René's URL Explorer Experiment


Title: GitHub - Jacob08/APTnotes: Various public documents, whitepapers and articles about APT campaigns

Open Graph Title: GitHub - Jacob08/APTnotes: Various public documents, whitepapers and articles about APT campaigns

X Title: GitHub - Jacob08/APTnotes: Various public documents, whitepapers and articles about APT campaigns

Description: Various public documents, whitepapers and articles about APT campaigns - Jacob08/APTnotes

Open Graph Description: Various public documents, whitepapers and articles about APT campaigns - Jacob08/APTnotes

X Description: Various public documents, whitepapers and articles about APT campaigns - Jacob08/APTnotes

Opengraph URL: https://github.com/Jacob08/APTnotes

X: @github

direct link

Domain: patch-diff.githubusercontent.com

route-pattern/:user_id/:repository
route-controllerfiles
route-actiondisambiguate
fetch-noncev2:2edba0af-707e-da58-0fca-bab662958805
current-catalog-service-hashf3abb0cc802f3d7b95fc8762b94bdcb13bf39634c40c357301c4aa1d67a256fb
request-idBF86:308A8E:2D64810:3AD38F7:6974D97B
html-safe-noncedf795afb80403fec9d0dbd7aab4c07b101c6d5199a8335f014527418e4f4cba2
visitor-payloadeyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJCRjg2OjMwOEE4RToyRDY0ODEwOjNBRDM4Rjc6Njk3NEQ5N0IiLCJ2aXNpdG9yX2lkIjoiNjE0MDMyNjczNjk2MjA1MDQyNyIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9
visitor-hmac3068ad802c24a2d5e823a0e6959a0c798e3ec0feb126e8fabe3eaba84827896f
hovercard-subject-tagrepository:28680540
github-keyboard-shortcutsrepository,copilot
google-site-verificationApib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I
octolytics-urlhttps://collector.github.com/github/collect
analytics-location//
fb:app_id1401488693436528
apple-itunes-appapp-id=1477376905, app-argument=https://github.com/Jacob08/APTnotes
twitter:imagehttps://opengraph.githubassets.com/686afaba7e4142be69bb41612ed1624d2d893637d0ff89c4d75b3bea5598be04/Jacob08/APTnotes
twitter:cardsummary_large_image
og:imagehttps://opengraph.githubassets.com/686afaba7e4142be69bb41612ed1624d2d893637d0ff89c4d75b3bea5598be04/Jacob08/APTnotes
og:image:altVarious public documents, whitepapers and articles about APT campaigns - Jacob08/APTnotes
og:image:width1200
og:image:height600
og:site_nameGitHub
og:typeobject
hostnamegithub.com
expected-hostnamegithub.com
None4a4bf5f4e28041a9d2e5c107d7d20b78b4294ba261cab243b28167c16a623a1f
turbo-cache-controlno-preview
go-importgithub.com/Jacob08/APTnotes git https://github.com/Jacob08/APTnotes.git
octolytics-dimension-user_id3151711
octolytics-dimension-user_loginJacob08
octolytics-dimension-repository_id28680540
octolytics-dimension-repository_nwoJacob08/APTnotes
octolytics-dimension-repository_publictrue
octolytics-dimension-repository_is_forktrue
octolytics-dimension-repository_parent_id13110052
octolytics-dimension-repository_parent_nwokbandla/APTnotes
octolytics-dimension-repository_network_root_id13110052
octolytics-dimension-repository_network_root_nwokbandla/APTnotes
turbo-body-classeslogged-out env-production page-responsive
disable-turbofalse
browser-stats-urlhttps://api.github.com/_private/browser/stats
browser-errors-urlhttps://api.github.com/_private/browser/errors
release488b30e96dfd057fbbe44c6665ccbc030b729dde
ui-targetfull
theme-color#1e2327
color-schemelight dark

Links:

