-
Malaysia CERT,
@mycert, released an advisory on espionage campaign targeting Malaysia government officials. https://www.mycert.org.my/portal/advisory?id=MA-770.022020 …#APT40#Dadjoke#TEMP.Periscope#Leviathan -
A detailed investigation to find link between
#APT40 &#Chinese intelligence proves that it is run by#Hainan department of#China's Ministry of State Security. It is based at No. 176 Nanhai Avenue, Xiuying District, Haikou, Hainanhttps://intrusiontruth.wordpress.com/2020/01/16/apt40-is-run-by-the-hainan-department-of-the-chinese-ministry-of-state-security/amp/?__twitter_impression=true … -
That's an excellent slide deck by
@jpcert_en on RoyalRoad, a RTF weaponizer used by different Chinese groups#IceFog#TickGroup#Conime#APT40 https://jsac.jpcert.or.jp/archive/2020/pdf/JSAC2020_8_koike-nakajima_jp.pdf … IOC List@nao_sec https://nao-sec.org/jsac2020_ioc.html …pic.twitter.com/3qSxMq6RFH
-
ICYMI: Intrusion Truth released a new series of reports claiming that 13 businesses based in Hainan, China are collectively a front for reputed Chinese state-sponsored hacking group
#APT40. https://www.scmagazine.com/home/security-news/apts-cyberespionage/apt40-hacking-group-linked-to-13-alleged-front-companies-in-hainan-china/ … -
Let's be clear:
#APT40 isn't the fourth time we've told a 'China steals' story. It's the first time we've linked the#MSS to potential interference with democratic institutions. Now is the time to speak out if you have more evidence...#meddlekingdompic.twitter.com/wo39bpfUUk
-
APT40 is run by the Hainan department of the Chinese Ministry of State Security. But we knew that all along, right?
#APT40#HSSD#MSS#HainanXiandun#DingXiaoyang https://intrusiontruth.wordpress.com/2020/01/16/apt40-is-run-by-the-hainan-department-of-the-chinese-ministry-of-state-security/ …pic.twitter.com/KbmMay8xkm
-
Hainan Xiandun Technology Company is APT40. They recruited Hainan based Cambodian linguists three months before APT40 conducted their Cambodia campaign.
#APT40#DingXiaoyang#HainanXiandun#Hainan#MSS https://intrusiontruth.wordpress.com/2020/01/15/hainan-xiandun-technology-company-is-apt40/ …pic.twitter.com/ivGykil3Vu
-
https://intrusiontruth.wordpress.com/2020/01/09/what-is-the-hainan-xiandun-technology-development-company/ …
Further technical reading on #Hainan connection for#APT40 / Periscope: https://twitter.com/cglyer/status/1215314354616315911?s=20 … I *think*@MrDanPerez even did specific attribution on#StateOfTheHack. Ahoy!
-
#DADJOKE#APT40 presentation from@bsidesbelfast is up for those interested. As an FYI, tactics have morphed twice more since this preso in October.https://www.youtube.com/watch?v=vx9IB88wXSE … -
#APT40#Malware sample I haven't seen mentioned before, clusters closely to the copies of#DADSTACHE on@malpedia 2e8d758b9bce51d25ea500d7b4ce4774 C2: nethosting.viewdns[.]net -
#DADJOKE loader from Malaysian attacks linked to TEMP.Periscope#APT group: 8a133a382499e08811dceadcbe07357e accountsx.bounceme[.]net https://app.any.run/tasks/ed03d492-688e-4182-9a06-6f65d8cb18fc/ …#Leviathan#APT40 pic.twitter.com/0B9chg2FGO
-
Rick sifts through all your OOXML in our telemetry - and occasionally gets to publicly share the sketchiness he finds. How about some
#DADJOKE? (probable#APT40) https://twitter.com/a_tweeter_user/status/1154764669674033152 … -
The most recently named APT groups—
#APT38,#APT39,#APT40—exemplify the variety of state-sponsored threats that network defenders face today. Watch our webinar fo a high-level overview on how nation-state interests are driving this activity. https://feye.io/2KH60Nf -
Don you know how Chinese interests are related with APT activity? Check this new blog post about Leviathan
#APT40 geostrategic interests and TTPs: http://ow.ly/h3xY30oRCOg#ThreatIntel#lab52#CyberSecurity http://lab52.es pic.twitter.com/jaIivhHo91
Prikaži ovu nit -
Webinar | A 360-Degree View of the Latest APT Groups Join us to get insight into the most recent APT groups we've investigated; including
#APT38,#APT39, and#APT40. >> Register: https://feye.io/2ZhEMS7 pic.twitter.com/KMGMbS7nUR
-
You don't want to miss
@cglyer,@ItsReallyNick , and our very own Adversary Pursuit team member@ReginaElwell discuss M-Trends 2019 and continuing the discussion how we cluster activity.#threatintel#apt38#apt39#apt40 https://twitter.com/FireEye/status/1105891324459311104 … -
Is Kevin Mandia the “First Avenger” of
#cybersecurity? https://lnkd.in/eDMk5VX . Great#rsa2019 speech on the threat actors of day including most recently#apt40. When I want to know what’s going on, I ask Kevin! FireEye, Inc. Mandiant https://lnkd.in/ex59fSH
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.


