Guest User

Cyber Safari

a guest
Jun 14th, 2020
631
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
HTML 10.36 KB | None | 0 0
  1. Netherlands
  2. Hacking Back Against APT28 https://web.archive.org/web/20200213005201/https://www.volkskrant.nl/wetenschap/dutch-agencies-provide-crucial-intel-about-russia-s-interference-in-us-elections~b4f8111b/
  3. France
  4. Animal Farm (Source)
  5. https://resources.infosecinstitute.com/animal-farm-apt-and-the-shadow-of-france-intelligence/
  6. https://www.gdatasoftware.com/blog/2015/02/24270-babar-espionage-software-finally-found-and-put-under-the-microscope
  7.  
  8. Spain
  9. Careto
  10. https://d2538mqrb7brka.cloudfront.net/wp-content/uploads/sites/43/2018/03/20133638/unveilingthemask_v1.0.pdf
  11. https://securelist.com/the-caretomask-apt-frequently-asked-questions/58254/
  12. https://www.kaspersky.com/blog/the-mask-unveiling-the-worlds-most-sophisticated-apt-campaign/3723/
  13. Middle East
  14. Turkey
  15. SeaTurtle
  16. https://www.reuters.com/article/us-cyber-attack-hijack-exclusive/exclusive-hackers-acting-in-turkeys-interests-believed-to-be-behind-recent-cyberattacks-sources-idUSKBN1ZQ10X
  17. https://www.domaintools.com/resources/blog/finding-additional-indicators-with-passive-dns-within-domaintools-iris?
  18. https://blog.talosintelligence.com/2019/04/seaturtle.html
  19. https://blog.talosintelligence.com/2019/07/sea-turtle-keeps-on-swimming.html
  20. StrongPity/Promethium
  21.  
  22. https://cybersecurity.att.com/blogs/labs-research/newly-identified-strongpity-operations
  23. https://www.microsoft.com/security/blog/2016/12/14/microsoft-security-intelligence-report-volume-21-is-now-available/ https://go.microsoft.com/fwlink/p/?linkid=2036108&clcid=0x409&culture=en-us&country=us
  24. https://securelist.com/on-the-strongpity-waterhole-attacks-targeting-italian-and-belgian-encryption-users/76147/
  25.  
  26. https://securelist.com/apt-trends-report-q1-2020/96826/
  27.  
  28. Israel
  29. Unit 8200?
  30. https://www.nytimes.com/2017/10/10/technology/kaspersky-lab-israel-russia-hacking.html
  31. https://securelist.com/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns/70504/
  32. NSO
  33. https://www.telegraph.co.uk/technology/2019/05/14/israels-nso-shadowy-firm-behind-chilling-spyware-used-hack-whatsapp/
  34. https://www.vice.com/en_us/article/gy4vn3/israel-bombing-cyber-operatives-gaza-palestine
  35. https://www.vice.com/en_us/article/qj4p3w/nso-group-hack-fake-facebook-domain
  36. https://www.forbes.com/sites/thomasbrewster/2020/04/24/facebook-heres-proof-israeli-whatsapp-hackers-ran-cyberweapons-in-america/#271c967b65fa
  37. Lebanon
  38. Dark Caracal
  39. https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf
  40. https://www.dropbox.com/s/qjkcd56v3fhkjou/Whitepaper%20Dark%20Caracal%20Campaign.pdf?dl=0
  41. https://commons.wikimedia.org/w/index.php?curid=74269058
  42.  
  43. UAE
  44. Stealth Falcon/Fruity Armor
  45. https://theintercept.com/2016/10/24/darkmatter-united-arab-emirates-spies-for-hire/
  46. https://www.reuters.com/investigates/special-report/usa-spying-raven/
  47. https://www.reuters.com/investigates/special-report/usa-spying-karma/
  48. https://www.welivesecurity.com/2019/09/09/backdoor-stealth-falcon-group/
  49. https://citizenlab.ca/2016/05/stealth-falcon/
  50. https://securelist.com/windows-zero-day-exploit-used-in-targeted-attacks-by-fruityarmor-apt/76396/
  51.  