Skip to contenthttps://patch-diff.githubusercontent.com/Jacob08/APTnotes#start-of-content
https://patch-diff.githubusercontent.com/
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2FJacob08%2FAPTnotes
GitHub CopilotWrite better code with AIhttps://github.com/features/copilot
GitHub SparkBuild and deploy intelligent appshttps://github.com/features/spark
GitHub ModelsManage and compare promptshttps://github.com/features/models
MCP RegistryNewIntegrate external toolshttps://github.com/mcp
ActionsAutomate any workflowhttps://github.com/features/actions
CodespacesInstant dev environmentshttps://github.com/features/codespaces
IssuesPlan and track workhttps://github.com/features/issues
Code ReviewManage code changeshttps://github.com/features/code-review
GitHub Advanced SecurityFind and fix vulnerabilitieshttps://github.com/security/advanced-security
Code securitySecure your code as you buildhttps://github.com/security/advanced-security/code-security
Secret protectionStop leaks before they starthttps://github.com/security/advanced-security/secret-protection
Why GitHubhttps://github.com/why-github
Documentationhttps://docs.github.com
Bloghttps://github.blog
Changeloghttps://github.blog/changelog
Marketplacehttps://github.com/marketplace
View all featureshttps://github.com/features
Enterpriseshttps://github.com/enterprise
Small and medium teamshttps://github.com/team
Startupshttps://github.com/enterprise/startups
Nonprofitshttps://github.com/solutions/industry/nonprofits
App Modernizationhttps://github.com/solutions/use-case/app-modernization
DevSecOpshttps://github.com/solutions/use-case/devsecops
DevOpshttps://github.com/solutions/use-case/devops
CI/CDhttps://github.com/solutions/use-case/ci-cd
View all use caseshttps://github.com/solutions/use-case
Healthcarehttps://github.com/solutions/industry/healthcare
Financial serviceshttps://github.com/solutions/industry/financial-services
Manufacturinghttps://github.com/solutions/industry/manufacturing
Governmenthttps://github.com/solutions/industry/government
View all industrieshttps://github.com/solutions/industry
View all solutionshttps://github.com/solutions
AIhttps://github.com/resources/articles?topic=ai
Software Developmenthttps://github.com/resources/articles?topic=software-development
DevOpshttps://github.com/resources/articles?topic=devops
Securityhttps://github.com/resources/articles?topic=security
View all topicshttps://github.com/resources/articles
Customer storieshttps://github.com/customer-stories
Events & webinarshttps://github.com/resources/events
Ebooks & reportshttps://github.com/resources/whitepapers
Business insightshttps://github.com/solutions/executive-insights
GitHub Skillshttps://skills.github.com
Documentationhttps://docs.github.com
Customer supporthttps://support.github.com
Community forumhttps://github.com/orgs/community/discussions
Trust centerhttps://github.com/trust-center
Partnershttps://github.com/partners
GitHub SponsorsFund open source developershttps://github.com/sponsors
Security Labhttps://securitylab.github.com
Maintainer Communityhttps://maintainers.github.com
Acceleratorhttps://github.com/accelerator
Archive Programhttps://archiveprogram.github.com
Topicshttps://github.com/topics
Trendinghttps://github.com/trending
Collectionshttps://github.com/collections
Enterprise platformAI-powered developer platformhttps://github.com/enterprise
GitHub Advanced SecurityEnterprise-grade security featureshttps://github.com/security/advanced-security
Copilot for BusinessEnterprise-grade AI featureshttps://github.com/features/copilot/copilot-business
Premium SupportEnterprise-grade 24/7 supporthttps://github.com/premium-support
Pricinghttps://github.com/pricing
Search syntax tipshttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
documentationhttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2FJacob08%2FAPTnotes
Sign up https://patch-diff.githubusercontent.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E&source=header-repo&source_repo=Jacob08%2FAPTnotes
Reloadhttps://patch-diff.githubusercontent.com/Jacob08/APTnotes
Reloadhttps://patch-diff.githubusercontent.com/Jacob08/APTnotes
Reloadhttps://patch-diff.githubusercontent.com/Jacob08/APTnotes
Jacob08 https://patch-diff.githubusercontent.com/Jacob08
APTnoteshttps://patch-diff.githubusercontent.com/Jacob08/APTnotes
kbandla/APTnoteshttps://patch-diff.githubusercontent.com/kbandla/APTnotes
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2FJacob08%2FAPTnotes
Fork 0 https://patch-diff.githubusercontent.com/login?return_to=%2FJacob08%2FAPTnotes
Star 0 https://patch-diff.githubusercontent.com/login?return_to=%2FJacob08%2FAPTnotes
0 stars https://patch-diff.githubusercontent.com/Jacob08/APTnotes/stargazers
884 forks https://patch-diff.githubusercontent.com/Jacob08/APTnotes/forks
Branches https://patch-diff.githubusercontent.com/Jacob08/APTnotes/branches
Tags https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tags
Activity https://patch-diff.githubusercontent.com/Jacob08/APTnotes/activity
Star https://patch-diff.githubusercontent.com/login?return_to=%2FJacob08%2FAPTnotes
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2FJacob08%2FAPTnotes
Code https://patch-diff.githubusercontent.com/Jacob08/APTnotes
