Created
September 21, 2018 10:48
-
-
Save nicdev/0f49187da3e5194b09df1e3911ef2457 to your computer and use it in GitHub Desktop.
[RFI] GET /collections/advisories
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| [ | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--5d4d8ba4-d111-74d4-9f45-e7326430a209", | |
| "collectionTitle": "HMRC Tax Refund Scam via Phishing Campaign", | |
| "collectionWikiContent": "", | |
| "collectionId": "5d4d8ba4d11174d49f45e7326430a209", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "x-industry:all", | |
| "phishing", | |
| "email", | |
| "xftas", | |
| "campaign", | |
| "x-risk:35" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-20T10:34:49.248Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--d8012270-6728-e2cf-5def-2cc8b955fc57", | |
| "collectionTitle": "Kodi Add-ons Containing Malware Mine Cryptocurrency", | |
| "collectionWikiContent": "", | |
| "collectionId": "d80122706728e2cf5def2cc8b955fc57", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "cryptomining", | |
| "advisory", | |
| "campaign", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-19T13:39:35.685Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--bea90727-02f8-af3c-5aea-d3c92edaf0a6", | |
| "collectionTitle": "New Modular Downloaders Fingerprint Systems - Part 3: COBINT", | |
| "collectionWikiContent": "", | |
| "collectionId": "bea9072702f8af3c5aead3c92edaf0a6", | |
| "owner": "", | |
| "tags": [ | |
| "x-risk:30", | |
| "advisory", | |
| "malware", | |
| "xftas", | |
| "phishing" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-19T13:32:27.608Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--edb9b874-6a68-5b53-346e-d10b6460d36b", | |
| "collectionTitle": "Turla: In and out of its unique Outlook backdoor", | |
| "collectionWikiContent": "", | |
| "collectionId": "edb9b8746a685b53346ed10b6460d36b", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "apt", | |
| "x-location:east-eur", | |
| "malware", | |
| "campaign", | |
| "backdoor", | |
| "xftas", | |
| "x-industry:all", | |
| "x-risk:32" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-19T13:31:31.970Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--a6ddc252-2f83-4e9d-396c-d4036ff88b55", | |
| "collectionTitle": "Domestic Kitten Surveillance Campaign", | |
| "collectionWikiContent": "", | |
| "collectionId": "a6ddc2522f834e9d396cd4036ff88b55", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "advisory", | |
| "campaign", | |
| "threat-activity", | |
| "spyware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-19T11:24:15.547Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--f895cb30-5fd7-d9f3-0360-03730ac8e77d", | |
| "collectionTitle": "PyLocky Ransomware", | |
| "collectionWikiContent": "", | |
| "collectionId": "f895cb305fd7d9f3036003730ac8e77d", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "ransomware", | |
| "xftas", | |
| "advisory", | |
| "spam" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-14T12:54:54.326Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--78b496f6-5de9-8217-d0be-eb64025e234f", | |
| "collectionTitle": "LuckyMouse Signs Malicious NDISProxy Driver with Certificate of Chinese IT Company", | |
| "collectionWikiContent": "", | |
| "collectionId": "78b496f65de98217d0beeb64025e234f", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "xftas", | |
| "threat-actor", | |
| "x-risk:37", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-14T11:45:10.065Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--6bcf4610-86fb-509b-d596-cb1aab210ac6", | |
| "collectionTitle": "Fallout Exploit Kit Delivers Multiple Families of Malware", | |
| "collectionWikiContent": "", | |
| "collectionId": "6bcf461086fb509bd596cb1aab210ac6", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "xftas", | |
| "malvertising", | |
| "campaign", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-13T22:34:48.536Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--f6071c66-7a57-7bca-86b6-2cb82b15e1f5", | |
| "collectionTitle": "CVE-2018-5002 and CHAINSHOT Malware", | |
| "collectionWikiContent": "", | |
| "collectionId": "f6071c667a577bca86b62cb82b15e1f5", | |
| "owner": "", | |
| "tags": [ | |
| "spearphish", | |
| "advisory", | |
| "xftas", | |
| "malware", | |
| "campaign" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-13T22:34:23.628Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--a2a6346a-56ee-4ad1-bd44-2bab8751d7f2", | |
