Git Product home page Git Product logo

apt_cybercriminal_campagin_collections's Introduction

APT & Cybercriminals Campaign Collection

This is collections of APT and cybercriminals campaign. Please fire issue to me if any lost APT/Malware events/campaigns.

🀷The password of malware samples could be 'virus' or 'infected'

URL to PDF Tool

Reference Resources

πŸ”Ή kbandla
πŸ”Ή APTnotes
πŸ”Ή Florian Roth - APT Groups
πŸ”Ή Attack Wiki
πŸ”Ή threat-INTel
πŸ”Ή targetedthreats
πŸ”Ή Raw Threat Intelligence
πŸ”Ή APT search
πŸ”Ή APT Sample by 0xffff0800 (https://iec56w4ibovnb4wc.onion.si/)
πŸ”Ή APT Map
πŸ”Ή sapphirex00 - Threat-Hunting
πŸ”Ή APTSimulator
πŸ”Ή MITRE Att&CK: Group
πŸ”Ή APT_REPORT collected by @blackorbird
πŸ”Ή Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups
πŸ”Ή APT_Digital_Weapon
πŸ”Ή vx-underground
πŸ”Ή StrangerealIntel-EternalLiberty

2024

2023

2022

2021

2020

2019

2018

2017

2016

2015

2014

2013

2012

2011

2010

2009

2008

2006

Report

SentinelOne

πŸ”Έ 2024 - [SentinelOne] WatchTower 2023 Intelligence-Driven Threat Hunting | πŸ“•

Red Canary

πŸ”Έ 2021 - [Red_Canary] 2021 Threat Detection Report | πŸ“•

NSA

πŸ”Έ Jan 08 2021 - [NSA] 2020 Cybersecurity Year in Review report | πŸ“•

Objective-See

πŸ”Έ Jan 01 2024 - [Objective-See] The Mac Malware of 2023 | πŸ“•
πŸ”Έ Jan 01 2023 - [Objective-See] The Mac Malware of 2022 | πŸ“•
πŸ”Έ Jan 01 2022 - [Objective-See] The Mac Malware of 2021 | πŸ“•
πŸ”Έ Jan 04 2021 - [Objective-See] The Mac Malware of 2020 | πŸ“•

ESET

πŸ”Έ Q3 2023 - [ESET] 2023 Q2-Q3 APT Activity Report | πŸ“•
πŸ”Έ Jun 2022 - [ESET] ESET Threat Report T1 2022 | πŸ“•
πŸ”Έ Feb 09 2022 - [ESET] ESET Threat Report T3 2021 | πŸ“•
πŸ”Έ Sep 30 2021 - [ESET] ESET Threat Report T2 2021 | πŸ“•
πŸ”Έ Jun 03 2021 - [ESET] ESET Threat Report T1 2021 | πŸ“•
πŸ”Έ Oct 18 2020 - [ESET] 2020 Q3 Threat Report | πŸ“•
πŸ”Έ Jul 29 2020 - [ESET] 2020 Q2 Threat Report | πŸ“•
πŸ”Έ Apr 2020 - [ESET] 2020 Q1 Threat Report | πŸ“•

Kaspersky

πŸ”Έ Apr 27 2022 - [Kaspersky] APT trends report Q2 2022 | πŸ“•
πŸ”Έ Jul 29 2021 - [Kaspersky] APT trends report Q2 2021 | πŸ“•
πŸ”Έ Apr 27 2021 - [Kaspersky] APT trends report Q1 2021 | πŸ“•
πŸ”Έ Nov 04 2020 - [Kaspersky] APT trends report Q3 2020 | πŸ“•
πŸ”Έ July 29 2020 - [Kaspersky] APT trends report Q2 2020 | πŸ“•
πŸ”Έ Aug 01 2019 - [Kaspersky] APT trends report Q2 2019 | πŸ“•
πŸ”Έ Apr 30 2019 - [Kaspersky] APT trends report Q1 2019 | πŸ“•

FireEye

πŸ”Έ Apr 15 2021 - [FireEye] M-Trends 2021 | πŸ“•
πŸ”Έ Feb 20 2020 - [FireEye] M-Trends 2020 | πŸ“•
πŸ”Έ Mar 04 2019 - [FireEye] M-Trends 2019 | πŸ“•