Pull requests 0 https://patch-diff.githubusercontent.com/Jacob08/APTnotes/pulls
Actions https://patch-diff.githubusercontent.com/Jacob08/APTnotes/actions
Projects 0 https://patch-diff.githubusercontent.com/Jacob08/APTnotes/projects
Wiki https://patch-diff.githubusercontent.com/Jacob08/APTnotes/wiki
Security 0 https://patch-diff.githubusercontent.com/Jacob08/APTnotes/security
Insights https://patch-diff.githubusercontent.com/Jacob08/APTnotes/pulse
Code https://patch-diff.githubusercontent.com/Jacob08/APTnotes
Pull requests https://patch-diff.githubusercontent.com/Jacob08/APTnotes/pulls
Actions https://patch-diff.githubusercontent.com/Jacob08/APTnotes/actions
Projects https://patch-diff.githubusercontent.com/Jacob08/APTnotes/projects
Wiki https://patch-diff.githubusercontent.com/Jacob08/APTnotes/wiki
Security https://patch-diff.githubusercontent.com/Jacob08/APTnotes/security
Insights https://patch-diff.githubusercontent.com/Jacob08/APTnotes/pulse
Brancheshttps://patch-diff.githubusercontent.com/Jacob08/APTnotes/branches
Tagshttps://patch-diff.githubusercontent.com/Jacob08/APTnotes/tags
https://patch-diff.githubusercontent.com/Jacob08/APTnotes/branches
https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tags
142 Commitshttps://patch-diff.githubusercontent.com/Jacob08/APTnotes/commits/master/
https://patch-diff.githubusercontent.com/Jacob08/APTnotes/commits/master/
2008https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2008
2008https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2008
2009https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2009
2009https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2009
2010https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2010
2010https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2010
2011https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2011
2011https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2011
2012https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2012
2012https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2012
2013https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2013
2013https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2013
2014https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2014
2014https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2014
historicalhttps://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/historical
historicalhttps://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/historical
.gitignorehttps://patch-diff.githubusercontent.com/Jacob08/APTnotes/blob/master/.gitignore
.gitignorehttps://patch-diff.githubusercontent.com/Jacob08/APTnotes/blob/master/.gitignore
README.mdhttps://patch-diff.githubusercontent.com/Jacob08/APTnotes/blob/master/README.md
README.mdhttps://patch-diff.githubusercontent.com/Jacob08/APTnotes/blob/master/README.md
contributors.mdhttps://patch-diff.githubusercontent.com/Jacob08/APTnotes/blob/master/contributors.md
contributors.mdhttps://patch-diff.githubusercontent.com/Jacob08/APTnotes/blob/master/contributors.md
papers.mdhttps://patch-diff.githubusercontent.com/Jacob08/APTnotes/blob/master/papers.md
papers.mdhttps://patch-diff.githubusercontent.com/Jacob08/APTnotes/blob/master/papers.md
READMEhttps://patch-diff.githubusercontent.com/Jacob08/APTnotes
https://patch-diff.githubusercontent.com/Jacob08/APTnotes#apt-notes
https://patch-diff.githubusercontent.com/Jacob08/APTnotes#contributing
contributorshttps://github.com/kbandla/APTnotes/blob/master/contributors.md
https://patch-diff.githubusercontent.com/Jacob08/APTnotes#papers
papershttps://github.com/kbandla/APTnotes/blob/master/papers.md
https://patch-diff.githubusercontent.com/Jacob08/APTnotes#2006
"Wicked Rose" and the NCPH Hacking Grouphttp://krebsonsecurity.com/wp-content/uploads/2012/11/WickedRose_andNCPH.pdf
https://patch-diff.githubusercontent.com/Jacob08/APTnotes#2008
Russian Invasion of Georgia Russian Cyberwar on Georgiahttp://www.mfa.gov.ge/files/556_10535_798405_Annex87_CyberAttacks.pdf
How China will use cyber warfare to leapfrog in military competitivenesshttp://www.international-relations.com/CM8-1/Cyberwar.pdf
China's Electronic Long-Range Reconnaissancehttp://fmso.leavenworth.army.mil/documents/chinas-electronic.pdf
Agent.BTZhttp://www.wired.com/dangerroom/2008/11/army-bans-usb-d/
https://patch-diff.githubusercontent.com/Jacob08/APTnotes#2009
Impact of Alleged Russian Cyber Attackshttps://www.bdcol.ee/files/files/documents/Research/BSDR2009/1_%20Ashmore%20-%20Impact%20of%20Alleged%20Russian%20Cyber%20Attacks%20.pdf
Tracking GhostNethttp://www.nartv.org/mirror/ghostnet.pdf
https://patch-diff.githubusercontent.com/Jacob08/APTnotes#2010
Operation Aurorahttp://en.wikipedia.org/wiki/Operation_Aurora
The Command Structure of the Aurora Botnet - Damballahttps://www.damballa.com/downloads/r_pubs/Aurora_Botnet_Command_Structure.pdf
McAfee Labs: Combating Aurorahttps://kc.mcafee.com/resources/sites/MCAFEE/content/live/CORP_KNOWLEDGEBASE/67000/KB67957/en_US/Combating%20Threats%20-%20Operation%20Aurora.pdf
Operation Aurora Detect, Diagnose, Respondhttp://albertsblog.stickypatch.org/files/3/5/1/4/7/282874-274153/Aurora_HBGARY_DRAFT.pdf