| "collectionTitle": "Rocke: The Champion of Monero Miners", | |
| "collectionWikiContent": "", | |
| "collectionId": "a2a6346a56ee4ad1bd442bab8751d7f2", | |
| "owner": "", | |
| "tags": [ | |
| "cryptomining", | |
| "advisory", | |
| "vulnerability", | |
| "malware", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-13T15:24:24.303Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--0fa6578f-adc8-aa09-ed22-05adf9fc2423", | |
| "collectionTitle": "Middle Eastern Government Targeted By OilRig Group", | |
| "collectionWikiContent": "", | |
| "collectionId": "0fa6578fadc8aa09ed2205adf9fc2423", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "spearphish", | |
| "trojan", | |
| "advisory", | |
| "campaign" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-13T12:36:52.170Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--cbb0ba41-28f8-3a23-918e-0db08d8148cd", | |
| "collectionTitle": "The Urpage Connection to Bahamut, Confucius and Patchwork", | |
| "collectionWikiContent": "", | |
| "collectionId": "cbb0ba4128f83a23918e0db08d8148cd", | |
| "owner": "", | |
| "tags": [ | |
| "campaign", | |
| "malware", | |
| "x-risk:42", | |
| "advisory", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-13T12:28:02.176Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--60680123-dc6d-1b2e-c405-dce666cab376", | |
| "collectionTitle": "A Chronology of GandCrab v4.x", | |
| "collectionWikiContent": "", | |
| "collectionId": "60680123dc6d1b2ec405dce666cab376", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "advisory", | |
| "ransomware", | |
| "xftas", | |
| "x-risk:37" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-12T12:49:06.177Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--e0a0de17-8cbc-2be3-55e6-92c34bc077cf", | |
| "collectionTitle": "Spam Campaign Infects Users in Japan with BEBLOH and URSNIF Malware", | |
| "collectionWikiContent": "", | |
| "collectionId": "e0a0de178cbc2be355e692c34bc077cf", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "phishing", | |
| "advisory", | |
| "xftas", | |
| "campaign" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-12T02:00:03.895Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--204ff79a-037c-cd3f-6e2e-f31df1bc96f1", | |
| "collectionTitle": "Android/HiddenMiner.A!tr Sample Analyzed", | |
| "collectionWikiContent": "", | |
| "collectionId": "204ff79a037ccd3f6e2ef31df1bc96f1", | |
| "owner": "", | |
| "tags": [ | |
| "coinminer", | |
| "malware", | |
| "monero", | |
| "xftas", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-11T12:59:31.327Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--744da350-1a98-a080-0796-064cda0174c6", | |
| "collectionTitle": "Yet Another Monero Miner", | |
| "collectionWikiContent": "", | |
| "collectionId": "744da3501a98a0800796064cda0174c6", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "advisory", | |
| "xftas", | |
| "monero" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-11T01:27:41.075Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--20ce93bf-9659-3699-ce8e-d0e70124cc62", | |
| "collectionTitle": "Recent Geodo Malware Campaigns Feature Heavily Obfuscated Macros", | |
| "collectionWikiContent": "", | |
| "collectionId": "20ce93bf96593699ce8ed0e70124cc62", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "bankingtrojan", | |
| "advisory", | |
| "xftas", | |
| "phishing" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-10T16:37:55.731Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--14c1c15b-4f95-7880-268c-94aad0f9b25f", | |
| "collectionTitle": "Hakai Variant", | |
| "collectionWikiContent": "", | |
| "collectionId": "14c1c15b4f957880268c94aad0f9b25f", | |
| "owner": "", | |
| "tags": [ | |
| "vulnerability", | |
| "x-risk:33", | |
| "malware", | |
| "advisory", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-07T14:37:40.520Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--4dc75868-68cc-fd8e-d461-04d6b1cf5fb3", | |
| "collectionTitle": "PowerPool malware exploits ALPC LPE zero-day vulnerability", | |
| "collectionWikiContent": "", | |
| "collectionId": "4dc7586868ccfd8ed46104d6b1cf5fb3", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "malware", | |
| "advisory", | |
| "phishing", | |
| "0-day" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-07T13:38:13.085Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--d7e9e794-56e1-1f34-417d-55689093d71d", | |