AhnLab

πŸ”Έ Q2 2021 - [AhnLab] ASEC Report Q2 2021 | πŸ“•
πŸ”Έ Q1 2021 - [AhnLab] ASEC Report Q1 2021 | πŸ“•
πŸ”Έ Q4 2020 - [AhnLab] ASEC Report Q4 2020 | πŸ“•
πŸ”Έ Q3 2020 - [AhnLab] ASEC Report Q3 2020 | πŸ“•
πŸ”Έ Q2 2020 - [AhnLab] ASEC Report Q2 2020 | πŸ“•
πŸ”Έ Q1 2020 - [AhnLab] ASEC Report Q1 2020 | πŸ“•
πŸ”Έ Q4 2019 - [AhnLab] ASEC Report Q4 2019 | πŸ“•
πŸ”Έ Q3 2019 - [AhnLab] ASEC Report Q3 2019 | πŸ“•
πŸ”Έ Q2 2019 - [AhnLab] ASEC Report Q2 2019 | πŸ“•
πŸ”Έ Q1 2019 - [AhnLab] ASEC Report Q1 2019 | πŸ“•

Group-IB

πŸ”Έ Nov 24 2020 - [Group-IB] Hi-Tech Crime Trends 2020-2021 | πŸ“•
πŸ”Έ Nov 29 2019 - [Group-IB] Hi-Tech Crime Trends 2019-2020 | πŸ“•

PTSecurity

πŸ”Έ Q1 2021 - [PTSecurity] Cybersecurity threatscape Q1 2021 | πŸ“•
πŸ”Έ Q4 2020 - [PTSecurity] Cybersecurity threatscape Q4 2020 | πŸ“•
πŸ”Έ Q3 2020 - [PTSecurity] Cybersecurity threatscape Q3 2020 | πŸ“•
πŸ”Έ Q2 2020 - [PTSecurity] Cybersecurity threatscape Q2 2020 | πŸ“•
πŸ”Έ Q1 2020 - [PTSecurity] Cybersecurity threatscape Q1 2020 | πŸ“•
πŸ”Έ Q4 2019 - [PTSecurity] Cybersecurity threatscape Q4 2019 | πŸ“•
πŸ”Έ Q3 2019 - [PTSecurity] Cybersecurity threatscape Q3 2019 | πŸ“•
πŸ”Έ Q2 2019 - [PTSecurity] Cybersecurity threatscape Q2 2019 | πŸ“•
πŸ”Έ Q1 2019 - [PTSecurity] Cybersecurity threatscape Q1 2019 | πŸ“•

ENISA

πŸ”Έ Oct 20 2020 - [ENISA] ENISA Threat Landscape 2020 - Main Incidents | πŸ“•
πŸ”Έ Jan 28 2019 - [ENISA] ENISA Threat Landscape Report 2018 | πŸ“•

CrowdStrike

πŸ”Έ Sep 14 2021 - [CrowdStrike] nowhere to hide: 2021 Threat Hunting Report | πŸ“•
πŸ”Έ Feb 24 2021 - [CrowdStrike] 2021 GLOBAL THREAT REPORT | πŸ“•
πŸ”Έ Mar 03 2020 - [CrowdStrike] 2020 GLOBAL THREAT REPORT | πŸ“•
πŸ”Έ Feb 19 2019 - [CrowdStrike] 2019 GLOBAL THREAT REPORT | πŸ“•

QianXin

πŸ”Έ Jun 29 2020 - [QianXin] APT threat report 2020 1H CN version | πŸ“•
πŸ”Έ Feb 02 2019 - [QianXin] APT threat report 2019 CN version | πŸ“•

Tencent

πŸ”Έ Mar 05 2020 - [Tencent] [CN] 2019 APT Summary Report | πŸ“•
πŸ”Έ Jan 03 2019 - [Tencent] [CN] 2018 APT Summary Report | πŸ“•

Verizon

πŸ”Έ Nov 16 2020 - [Verizon] Cyber-Espionage Report 2020-2021 | πŸ“•

Sophos

πŸ”Έ Nov 18 2020 - [Sophos] SOPHOS 2021 THREAT REPORT | πŸ“•
πŸ”Έ Dec 02 2019 - [Sophos] SOPHOS 2020 THREAT REPORT | πŸ“•

360

πŸ”Έ Oct xx 2021 - [360] Global APT Research Report for the first half of 2021 | πŸ“•

Microsoft

πŸ”Έ Oct xx 2021 - [Microsoft] Microsoft Digital Defense Report October 2021 | πŸ“•