Case Study: Operation Aurora - Triumfanthttp://www.triumfant.com/pdfs/Case_Study_Operation_Aurora_V11.pdf
How Can I Tell if I Was Infected By Aurora? (IOCs)http://www.mcafee.com/us/local_content/reports/how_can_u_tell.pdf
In-depth Analysis of Hydraqhttp://www.totaldefense.com/Core/DownloadDoc.aspx?documentID=1052
Shadows in the cloud: Investigating Cyber Espionage 2.0http://www.nartv.org/mirror/shadows-in-the-cloud.pdf
The "MSUpdater" Trojan And Ongoing Targeted Attackshttp://www.seculert.com/reports/MSUpdaterTrojanWhitepaper.pdf
W32.Stuxnet Dossierhttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf
The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability http://www.fas.org/sgp/crs/natsec/R41524.pdf
https://patch-diff.githubusercontent.com/Jacob08/APTnotes#2011
Global Energy Cyberattacks: Night Dragonhttp://www.mcafee.com/us/resources/white-papers/wp-global-energy-cyberattacks-night-dragon.pdf
Night Dragon Specific Protection Measures for Considerationhttp://www.nerc.com/pa/rrm/bpsa/Alerts%20DL/2011%20Alerts/A-2011-02-18-01%20Night%20Dragon%20Attachment%201.pdf
Stuxnet Under the Microscopehttp://www.eset.com/us/resources/white-papers/Stuxnet_Under_the_Microscope.pdf
Shady RAThttp://en.wikipedia.org/wiki/Operation_Shady_RAT
Operation Shady RAThttp://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf
Operation Shady rat : Vanityhttp://www.vanityfair.com/culture/features/2011/09/operation-shady-rat-201109
HTran and the Advanced Persistent Threathttp://www.secureworks.com/cyber-threat-intelligence/threats/htran/
The RSA Hackhttp://www.fidelissecurity.com/sites/default/files/FTA1001-The_RSA_Hack.pdf
SK Hack by an Advanced Persistent Threathttp://www.commandfive.com/papers/C5_APT_SKHack.pdf
The "LURID" Downloaderhttp://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_dissecting-lurid-apt.pdf
Alleged APT Intrusion Set: "1.php" Grouphttp://www.zscaler.com/pdf/technicalbriefs/tb_advanced_persistent_threats.pdf
Duqu Trojan Questions and Answershttp://www.secureworks.com/cyber-threat-intelligence/threats/duqu/
The Nitro Attacks: Stealing Secrets from the Chemical Industryhttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the_nitro_attacks.pdf
https://patch-diff.githubusercontent.com/Jacob08/APTnotes#2012
The HeartBeat APThttp://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_the-heartbeat-apt-campaign.pdf
Command and Control in the Fifth Domainhttp://www.commandfive.com/papers/C5_APT_C2InTheFifthDomain.pdf
The Sin Digoo Affairhttp://www.secureworks.com/cyber-threat-intelligence/threats/sindigoo/
Crouching Tiger, Hidden Dragon, Stolen Datahttp://www.contextis.com/services/research/white-papers/crouching-tiger-hidden-dragon-stolen-data/
Reversing DarkComet RAT's cryptohttp://www.arbornetworks.com/asert/wp-content/uploads/2012/07/Crypto-DarkComet-Report.pdf
Luckycat Reduxhttp://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_luckycat_redux.pdf
Anatomy of a Gh0st RAThttp://www.mcafee.com/us/resources/white-papers/foundstone/wp-know-your-digital-enemy.pdf
OSX.SabPub & Confirmed Mac APT attackshttp://securelist.com/blog/incidents/33208/new-version-of-osx-sabpub-confirmed-mac-apt-attacks-19/
Analysis of Flamer C&C Serverhttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_flamer_newsforyou.pdf
IXESHEA An APT Campaignhttp://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_ixeshe.pdf
sKyWIper (Flame/Flamer)http://www.crysys.hu/skywiper/skywiper.pdf
Advanced Social Engineering for the Distribution of LURK Malwarehttps://citizenlab.org/wp-content/uploads/2012/07/10-2012-recentobservationsintibet.pdf
Wired article on DarkComet creatorhttp://www.wired.com/2012/07/dark-comet-syrian-spy-tool/
The Madi Campaignhttps://securelist.com/analysis/36609/the-madi-infostealers-a-detailed-analysis/
Gauss: Abnormal Distributionhttp://kasperskycontenthub.com/wp-content/uploads/sites/43/vlpdfs/kaspersky-lab-gauss.pdf
The Elderwood Projecthttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-elderwood-project.pdf
IEXPLORE RAThttps://citizenlab.org/wp-content/uploads/2012/09/IEXPL0RE_RAT.pdf
The VOHO Campaign: An in depth analysishttp://blogsdev.rsa.com/wp-content/uploads/VOHO_WP_FINAL_READY-FOR-Publication-09242012_AC.pdf
The Mirage Campaignhttp://www.secureworks.com/cyber-threat-intelligence/threats/the-mirage-campaign/
Matasano notes on DarkComet, Bandook, CyberGate and Xtreme RAThttp://matasano.com/research/PEST-CONTROL.pdf
Trojan.Taidoor: Targeting Think Tankshttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/trojan_taidoor-targeting_think_tanks.pdf
RECOVERING FROM SHAMOONhttp://www.fidelissecurity.com/sites/default/files/FTA%201007%20-%20Shamoon.pdf
Systematic cyber attacks against Israeli and Palestinian targets going on for a yearhttp://download01.norman.no/whitepapers/Cyberattack_against_Israeli_and_Palestinian_targets.pdf
https://patch-diff.githubusercontent.com/Jacob08/APTnotes#2013
Ooperation Red Octoberhttps://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/24000/PD24250/en_US/McAfee_Labs_Threat_Advisory_Exploit_Operation_Red_Oct.pdf
Targeted cyber attacks: examples and challenges aheadhttp://www.ait.ac.at/uploads/media/Presentation_Targeted-Attacks_EN.pdf