| "collectionTitle": "Email Campaign Delivers HERMES Ransomware via a Password Protected Word Document", | |
| "collectionWikiContent": "", | |
| "collectionId": "d7e9e79456e11f34417d55689093d71d", | |
| "owner": "", | |
| "tags": [ | |
| "ransomware", | |
| "incident", | |
| "advisory", | |
| "xftas", | |
| "campaign" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-07T06:07:07.889Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--0c8339c8-2902-2b09-1c45-fb99ced667e2", | |
| "collectionTitle": "Hiddad Malware Found within Applications in Google Play Store", | |
| "collectionWikiContent": "", | |
| "collectionId": "0c8339c829022b091c45fb99ced667e2", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "malware", | |
| "threat-actor", | |
| "android", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-07T05:04:57.002Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--28ac960d-7d49-05ef-85de-a64929870937", | |
| "collectionTitle": "WordPress Redirect Campaign Targets Vulnerable tagDiv Themes and Ultimate Member Plugins", | |
| "collectionWikiContent": "", | |
| "collectionId": "28ac960d7d4905ef85dea64929870937", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "xftas", | |
| "vulnerability", | |
| "wordpress", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-06T14:12:53.104Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--d22fc5e8-43c7-4e57-d0a7-9e8a288334bb", | |
| "collectionTitle": "Cobalt Group - JavaScript backdoor, CobInt/COOLPANTS", | |
| "collectionWikiContent": "", | |
| "collectionId": "d22fc5e843c74e57d0a79e8a288334bb", | |
| "owner": "", | |
| "tags": [ | |
| "threat-actor", | |
| "advisory", | |
| "malware", | |
| "phishing", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-09-06T14:10:33.160Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--0ea9647a-b5ab-6e92-210f-280e01a5ad89", | |
| "collectionTitle": "CeidPageLock: A Chinese RootKit", | |
| "collectionWikiContent": "", | |
| "collectionId": "0ea9647ab5ab6e92210f280e01a5ad89", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "malware", | |
| "browserhijacker", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-31T13:07:00.723Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--a51089ed-2001-791e-5f3a-ed7a70d1d3a3", | |
| "collectionTitle": "Malicious Emails Targeting the Banking Industry", | |
| "collectionWikiContent": "", | |
| "collectionId": "a51089ed2001791e5f3aed7a70d1d3a3", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "threat-actor", | |
| "xftas", | |
| "phishing", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-31T13:06:35.096Z", | |
| "modified": "2018-09-21T10:28:04.253Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--4bdbb7ef-f519-6b24-ce49-81abcffec11e", | |
| "collectionTitle": "COBALT DICKENS Targets Universities", | |
| "collectionWikiContent": "", | |
| "collectionId": "4bdbb7eff5196b24ce4981abcffec11e", | |
| "owner": "", | |
| "tags": [ | |
| "informationstealer", | |
| "phishing", | |
| "xftas", | |
| "advisory", | |
| "threat-actor" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-30T13:03:04.845Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--212e2efb-b3b9-cbaa-299e-4487f0984764", | |
| "collectionTitle": "AdvisorsBot", | |
| "collectionWikiContent": "", | |
| "collectionId": "212e2efbb3b9cbaa299e4487f0984764", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "phishing", | |
| "advisory", | |
| "malware", | |
| "informationstealer" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-30T13:02:45.538Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--3fe9319b-dc76-e20c-3123-e2695fb658f1", | |
| "collectionTitle": "Foudre Malware", | |
| "collectionWikiContent": "", | |
| "collectionId": "3fe9319bdc76e20c3123e2695fb658f1", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "advisory", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-30T01:01:56.203Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--db6c886a-d287-ae67-ac8b-b2e7624fac8c", | |
| "collectionTitle": "Picking Apart Remcos Botnet-In-A-Box", | |
| "collectionWikiContent": "", | |
| "collectionId": "db6c886ad287ae67ac8bb2e7624fac8c", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "advisory", | |
| "trojan", | |
| "phishing", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-29T12:55:26.930Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--9e0601e6-2303-4af4-cec0-182dc074dd49", | |