Other

πŸ”Έ Nov 18 2020 - [KELA] Zooming into Darknet Threats Targeting Japanese Organizations | πŸ“•
πŸ”Έ Nov 04 2020 - [WEF] Partnership against Cybercrime | πŸ“•
πŸ”Έ May 01 2020 - [Macnia Networks, TeamT5] 2019 H2 APT Report | πŸ“•
πŸ”Έ Feb 02 2019 - [threatinte] Threat Intel Reads – January 2019 | πŸ“•
πŸ”Έ Feb 2019 - [SWISSCOM] Targeted Attacks: Cyber Security Report 2019 | πŸ“•
πŸ”Έ Jan 30 2019 - [Dragos] Webinar Summary: Uncovering ICS Threat Activity Groups | πŸ“•
πŸ”Έ Jan 15 2019 - [Hackmageddon] 2018: A Year of Cyber Attacks | πŸ“•
πŸ”Έ Jan 09 2019 - [360] [CN] 2018 APT Summary Report | πŸ“•
πŸ”Έ Jan 07 2019 - [Medium] APT_chronicles_december_2018_edition | πŸ“•
πŸ”Έ Sep 07 2020 - [SWIFT & BAE] Follow the Money | πŸ“•

apt_cybercriminal_campagin_collections's People

Contributors

actions-user avatar alp809 avatar cybermonitor avatar jgru avatar kosmokato avatar marcoramilli avatar rhaist avatar trend-ziv-chang avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

apt_cybercriminal_campagin_collections's Issues

Please consider renaming some files

Hi,

When you perform a git clone, the following errors occur:

`error: unable to create file 2015/2015.07.13.Demonstrating_Hustle/Demonstrating Hustle, Chinese APT Groups Quickly Use Zero-Day Vulnerability (CVE-2015-5119) Following Hacking Team Leak Β« Threat Research _ FireEye Inc.pdf: File name too long

error: unable to create file 2016/2016.03.08.OnionDog/onion-dog-a-3-year-old-apt-focused-on-the-energy-and-transportation-industries-in-korean-language-countries-is-exposed-by-360-300232441.html.pdf: File name too long

error: unable to create file 2016/2016.05.10.tinyPOS_tinyloader/TrendLabs Security Intelligence BlogBackdoor as a Software Suite_ How TinyLoader Distributes and Upgrades PoS Threats - TrendLabs Security Intelligence Blog.pdf: File name too long

error: unable to create file 2017/2017.01.19.uri-terror-attack-spear-phishing-emails-targeting-indian-embassies-and-indian-mea/Uri Terror attack & Kashmir Protest Themed spear phishing emails targeting Indian Embassies and Indian Ministry of external affairs - Cysinfo.pdf: File name too long
`

It's clear that the length of the files is causing the issue. Is it possible to shorten these filenames as they appear to be unneccesarily long.

It's a minor issue for me, but other users may fine it inconvenient.

Spelling Correction

Perhaps too late to change the name of this repo, but perhaps worth correcting APT_CyberCriminal_Campagin_Collections to Campaign.

XMRig-based CoinMiners by Blue Mockingbird

Hello, not sure if you are interested already is one report about Mockingbirds, however, there is another one older case study about same threat actor, focused more on malware analysis, prepared in May 2020 by LIFARS, published on Jun 01 2020.

https://lifars.com/knowledge-center/xmrig-based-coinminer-bluemockingbird-group/

And malware samples and any.run analysis mentioned during talk at DEFCON 28:
https://app.any.run/tasks/318e4886-35da-4d71-8610-fb6b3964d04b/

New Cyber Criminal Campaigns

Maybe it would be nice to keep track to even those CyberCriminal Campaigns ?

Mapping between hashes and campaigns

Is there any mapping available between hashes of binaries mentioned in the reports and the campaigns they are part of? If not for this repository, what about others you might know?

Title fix

Title fix required for --> [Medium] Ransomware to Turns Ransomware | πŸ“•

Correct title is APT27 Turns to Ransomware

Duplicate files

I don't know if this is relevant for you but I just found several duplicate files in the repo that might need to be cleaned:

$ fdupes -r APT_CyberCriminal_Campagin_Collections

APT_CyberCriminal_Campagin_Collections/2016/2016.06.29.MonSoon/forcepoint-security-labs-monsoon-analysis-report.pdf
APT_CyberCriminal_Campagin_Collections/2016/2016.08.08.monsoon-analysis-apt-campaign/forcepoint-security-labs-monsoon-analysis-report.pdf

APT_CyberCriminal_Campagin_Collections/2016/2016.08.11.Iran-And-The-Soft-War-For-Internet-Dominance/us-16-Guarnieri-Anderson-Iran-And-The-Soft-War-For-Internet-Dominance-paper.pdf
APT_CyberCriminal_Campagin_Collections/2016/2016.09.01.human-rights-impersonation-malware/us-16-Guarnieri-Anderson-Iran-And-The-Soft-War-For-Internet-Dominance-paper.pdf