Operation SnowMan: DeputyDog Actor Compromises US Veterans of Foreign Wars Websitehttp://www.fireeye.com/blog/technical/cyber-exploits/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html
Mandiant APT1 Reporthttp://intelreport.mandiant.com/Mandiant_APT1_Report.pdf
Comment Crew: Indicators of Compromisehttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/comment_crew_indicators_of_compromise.pdf
Stuxnet 0.5: The Missing Linkhttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/stuxnet_0_5_the_missing_link.pdf
The MiniDuke Mystery: PDF 0-day Government Spy Assembler 0x29A Micro Backdoorhttps://www.securelist.com/en/downloads/vlpdfs/themysteryofthepdf0-dayassemblermicrobackdoor.pdf
Miniduke: Indicators v1http://www.crysys.hu/miniduke/miniduke_indicators_public.pdf
You Only Click Twice: FinFisher’s Global Proliferationhttps://citizenlab.org/wp-content/uploads/2013/07/15-2013-youonlyclicktwice.pdf
Safe: A Targeted Threathttp://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-safe-a-targeted-threat.pdf
Dissecting Operation Troyhttp://www.mcafee.com/sg/resources/white-papers/wp-dissecting-operation-troy.pdf
The TeamSpy Crew Attackshttp://securelist.com/blog/incidents/35520/the-teamspy-crew-attacks-abusing-teamviewer-for-cyberespionage-8/
Darkseoul/Jokra Analysis And Recoveryhttp://www.fidelissecurity.com/sites/default/files/FTA%201008%20-%20Darkseoul-Jokra%20Analysis%20and%20Recovery.pdf
APT1: technical backstage (Terminator/Fakem RAT)http://www.malware.lu/Pro/RAP002_APT1_Technical_backstage.1.0.pdf
TR-12 - Analysis of a PlugX malware variant used for targeted attackshttp://www.circl.lu/pub/tr-12/
Trojan.APT.BaneChanthttp://www.fireeye.com/blog/technical/malware-research/2013/04/trojan-apt-banechant-in-memory-trojan-that-observes-for-multiple-mouse-clicks.html
"Winnti" More than just a gamehttp://www.securelist.com/en/downloads/vlpdfs/winnti-more-than-just-a-game-130410.pdf
Operation Hangoverhttp://normanshark.com/pdf/Norman_HangOver%20report_Executive%20Summary_042513.pdf
Operation Hangoverhttp://normanshark.com/pdf/Unveiling%20an%20Indian%20Cyberattack%20Infrastructure%20-%20appendixes.pdf
TR-14 - Analysis of a stage 3 Miniduke malware samplehttp://www.circl.lu/pub/tr-14/
The Chinese Malware Complexes: The Maudi Surveillance Operationhttp://normanshark.com/wp-content/uploads/2013/06/NormanShark-MaudiOperation.pdf
Crude Faux: An analysis of cyber conflict within the oil & gas industrieshttps://www.cerias.purdue.edu/assets/pdf/bibtex_archive/2013-9.pdf
The NetTraveller (aka 'Travnet')http://www.securelist.com/en/downloads/vlpdfs/kaspersky-the-net-traveler-part1-final.pdf
KeyBoy, Targeted Attacks against Vietnam and Indiahttps://community.rapid7.com/community/infosec/blog/2013/06/07/keyboy-targeted-attacks-against-vietnam-and-india
Trojan.APT.Seinup Hitting ASEANhttp://www.fireeye.com/blog/technical/malware-research/2013/06/trojan-apt-seinup-hitting-asean.html
A Call to Harm: New Malware Attacks Target the Syrian Oppositionhttps://citizenlab.org/wp-content/uploads/2013/07/19-2013-acalltoharm.pdf
njRAT Uncoveredhttp://threatgeek.typepad.com/files/fta-1009---njrat-uncovered-1.pdf
Dark Seoul Cyber Attack: Could it be worse?https://patch-diff.githubusercontent.com/Jacob08/APTnotes/blob/master/cisak.perpika.kr/wp-content/uploads/2013/07/2013-08.pdf
PlugX revisited: "Smoaler"http://sophosnews.files.wordpress.com/2013/07/sophosszappanosplugxrevisitedintroducingsmoaler-rev1.pdf
Secrets of the Comfoo Mastershttp://www.secureworks.com/cyber-threat-intelligence/threats/secrets-of-the-comfoo-masters/
Blackhat: In-Depth Analysis of Escalated APT Attacks (Lstudio,Elirks)https://media.blackhat.com/us-13/US-13-Yarochkin-In-Depth-Analysis-of-Escalated-APT-Attacks-Slides.pdf
videohttps://www.youtube.com/watch?v=SoFVRsvh8s0
Operation Hangover - Unveiling an Indian Cyberattack Infrastructurehttp://normanshark.com/wp-content/uploads/2013/08/NS-Unveiling-an-Indian-Cyberattack-Infrastructure_FINAL_Web.pdf
APT Attacks on Indian Cyber Spacehttp://g0s.org/wp-content/uploads/2013/downloads/Inside_Report_by_Infosec_Consortium.pdf
Where There is Smoke, There is Fire: South Asian Cyber Espionage Heats Uphttp://www.threatconnect.com/news/where-there-is-smoke-there-is-fire-south-asian-cyber-espionage-heats-up/
Surtr: Malware Family Targeting the Tibetan Communityhttps://citizenlab.org/2013/08/surtr-malware-family-targeting-the-tibetan-community/
ByeBye Shell and the targeting of Pakistanhttps://community.rapid7.com/community/infosec/blog/2013/08/19/byebye-and-the-targeting-of-pakistan
POISON IVY: Assessing Damage and Extracting Intelligencehttp://www.fireeye.com/resources/pdfs/fireeye-poison-ivy-report.pdf
Operation Molerats: Middle East Cyber Attacks Using Poison Ivyhttp://www.fireeye.com/blog/technical/2013/08/operation-molerats-middle-east-cyber-attacks-using-poison-ivy.html
Feature: EvilGrab Campaign Targets Diplomatic Agencieshttp://about-threats.trendmicro.com/cloud-content/us/ent-primers/pdf/2q-report-on-targeted-attack-campaigns.pdf
The "Kimsuky" Operationhttps://securelist.com/analysis/57915/the-kimsuky-operation-a-north-korean-apt/
Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targetshttp://www.fireeye.com/blog/technical/cyber-exploits/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html