| "collectionTitle": "Operation AppleJeus: Lazarus hits cryptocurrency exchange with fake installer and macOS malware", | |
| "collectionWikiContent": "", | |
| "collectionId": "9e0601e623034af4cec0182dc074dd49", | |
| "owner": "", | |
| "tags": [ | |
| "macos", | |
| "threat-actor", | |
| "malware", | |
| "advisory", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-28T12:51:05.684Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--bb8eeb4d-431b-24c6-df33-ff07c076a950", | |
| "collectionTitle": "Belt and Road Initiative Linked to Cyber Espionage Activity", | |
| "collectionWikiContent": "", | |
| "collectionId": "bb8eeb4d431b24c6df33ff07c076a950", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "espionage", | |
| "advisory", | |
| "threat-actor", | |
| "incident" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-27T14:26:43.390Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--329ad04c-1119-94e4-c6c1-c62d3e50a670", | |
| "collectionTitle": "Trickbot Evolves", | |
| "collectionWikiContent": "", | |
| "collectionId": "329ad04c111994e4c6c1c62d3e50a670", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "malware", | |
| "incident", | |
| "xftas", | |
| "email" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-27T03:05:01.739Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--93beb94a-f3f3-d426-b58d-a0a51e9255ef", | |
| "collectionTitle": "Ryuk Ransomware", | |
| "collectionWikiContent": "", | |
| "collectionId": "93beb94af3f3d426b58da0a51e9255ef", | |
| "owner": "", | |
| "tags": [ | |
| "ransomware", | |
| "malware", | |
| "xftas", | |
| "advisory", | |
| "incident" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-24T13:43:08.304Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--09bdd573-31ba-ee1f-5140-874b371d8b47", | |
| "collectionTitle": "CVE-2018-11776 - Apache Struts Critical Remote Code Vulnerability", | |
| "collectionWikiContent": "", | |
| "collectionId": "09bdd57331baee1f5140874b371d8b47", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "xftas", | |
| "vulnerability" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-23T16:45:34.663Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--69508b09-6e6d-2f3b-fb09-4dbd4e70c967", | |
| "collectionTitle": "Dark Tequila Añejo", | |
| "collectionWikiContent": "", | |
| "collectionId": "69508b096e6d2f3bfb094dbd4e70c967", | |
| "owner": "", | |
| "tags": [ | |
| "bankingtrojan", | |
| "advisory", | |
| "malware", | |
| "xftas", | |
| "informationstealer" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-22T13:29:03.710Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--d4dfe3e7-b349-9f09-a49a-dc59c6137e4b", | |
| "collectionTitle": "Strontium, Fancy Bear, APT28 Microsoft Domain Takeover", | |
| "collectionWikiContent": "", | |
| "collectionId": "d4dfe3e7b3499f09a49adc59c6137e4b", | |
| "owner": "", | |
| "tags": [ | |
| "threat-actor", | |
| "malware", | |
| "advisory", | |
| "phishing", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-22T13:26:54.336Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--c06db88e-897f-45a3-80e0-a40a1399d4a3", | |
| "collectionTitle": "Marap - Downloader Malware", | |
| "collectionWikiContent": "", | |
| "collectionId": "c06db88e897f45a380e0a40a1399d4a3", | |
| "owner": "", | |
| "tags": [ | |
| "phishing", | |
| "spam", | |
| "xftas", | |
| "malware", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-22T13:25:54.100Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--c17ba3bb-5a47-20ac-eded-fe334220e099", | |
| "collectionTitle": "Android Malware That Combines A Banking Trojan, Keylogger, And Ransomware In One Package", | |
| "collectionWikiContent": "", | |
| "collectionId": "c17ba3bb5a4720acededfe334220e099", | |
| "owner": "", | |
| "tags": [ | |
| "ransomware", | |
| "xftas", | |
| "advisory", | |
| "trojan", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-22T12:35:25.787Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--c3f857d1-5fbd-173d-333a-8c58e402befe", | |
| "collectionTitle": "Dark Hotel APT group leveraging CVE-2018-8373 vulnerability", | |
| "collectionWikiContent": "", | |
| "collectionId": "c3f857d15fbd173d333a8c58e402befe", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "vulnerability", | |
| "malware", | |
| "xftas", | |
| "threat-actor" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-21T14:09:46.058Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--a08b7625-dcbb-4bb8-52ba-15652f7fb393", | |
