Rezultati pretraživanja
  1. Chinese Hackers Target Hong Kong Universities With New Backdoor Variant -

  2. 4. velj
  3. 3. velj

    The Chinese-linked threat group operating under the same cover as , , , , and , was observed using a new variant of the , the group’s flagship tool, to target and attack Hong Kong universities.

  4. 3. velj

    A new campaign of the Group is targeting Hong Kong universities using and Winnti : |

  5. 3. velj
  6. 3. velj
  7. 1. velj

    Group has compromised computer systems at two Hong Kong universities during the Hong Kong protests that started in March 2019.

  8. 1. velj

    2020-01-31: 🇨🇳 Targets Universities👨‍🎓 🔩|XOR Decoder| rule apt_win32_winnti_xordec { strings: $decoder_xor = { 8B C3 C1 E3 10 C1 E8 10 03 D8 6B DB 77 83 C3 13 } condition: $decoder_xor } Ref⬇️

  9. 31. sij
  10. 31. sij

    . has discovered a new campaign by the group targeting universities using a multi-modular backdoor:

  11. ESET has released their report on new variants of /, used against two universities in Hongkong.

    Prikaži ovu nit
  12. 31. sij
  13. 31. sij

    : researchers uncover a new campaign by the , known for attacks against various high-profile targets. This time, the WinntiGroup took aim at Hong Kong universities.

  14. surpasses and supply-chain attacks in complexity and techniques. The reason that it stayed undetected for so long is partly the fact that the trojanized software was signed with legitimate certificates. Details ⇒

  15. 23. tra 2019.

    The new variant uses Google Docs for command and control. Victims include Gaming companies (typical of Barium APT) and military contractors (unusual for Barium, could suggest Lead APT or an unknown group that uses it as well).

    Prikaži ovu nit
  16. 23. tra 2019.

    Our full analysis of and related gaming companies attacks, including a new (2018) variant of the backdoor:

    Prikaži ovu nit
  17. 25. ožu 2019.
    Odgovor korisnicima i sljedećem broju korisnika:

    IMHO, previous BARIUM operations like and CCleaner are possibly the main source of interesting MACs for this attack.

  18. 4. lis 2018.

    GReAT wins Peter Szor Award for Technical Research on at

  19. The Windows Defender ATP Research team will be at RSA to share an in-depth analysis of a supply chain incident, as well as insights and trends in this emerging threat.

    Prikaži ovu nit

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.