Hidden Lynx - Professional Hackers for Hirehttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/hidden_lynx.pdf
The 'ICEFROG' APT: A Tale of cloak and three daggershttp://www.securelist.com/en/downloads/vlpdfs/icefog.pdf
World War C: State of affairs in the APT worldhttp://www.fireeye.com/blog/technical/threat-intelligence/2013/09/new-fireeye-report-world-war-c.html
Terminator RAThttp://www.fireeye.com/blog/technical/malware-research/2013/10/evasive-tactics-terminator-rat.html
FakeM RAThttp://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-fakem-rat.pdf
Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Methodhttp://www.fireeye.com/blog/technical/cyber-exploits/2013/11/operation-ephemeral-hydra-ie-zero-day-linked-to-deputydog-uses-diskless-method.html
Supply Chain Analysishttp://www.fireeye.com/resources/pdfs/fireeye-malware-supply-chain.pdf
njRAT, The Saga Continueshttp://www.fidelissecurity.com/files/files/FTA%201010%20-%20njRAT%20The%20Saga%20Continues.pdf
Operation "Ke3chang"http://www.fireeye.com/resources/pdfs/fireeye-operation-ke3chang.pdf
ETSO APT Attacks Analysishttp://image.ahnlab.com/global/upload/download/documents/1401223631603288.pdf
Deep Pandahttp://www.crowdstrike.com/sites/default/files/AdversaryIntelligenceReport_DeepPanda_0.pdf
Detecting and Defeating the China Chopper Web Shellhttp://www.fireeye.com/resources/pdfs/fireeye-china-chopper-report.pdf
https://patch-diff.githubusercontent.com/Jacob08/APTnotes#2014
PlugX: some uncovered pointshttp://blog.cassidiancybersecurity.com/2014/01/plugx-some-uncovered-points.html
Targeted attacks against the Energy Sectorhttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/targeted_attacks_against_the_energy_sector.pdf
The Icefog APT Hits US Targets With Java Backdoorhttps://www.securelist.com/en/blog/208214213/The_Icefog_APT_Hits_US_Targets_With_Java_Backdoor
“New'CDTO:'A'Sneakernet'Trojan'Solutionhttp://www.fidelissecurity.com/sites/default/files/FTA%201001%20FINAL%201.15.14.pdf
Shell_Crew (Deep Panda)http://www.emc.com/collateral/white-papers/h12756-wp-shell-crew.pdf
Intruder File Report- Sneakernet Trojanhttp://www.fidelissecurity.com/sites/default/files/FTA%201011%20Follow%20UP.pdf
Unveiling "Careto" - The Masked APThttp://www.securelist.com/en/downloads/vlpdfs/unveilingthemask_v1.0.pdf
Operation SnowMan: DeputyDog Actor Compromises US Veterans of Foreign Wars Websitehttp://www.fireeye.com/blog/technical/cyber-exploits/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html
The Monju Incidenthttp://contextis.com/resources/blog/context-threat-intelligence-monju-incident/
XtremeRAT: Nuisance or Threat?http://www.fireeye.com/blog/technical/2014/02/xtremerat-nuisance-or-threat.html
Operation GreedyWonk: Multiple Economic and Foreign Policy Sites Compromised, Serving Up Flash Zero-Day Exploithttp://www.fireeye.com/blog/technical/targeted-attack/2014/02/operation-greedywonk-multiple-economic-and-foreign-policy-sites-compromised-serving-up-flash-zero-day-exploit.html
Mo' Shells Mo' Problems - Deep Panda Web Shellshttp://www.crowdstrike.com/blog/mo-shells-mo-problems-deep-panda-web-shells/
Gathering in the Middle East, Operation STTEAMhttp://www.fidelissecurity.com/sites/default/files/FTA%201012%20STTEAM%20Final.pdf
Uroburos: Highly complex espionage software with Russian rootshttps://public.gdatasoftware.com/Web/Content/INT/Blog/2014/02_2014/documents/GData_Uroburos_RedPaper_EN_v1.pdf
The Siesta Campaignhttp://blog.trendmicro.com/trendlabs-security-intelligence/the-siesta-campaign-a-new-targeted-attack-awakens/
Snake Campaign & Cyber Espionage Toolkithttp://info.baesystemsdetica.com/rs/baesystems/images/snake_whitepaper.pdf
Russian spyware Turlahttp://www.reuters.com/article/2014/03/07/us-russia-cyberespionage-insight-idUSBREA260YI20140307
CVE-2014-1776: Operation Clandestine Foxhttp://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html
Operation Saffron Rose (aka Flying Kitten)http://www.fireeye.com/resources/pdfs/fireeye-operation-saffron-rose.pdf
CrowdStrike's report on Flying Kittenhttp://blog.crowdstrike.com/cat-scratch-fever-crowdstrike-tracks-newly-reported-iranian-actor-flying-kitten/
Miniduke Twitter C&Chttp://www.welivesecurity.com/2014/05/20/miniduke-still-duking/
RAT in jar: A phishing campaign using Unrecomhttp://www.fidelissecurity.com/sites/default/files/FTA_1013_RAT_in_a_jar.pdf
Illuminating The Etumbot APT Backdoor (APT12)http://www.arbornetworks.com/asert/wp-content/uploads/2014/06/ASERT-Threat-Intelligence-Brief-2014-07-Illuminating-Etumbot-APT.pdf
Putter Pandahttp://cdn0.vox-cdn.com/assets/4589853/crowdstrike-intelligence-report-putter-panda.original.pdf
Embassy of Greece Beijinghttp://thegoldenmessenger.blogspot.de/2014/06/blitzanalysis-embassy-of-greece-beijing.html
Dragonfly: Cyberespionage Attacks Against Energy Suppliershttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/Dragonfly_Threat_Against_Western_Energy_Suppliers.pdf
Anatomy of the Attack: Zombie Zerohttp://www.trapx.com/wp-content/uploads/2014/07/TrapX_ZOMBIE_Report_Final.pdf
Deep Pandashttp://blog.crowdstrike.com/deep-thought-chinese-targeting-national-security-think-tanks/
TR-25 Analysis - Turla / Pfinet / Snake/ Uroburoshttp://www.circl.lu/pub/tr-25/
