Here is a collection of links about Advanced Persistent Threat malware and attacks. I think I missed a few hundred, please send more. thanks, Mila
General
OLD(ER) 2010 and before
Shadowserver
SHADOWS IN THE CLOUD: Investigating Cyber Espionage 2.0 Report
Shadows in the Cloud: An investigation into cyber espionage 2.0
Cyber Espionage: Death by 1000 Cuts
Raytheon
The Advanced Persistent Threat (or Informatonized Force Operatons) Michael K. Daly
Malware Behaving Badly: Preview
Blackhat Europe, State Of Malware: Family Ties
Advanced Persistent Threat Report
Symantec
The Hackers Behind Stuxnet Patrick Fitzgerald
SANS computer forensics
Security Intelligence: Introduction (pt 1)
Security Intelligence: Introduction (pt 2)
Security Intelligence: Attacking the Kill Chain
Security Intelligence: Defining APT Campaigns
Digital Bond
Trojan Targeting Siemens and APT Thoughts Dale Peterson
Threatchaos.com IT--Harvest
35 Steps to Protect Yourself from Cyber Espionage Richard Stiennon
Project Grey Goose
Project Grey Goose: Phase I ReportProject Grey Goose Phase II Report: The evolving state of cyber warfare
Information Security
Understanding the advanced persistent threat Richard Bejtlich
HBGary, Inc.
Advanced Persistent Threat What APT Means to Your Enterprise Greg Hoglund
Cassandra Security
All Advanced Persistent Threat articles
Netwitness
All Advanced Persistent Threat articles
Google
A new approach to China
TaoSecurity
You Down with APT? Richard Bejtlich
All Advanced Persistent Threat articles
Johnny Cocaine Internet Cowboy
Losing the cyberwar
MadMark's Blog
Google / Adobe Hacking Event Follow-up – APT Malware
ViCheck Malware Trends
APT Malware Trends
RiskPundit
Advanced Persistent Threat (APT)
Infowar Monitor
All Articles about espionage
Threatpost
Lab Matters: Inside Targeted Attacks
Threatexpert
Trojan Hydraq exposed
c-APT-ure
c-apt-ure.blogspot.com
General
- Investigating China’s Online Underground Economy by Zhuge Jianwei, Gu Liang, and Duan Haixin July 2012 Not quite APT but related to China-made malware
Specific malware families and trojans
- Chasing APT Joe Stewart, Dell SecureWorks Counter Threat Unit™ Threat Intelligence 2012
- A time-based analysisof Rich Text Format manipulations:a deeper analysisof the RTF exploit CVE-2010-3333 -Sophos Again, not quite APT but CVE-2010-3333 has been use extensively by APT actors
- Adding Android and Mac OS X Malwareto the APT Toolbox Trend Micro 2012
- IXESHE An APT Campaign By: David Sancho, Jessa dela Torre, Matsukawa Bakuei,Nart Villeneuve, and Robert McArdle - Trend Micro 2012
- Anatomy of a Gh0st RAT McAfee By Michael G. Spohn
- Command and Control in the Fifth Domain - Command Five Pty Ltd
- The ‘Madi’ infostealers - a detailed analysis by Kaspersky
Stuxnet, Duqu, Flame, Gauss ..
Shadowserver
Shadows in the Cloud: An investigation into cyber espionage 2.0
Cyber Espionage: Death by 1000 Cuts
Raytheon
The Advanced Persistent Threat (or Informatonized Force Operatons) Michael K. Daly
Mandiant
Combat the APT by Sharing Indicators of
CompromiseMalware Behaving Badly: Preview
Blackhat Europe, State Of Malware: Family Ties
Advanced Persistent Threat Report
Symantec
The Hackers Behind Stuxnet Patrick Fitzgerald
SANS computer forensics
Security Intelligence: Introduction (pt 1)
Security Intelligence: Introduction (pt 2)
Security Intelligence: Attacking the Kill Chain
Security Intelligence: Defining APT Campaigns
Digital Bond
Trojan Targeting Siemens and APT Thoughts Dale Peterson
Threatchaos.com IT--Harvest
35 Steps to Protect Yourself from Cyber Espionage Richard Stiennon
Project Grey Goose
Project Grey Goose: Phase I ReportProject Grey Goose Phase II Report: The evolving state of cyber warfare
Information Security
Understanding the advanced persistent threat Richard Bejtlich
HBGary, Inc.
Advanced Persistent Threat What APT Means to Your Enterprise Greg Hoglund
Cassandra Security
All Advanced Persistent Threat articles
Netwitness
All Advanced Persistent Threat articles
A new approach to China
TaoSecurity
You Down with APT? Richard Bejtlich
All Advanced Persistent Threat articles
Johnny Cocaine Internet Cowboy
Losing the cyberwar
MadMark's Blog
Google / Adobe Hacking Event Follow-up – APT Malware
ViCheck Malware Trends
APT Malware Trends
RiskPundit
Advanced Persistent Threat (APT)
Infowar Monitor
All Articles about espionage
Threatpost
Lab Matters: Inside Targeted Attacks
Threatexpert
Trojan Hydraq exposed
c-APT-ure
c-apt-ure.blogspot.com
No comments:
Post a Comment