  52. Uzbekistan
  53. SandCat
  54. https://www.virusbulletin.com/conference/vb2019/abstracts/who-sandcat-unveiling-lesser-known-threat-actor
  55. https://www.reuters.com/article/us-uzbekistan-cyber/uzbek-spies-attacked-dissidents-with-off-the-shelf-hacking-tools-idUSKBN1WI0YL
  56. https://arstechnica.com/information-technology/2019/10/kaspersky-finds-uzbekistan-hacking-opbecause-they-used-kaspersky-av/
  57. https://www.vice.com/en_us/article/3kx5y3/uzbekistan-hacking-operations-uncovered-due-to-spectacularly-bad-opsec
  58. Pakistan
  59. Gorgon Group
  60. https://unit42.paloaltonetworks.com/unit42-gorgon-group-slithering-nation-state-cybercrime/
  61. https://unit42.paloaltonetworks.com/aggah-campaign-bit-ly-blogspot-and-pastebin-used-for-c2-in-large-scale-campaign/
  62. https://blog.prevailion.com/2019/10/mastermana-botnet.html
  63. https://blog.prevailion.com/2020/02/the-triune-threat-mastermana-returns.html
  64. Mythic Leopard /Transparent Tribe/ APT36                   
  65. https://www.proofpoint.com/sites/default/files/proofpoint-operation-transparent-tribe-threat-insight-en.pdf
  66. https://news.softpedia.com/news/smeshapp-removed-from-play-store-because-pakistan-used-it-to-spy-on-indian-army-501936.shtml   
  67. https://cysinfo.com/cyber-attack-targeting-cbi-and-possibly-indian-army-officials/
  68. https://www.crowdstrike.com/blog/adversary-of-the-month-for-may/   
  69. https://securelist.com/apt-trends-report-q1-2020/96826/
  70. https://blog.malwarebytes.com/threat-analysis/2020/03/apt36-jumps-on-the-coronavirus-bandwagon-delivers-crimson-rat/
  71. Africa
  72. Morocco
  73. https://krebsonsecurity.com/2020/03/french-firms-rocked-by-kasbah-hacker/#more-50623
  74. Asia
  75. India
  76. Bitter
  77. https://ti.qianxin.com/blog/tag/BITTER/
  78. Patchwork/ Viceroy Tiger/ Confucius
  79. https://ti.qianxin.com/blog/articles/analysis-of-apt-c-09-target-china/
  80. https://www.volexity.com/blog/2018/06/07/patchwork-apt-group-targets-us-think-tanks/
  81. https://www.cymmetria.com/wp-content/uploads/2017/10/Unveiling-Patchwork.pdf
  82.  
  83. https://ti.qianxin.com/blog/tag/PATCHWORK/
  84. https://unit42.paloaltonetworks.com/updated-backconfig-malware-targeting-government-and-military-organizations/
  85. APPIN
  86. https://www.eff.org/files/2016/08/03/i-got-a-letter-from-the-government.pdf
  87. Dark basin
  88. https://www.nortonlifelock.com/blogs/security-response/mercenary-amanda-professional-hackers-hire
  89. https://citizenlab.ca/2020/06/dark-basin-uncovering-a-massive-hack-for-hire-operation/
  90.  
  91. South Korea
  92. DarkHotel (Shadow Crane)    
  93. https://www.wired.com/2014/11/darkhotel-malware/
  94. https://labs.bitdefender.com/2017/07/inexsmar-an-unusual-darkhotel-campaign/
  95. https://securelist.com/darkhotels-attacks-in-2015/71713/
  96. CVE-2018-8174
  97. https://ti.qianxin.com/blog/tag/DARKHOTEL/
  98. https://securelist.com/apt-trends-report-q1-2020/96826/
  99. Higaisa
  100. https://s.tencent.com/research/report/836.html
  101. https://malpedia.caad.fkie.fraunhofer.de/actor/higaisa
  102. https://blog.prevailion.com/2020/06/the-gh0st-remains-same8.html
  103. Vietnam
  104. APT32 (Ocean Buffalo)
  105. https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html
  106. https://web.archive.org/web/20190401212746/https://www.bloomberg.com/news/articles/2019-03-20/vietnam-tied-hackers-target-auto-industry-firms-fireeye-says
  107. https://twitter.com/ItsReallyNick/status/1106192887556042752
  108. PhantomLance
  109. https://securelist.com/apt-phantomlance/96772/
  110. Americas
  111. Machete
  112. https://securelist.com/el-machete/66108/
  113. https://threatvector.cylance.com/en_us/home/el-machete-malware-attacks-cut-through-latam.html
  114. https://www.welivesecurity.com/2019/08/05/sharpening-machete-cyberespionage/
  115.  
  116.  
  117. Pictures
  118. Image by <a href="https://pixabay.com/users/12019-12019/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=2499022">David Mark</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=2499022">Pixabay</a>
  119. Image by <a href="https://pixabay.com/users/phototravellers_de-15263457/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=4848741">Florian Westermann</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=4848741">Pixabay</a>
  120. Image by <a href="https://pixabay.com/users/smuldur-5589717/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=4043037">Şinasi Müldür</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=4043037">Pixabay</a>
  121. Image by <a href="https://pixabay.com/users/jdblack-7956575/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=4770774">Jim Black</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=4770774">Pixabay</a>
  122. Image by <a href="https://pixabay.com/users/minka2507-3728206/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=5209899">minka2507</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=5209899">Pixabay</a>
  123. Image by <a href="https://pixabay.com/users/nike159-4320960/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=4686153">Nici Keil</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=4686153">Pixabay</a>
  124. Image by <a href="https://pixabay.com/users/LoggaWiggler-15/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=196901">LoggaWiggler</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=196901">Pixabay</a>
  125. Image by <a href="https://pixabay.com/users/Abdullah_Shakoor-5012922/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=2215996">Abdullah Shakoor</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=2215996">Pixabay</a>
  126. Image by <a href="https://pixabay.com/users/Like_A_Hartman-12528953/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=5273091">Heike Hartmann</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=5273091">Pixabay</a>
  127. Image by <a href="https://pixabay.com/users/12019-12019/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=1797828">David Mark</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=1797828">Pixabay</a>
  128. Image by <a href="https://pixabay.com/users/Nguyendangduy-2852598/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=1492406">Duy Nguyễn Đăng</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=1492406">Pixabay</a>
  129. Image by <a href="https://pixabay.com/users/Like_A_Hartman-12528953/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=4240727">Heike Hartmann</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=4240727">Pixabay</a>
Add Comment
Please, Sign In to add comment