Pitty Tigerhttp://bitbucket.cassidiancybersecurity.com/whitepapers/downloads/Pitty%20Tiger%20Final%20Report.pdf
Sayad (Flying Kitten) Analysis & IOCshttp://vinsula.com/2014/07/20/sayad-flying-kitten-infostealer-malware/
Energetic Bear/Crouching Yetihttps://kasperskycontenthub.com/securelist/files/2014/07/EB-YetiJuly2014-Public.pdf
Energetic Bear/Crouching Yeti Appendixhttp://25zbkz3k00wn2tp5092n6di7b5k.wpengine.netdna-cdn.com/files/2014/07/Kaspersky_Lab_crouching_yeti_appendixes_eng_final.pdf
Sidewinder Targeted Attack Against Androidhttp://www.fireeye.com/resources/pdfs/fireeye-sidewinder-targeted-attack.pdf
Operation Arachnophobiahttp://threatc.s3-website-us-east-1.amazonaws.com/?/arachnophobia
Operation Poisoned Hurricanehttp://www.fireeye.com/blog/technical/targeted-attack/2014/08/operation-poisoned-hurricane.html
The Epic Turla Operation Appendixhttps://securelist.com/files/2014/08/KL_Epic_Turla_Technical_Appendix_20140806.pdf
New York Times Attackers Evolve Quickly (Aumlib/Ixeshe/APT12)http://www.fireeye.com/blog/technical/2013/08/survival-of-the-fittest-new-york-times-attackers-evolve-quickly.html
A Look at Targeted Attacks Through the Lense of an NGOhttp://www.mpi-sws.org/~stevens/pubs/sec14.pdf
The Syrian Malware House of Cardshttps://securelist.com/blog/research/66051/the-syrian-malware-house-of-cards/
El Machetehttps://securelist.com/blog/research/66108/el-machete/
Vietnam APT Campaignhttp://blog.malwaremustdie.org/2014/08/another-country-sponsored-malware.html
NetTraveler APT Gets a Makeover for 10th Birthdayhttps://securelist.com/blog/research/66272/nettraveler-apt-gets-a-makeover-for-10th-birthday/
North Korea’s cyber threat landscapehttp://h30499.www3.hp.com/hpeb/attachments/hpeb/off-by-on-software-security-blog/388/2/HPSR%20SecurityBriefing_Episode16_NorthKorea.pdf
Scanbox: A Reconnaissance Framework Used with Watering Hole Attackshttps://www.alienvault.com/open-threat-exchange/blog/scanbox-a-reconnaissance-framework-used-on-watering-hole-attacks
Syrian Malware Team Uses BlackWorm for Attackshttp://www.fireeye.com/blog/technical/2014/08/connecting-the-dots-syrian-malware-team-uses-blackworm-for-attacks.html
Darwin’s Favorite APT Group (APT12)http://www.fireeye.com/blog/technical/botnet-activities-research/2014/09/darwins-favorite-apt-group-2.html
Forced to Adapt: XSLCmd Backdoor Now on OS Xhttp://www.fireeye.com/blog/technical/malware-research/2014/09/forced-to-adapt-xslcmd-backdoor-now-on-os-x.html
Targeted Threat Index: Characterizingand Quantifying Politically-MotivatedTargeted Malwarehttps://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-hardy.pdf
videohttps://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/hardy
When Governments Hack Opponents: A Look at Actors and Technologyhttps://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-marczak.pdf
videohttps://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/marczak
Operation Quantum Entanglementhttp://www.fireeye.com/resources/pdfs/white-papers/fireeye-operation-quantum-entanglement.pdf
Chinese intrusions into key defense contractorshttp://www.armed-services.senate.gov/press-releases/sasc-investigation-finds-chinese-intrusions-into-key-defense-contractors
COSMICDUKE: Cosmu with a twist of MiniDukehttp://www.f-secure.com/documents/996508/1030745/cosmicduke_whitepaper.pdf
Watering Hole Attacks using Poison Ivy by "th3bug" grouphttp://researchcenter.paloaltonetworks.com/2014/09/recent-watering-hole-attacks-attributed-apt-group-th3bug-using-poison-ivy/
Ukraine and Poland Targeted by BlackEnergy (video)https://www.youtube.com/watch?v=I77CGqQvPE4
Aided Frame, Aided Direction (Sunshop Digital Quartermaster)http://www.fireeye.com/blog/technical/2014/09/aided-frame-aided-direction-because-its-a-redirect.html
BlackEnergy & Quedaghhttps://www.f-secure.com/documents/996508/1030745/blackenergy_whitepaper.pdf
New indicators for APT group Nitrohttp://researchcenter.paloaltonetworks.com/2014/10/new-indicators-compromise-apt-group-nitro-uncovered/
Democracy in Hong Kong Under Attackhttp://www.volexity.com/blog/?p=33
ZoxPNG Preliminary Analysishttp://www.novetta.com/files/9114/1329/6233/ZoxPNG_Preliminary_Analysis.pdf
Hikit Preliminary Analysishttp://www.novetta.com/files/1714/1329/6231/Hikit_Preliminary_Analysis.pdf
Derusbi Preliminary Analysishttp://www.novetta.com/files/3014/1329/6230/Derusbi_Server_Preliminary_Analysis.pdf
Group 72 (Axiom)http://blogs.cisco.com/security/talos/threat-spotlight-group-72/
Sandworm - CVE-2104-4114http://www.isightpartners.com/2014/10/cve-2014-4114/
OrcaRAT - A whale of a talehttp://pwc.blogs.com/cyber_security_updates/2014/10/orcarat-a-whale-of-a-tale.html
Operation Pawn Storm: The Red in SEDNIThttp://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-pawn-storm.pdf
Sofacy Phishing by PWChttp://pwc.blogs.com/files/tactical-intelligence-bulletin---sofacy-phishing-.pdf
Modified Tor Binarieshttp://www.leviathansecurity.com/blog/the-case-of-the-modified-binaries/
LeoUncia and OrcaRathttp://blog.airbuscybersecurity.com/post/2014/10/LeoUncia-and-OrcaRat
Full Disclosure of Havex Trojans - ICS Havex backdoorshttp://www.netresec.com/?page=Blog&month=2014-10&post=Full-Disclosure-of-Havex-Trojans
