRIKE | #CROWDCASTS Target Sectors: Media; NGO/Int’l Relations; Universities WHO IS NIGHTSHADE PANDA? Delivery: Likely spearphishing Malware: PlugX and Poison Ivy Known Poison Ivy passwords: synnia C2 Indicators: www.adv138mail.com; pu.flowershow.org; tech.network-sec.net; 184.105.178.83; 199.59.243.106...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
0573fb772c06-17
TOOLS Cross Site Scripting (XSS) 2013 CrowdStrike, Inc. All rights reserved. 19 @CROWDSTRIKE | #CROWDCASTS Timeline: CORSAIR JACKAL 2012 XTnR3v0LT colludes with Anonymous group XL3gi0n January 25, 2013 New members added January 22, 2013 XTnR3v0LT announce formation of TCA March 1 2013 Announced compromise of ...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
0573fb772c06-18
23 @CROWDSTRIKE | #CROWDCASTS Timeline: DEADEYE JACKAL August 26, 2011 May 5, 2011 SEA Mohammad Ahmad Fall 2011 – Spring 2013 Officially Formed Kabbani Killed Web Defacements Facebook Spamming September 2011 Harvard Defacement July 2013 3rd Party Provider Breaches February 2013 Twitter Account Takeovers August...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
0573fb772c06-19
2007 to Present @CROWDSTRIKE | #CROWDCASTS TARGETING Multiple targets in ROK Global Targets of Opportunity OBJECTIVES Recon Criminal Monetization Lateral movement Data Destruction TOOLS Custom Malware 2013 CrowdStrike, Inc. All rights reserved. 28 @CROWDSTRIKE | #CROWDCASTS Target Sectors: Media WHO IS SI...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
0573fb772c06-20
Adversary Microsite COMING SOON TRACK: Track current Adversaries against other Industry nomenclature OVERVIEW: Gain insight Into adversary – new groups Added weekly 2013 Crowdstrike, Inc. All rights reserved. 32 @CROWDSTRIKE | #CROWDCASTS RESOURCES Next up: Enterprise Activity Monitoring The Power to HUNT Novemb...
CrowdCasts_Monthly:_You_Have_an_Adversary_Problem_|_PPT.md
c54206032fcd-0
Threat actor: HolyWater UUID: fd63031c-4147-4479-b8de-1f2f56289b36 First seen: Source last modified: 2020-07-30 Threat actor aliases HolyWater (Kaspersky) Description Not much is known about this actor yet. Sponsor type and motivation Sponsor: Motivation: Country of origin [Unknown] Observed attacked secto...
HolyWater.md
ec1e38a246fb-0
Reference for threat actor for "HolyWater" Title: Holy water: ongoing targeted water-holing attack in Asia | Securelist Source: https://securelist.com/holy-water-ongoing-targeted-water-holing-attack-in-asia/96311/ Content Holy water: ongoing targeted water-holing attack in Asia | Securelist Solutions for: Home Pr...
Holy_water:_ongoing_targeted_water-holing_attack_in_Asia_|_Securelist.md
ec1e38a246fb-1
About Us Transparency Corporate News Press Center Careers Innovation Hub Sponsorship Policy Blog Contacts GDPR Subscribe Dark mode off Login Securelist menu EnglishRussianSpanish Existing Customers Personal My Kaspersky Renew your product Update your product Customer support Business KSOS portal Kaspersky Bus...
Holy_water:_ongoing_targeted_water-holing_attack_in_Asia_|_Securelist.md
ec1e38a246fb-2
APT reports Holy water: ongoing targeted water-holing attack in Asia APT reports 31 Mar 2020 minute read Authors Ivan Kwiatkowski Félix Aime Pierre Delcher On December 4, 2019, we discovered watering hole websites that were compromised to selectively trigger a drive-by download attack with fake Adobe Flash upd...
Holy_water:_ongoing_targeted_water-holing_attack_in_Asia_|_Securelist.md
End of preview. Expand in Data Studio

No dataset card yet

Downloads last month
13