APT_CyberCriminal_Campagin_Collections/2016/2016.01.07.Operation_DustySky/Operation DustySky_TLP_WHITE.pdf
APT_CyberCriminal_Campagin_Collections/2018/2018.01.07.Operation_DustySky/Operation DustySky_TLP_WHITE.pdf

APT_CyberCriminal_Campagin_Collections/2016/2016.01.07.Operation_DustySky/DusySky-indicators.xlsx
APT_CyberCriminal_Campagin_Collections/2018/2018.01.07.Operation_DustySky/DusySky-indicators.xlsx

APT_CyberCriminal_Campagin_Collections/2008/2008.10.02.China_Cyber_Warfare/Cyberwar.pdf
APT_CyberCriminal_Campagin_Collections/2008/2008.HOW_CHINA_WILL_USE_CYBER_WARFARE/Cyberwar.pdf

APT_CyberCriminal_Campagin_Collections/2017/2017.10.19.Operation_PZCHAO/Bitdefender-Business-2017-WhitePaper-PZCHAO-crea2452-en-EN-GenericUse.pdf
APT_CyberCriminal_Campagin_Collections/2018/2018.02.01.operation-pzchao/Bitdefender-Business-2017-WhitePaper-PZCHAO-crea2452-en-EN-GenericUse.pdf

APT_CyberCriminal_Campagin_Collections/2020/2020.03.03_Tuyul_Botnet_Indonesian/New Perl Botnet (Tuyul) Found with Possible Indonesian Attribution_files/google
APT_CyberCriminal_Campagin_Collections/2020/2020.03.03_Tuyul_Botnet_Indonesian/New Perl Botnet (Tuyul) Found with Possible Indonesian Attribution_files/rightmedia
APT_CyberCriminal_Campagin_Collections/2020/2020.03.03_Tuyul_Botnet_Indonesian/New Perl Botnet (Tuyul) Found with Possible Indonesian Attribution_files/rubicon

APT_CyberCriminal_Campagin_Collections/2020/2020.03.03_Tuyul_Botnet_Indonesian/New Perl Botnet (Tuyul) Found with Possible Indonesian Attribution_files/adsct
APT_CyberCriminal_Campagin_Collections/2020/2020.03.03_Tuyul_Botnet_Indonesian/New Perl Botnet (Tuyul) Found with Possible Indonesian Attribution_files/adsct(1)

APT_CyberCriminal_Campagin_Collections/2020/2020.03.03_Tuyul_Botnet_Indonesian/New Perl Botnet (Tuyul) Found with Possible Indonesian Attribution_files/u(1)
APT_CyberCriminal_Campagin_Collections/2020/2020.03.03_Tuyul_Botnet_Indonesian/New Perl Botnet (Tuyul) Found with Possible Indonesian Attribution_files/ipv
APT_CyberCriminal_Campagin_Collections/2020/2020.03.03_Tuyul_Botnet_Indonesian/New Perl Botnet (Tuyul) Found with Possible Indonesian Attribution_files/u

APT_CyberCriminal_Campagin_Collections/2020/2020.04.15_Chimera_APT/[TLP-White]20200415 Chimera_V4.1.pdf
APT_CyberCriminal_Campagin_Collections/2020/2020.04.16_Taiwan_High-Tech_APT/[TLP-Green]20200415 Chimera_V4.1.pdf

APT_CyberCriminal_Campagin_Collections/2020/2020.12.13.SolarWinds_Supply_Chain_SUNBURST_Backdoor/IOCs/sunburst_countermeasures/rules/COSMICGALE/clamav/APT_HackTool_PS1_COSMICGALE_1.ldb
APT_CyberCriminal_Campagin_Collections/2020/2020.12.13.SolarWinds_Supply_Chain_SUNBURST_Backdoor/IOCs/sunburst_countermeasures/all-clam.ldb

APT_CyberCriminal_Campagin_Collections/2015/2015.12.16.INOCNATION.Campaign/FTA_1020_Fidelis_Inocnation_FINAL.pdf
APT_CyberCriminal_Campagin_Collections/2016/2016.01.27.Hi-Zor.RAT/FTA_1020_Fidelis_Inocnation_FINAL.pdf

APT_CyberCriminal_Campagin_Collections/2012/2012.11.00_Wicked_Rose/WickedRose_andNCPH.pdf
APT_CyberCriminal_Campagin_Collections/2006/2006.Wicked_Rose/WickedRose_andNCPH.pdf

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    πŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. πŸ“ŠπŸ“ˆπŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❀️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.