ScanBox framework – who’s affected, and who’s using it?http://pwc.blogs.com/cyber_security_updates/2014/10/scanbox-framework-whos-affected-and-whos-using-it-1.html
APT28 - A Window Into Russia's Cyber Espionage Operationshttps://patch-diff.githubusercontent.com/Jacob08/APTnotes/blob/master/www.fireeye.com/resources/pdfs/apt28.pdf
Group 72, Opening the ZxShellhttp://blogs.cisco.com/talos/opening-zxshell/
The Rotten Tomato Campaignhttp://blogs.sophos.com/2014/10/30/the-rotten-tomato-campaign-new-sophoslabs-research-on-apts/
Operation TooHashhttps://blog.gdatasoftware.com/blog/article/operation-toohash-how-targeted-attacks-work.html
New observations on BlackEnergy2 APT activityhttps://securelist.com/blog/research/67353/be2-custom-plugins-router-abuse-and-target-profiles/
Operation Poisoned Handover: Unveiling Ties Between APT Activity in Hong Kong’s Pro-Democracy Movementhttp://www.fireeye.com/blog/technical/2014/11/operation-poisoned-handover-unveiling-ties-between-apt-activity-in-hong-kongs-pro-democracy-movement.html
The Darkhotel APT - A Story of Unusual Hospitalityhttps://securelist.com/blog/research/66779/the-darkhotel-apt/
The Uroburos case- Agent.BTZ’s successor, ComRAThttp://blog.gdatasoftware.com/blog/article/the-uroburos-case-new-sophisticated-rat-identified.html
Korplug military targeted attacks: Afghanistan & Tajikistanhttp://www.welivesecurity.com/2014/11/12/korplug-military-targeted-attacks-afghanistan-tajikistan/
Operation CloudyOmega: Ichitaro 0-day targeting Japanhttp://www.symantec.com/connect/blogs/operation-cloudyomega-ichitaro-zero-day-and-ongoing-cyberespionage-campaign-targeting-japan
OnionDuke: APT Attacks Via the Tor Networkhttp://www.f-secure.com/weblog/archives/00002764.html
Roaming Tiger (Slides)http://2014.zeronights.ru/assets/files/slides/roaming_tiger_zeronights_2014.pdf
Operation Double Taphttps://www.fireeye.com/blog/threat-research/2014/11/operation_doubletap.html
IOCshttps://github.com/fireeye/iocs/tree/master/APT3
Symantec's report on Reginhttp://www.symantec.com/connect/blogs/regin-top-tier-espionage-tool-enables-stealthy-surveillance
Kaspersky's report on The Regin Platformhttp://securelist.com/blog/research/67741/regin-nation-state-ownage-of-gsm-networks/
https://firstlook.org/theintercept/2014/11/24/secret-regin-malware-belgacom-nsa-gchq/https://firstlook.org/theintercept/2014/11/24/secret-regin-malware-belgacom-nsa-gchq/
FIN4: Stealing Insider Information for an Advantage in Stock Trading?https://www.fireeye.com/blog/threat-research/2014/11/fin4_stealing_insid.html
Operation Cleaverhttp://www.cylance.com/operation-cleaver/
IOCshttp://www.cylance.com/assets/Cleaver/cleaver.yar
Operation Cleaver: The Notepad Fileshttp://blog.cylance.com/operation-cleaver-the-notepad-files
The 'Penquin' Turlahttp://securelist.com/blog/research/67962/the-penquin-turla-2/
The Inception Frameworkhttps://www.bluecoat.com/security-blog/2014-12-09/blue-coat-exposes-%E2%80%9C-inception-framework%E2%80%9D-very-sophisticated-layered-malware
Cloud Atlas: RedOctober APThttp://securelist.com/blog/research/68083/cloud-atlas-redoctober-apt-is-back-in-style/
W32/Regin, Stage #1https://www.f-secure.com/documents/996508/1030745/w32_regin_stage_1.pdf
W64/Regin, Stage #1https://www.f-secure.com/documents/996508/1030745/w64_regin_stage_1.pdf
South Korea MBR Wiperhttp://asec.ahnlab.com/1015
Vinself now with steganographyhttp://blog.cybersecurity-airbusds.com/post/2014/12/Vinself
Bots, Machines, and the Matrixhttp://www.fidelissecurity.com/sites/default/files/FTA_1014_Bots_Machines_and_the_Matrix.pdf
Wiper Malware – A Detection Deep Divehttp://blogs.cisco.com/security/talos/wiper-malware
Malware Attack Targeting Syrian ISIS Criticshttps://citizenlab.org/2014/12/malware-attack-targeting-syrian-isis-critics/
TA14-353A: Targeted Destructive Malware (wiper)https://www.us-cert.gov/ncas/alerts/TA14-353A
Operation Poisoned Helmandhttp://www.threatconnect.com/news/operation-poisoned-helmand/
Anunak: APT against financial institutionshttp://www.group-ib.com/files/Anunak_APT_against_financial_institutions.pdf
Readme https://patch-diff.githubusercontent.com/Jacob08/APTnotes#readme-ov-file
Please reload this pagehttps://patch-diff.githubusercontent.com/Jacob08/APTnotes
Activityhttps://patch-diff.githubusercontent.com/Jacob08/APTnotes/activity
0 starshttps://patch-diff.githubusercontent.com/Jacob08/APTnotes/stargazers
1 watchinghttps://patch-diff.githubusercontent.com/Jacob08/APTnotes/watchers
0 forkshttps://patch-diff.githubusercontent.com/Jacob08/APTnotes/forks
Report repository https://patch-diff.githubusercontent.com/contact/report-content?content_url=https%3A%2F%2Fgithub.com%2FJacob08%2FAPTnotes&report=Jacob08+%28user%29
Releaseshttps://patch-diff.githubusercontent.com/Jacob08/APTnotes/releases
Packages 0https://patch-diff.githubusercontent.com/users/Jacob08/packages?repo_name=APTnotes
https://github.com
Termshttps://docs.github.com/site-policy/github-terms/github-terms-of-service
Privacyhttps://docs.github.com/site-policy/privacy-policies/github-privacy-statement
Securityhttps://github.com/security
Statushttps://www.githubstatus.com/
Communityhttps://github.community/
Docshttps://docs.github.com/
Contacthttps://support.github.com?tags=dotcom-footer

Viewport: width=device-width


URLs of crawlers that visited me.