| "collectionTitle": "Necurs Targeting Banks with PUB File that Drops FlawedAmmyy", | |
| "collectionWikiContent": "", | |
| "collectionId": "a08b7625dcbb4bb852ba15652f7fb393", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "malware", | |
| "advisory", | |
| "phishing", | |
| "botnet" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-21T14:07:32.122Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--f853c5bf-026b-a4a0-cd50-d6845cb9d501", | |
| "collectionTitle": "Ramnit’s Network of Proxy Servers", | |
| "collectionWikiContent": "", | |
| "collectionId": "f853c5bf026ba4a0cd50d6845cb9d501", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "malware", | |
| "xftas", | |
| "botnet", | |
| "proxy" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-20T12:50:42.349Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--3c8503f6-eb1e-77a2-3158-1d2d0d48bd07", | |
| "collectionTitle": "VBEtaly: An Italian Ursnif MalSpam Campaign", | |
| "collectionWikiContent": "", | |
| "collectionId": "3c8503f6eb1e77a231581d2d0d48bd07", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "malware", | |
| "malspam", | |
| "xftas", | |
| "trojan" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-20T12:49:48.720Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--bb06e44b-664f-06d6-e80b-4d34438c67e4", | |
| "collectionTitle": "KeyPass Ransomware", | |
| "collectionWikiContent": "", | |
| "collectionId": "bb06e44b664f06d6e80b4d34438c67e4", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "xftas", | |
| "advisory", | |
| "ransomware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-20T12:49:05.934Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--435a6737-52c5-8e36-0dba-bbb9b9c88a07", | |
| "collectionTitle": "BackSwap Trojan Now Targets Spanish Banks", | |
| "collectionWikiContent": "", | |
| "collectionId": "435a673752c58e360dbabbb9b9c88a07", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "trusteer", | |
| "malware", | |
| "xftas", | |
| "bankingtrojan" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-17T12:52:48.718Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--36eaae69-2fe2-2eb3-d3c1-05422e8856d5", | |
| "collectionTitle": "Ransomware as a Service: Princess Evolution Looking for Affiliates", | |
| "collectionWikiContent": "", | |
| "collectionId": "36eaae692fe22eb3d3c105422e8856d5", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "xftas", | |
| "advisory", | |
| "ransomware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-17T12:39:30.775Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--a0eff235-0b4c-41a8-a245-61043099c57f", | |
| "collectionTitle": "Revamped Ramnit Variants Target Banks in the UK", | |
| "collectionWikiContent": "", | |
| "collectionId": "a0eff2350b4c41a8a24561043099c57f", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "trusteer", | |
| "campaign", | |
| "malware", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-16T04:45:29.124Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--080928a7-c239-edd3-ccd7-d8593ed71084", | |
| "collectionTitle": "TrickBot Campaigns Target North American and European Banks", | |
| "collectionWikiContent": "", | |
| "collectionId": "080928a7c239edd3ccd7d8593ed71084", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "trusteer", | |
| "xftas", | |
| "campaign", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-14T21:43:26.252Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--b18c9002-f859-7f27-48c2-cbd7ca099bd6", | |
| "collectionTitle": "GandCrab Ransomware Versions 4.0 through 4.2", | |
| "collectionWikiContent": "", | |
| "collectionId": "b18c9002f8597f2748c2cbd7ca099bd6", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "ransomware", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-10T13:07:17.627Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--e7638369-2890-e013-8b7b-abcaec7f38c8", | |
| "collectionTitle": "Malware Analysis Report AR18-221A: HIDDEN COBRA Trojan - KEYMARBLE", | |
| "collectionWikiContent": "", | |
| "collectionId": "e76383692890e0138b7babcaec7f38c8", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "malware", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-10T11:53:08.016Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--41a756de-cff8-86e0-979b-6bb1653258f8", | |
| "collectionTitle": "Bisonal Malware Used in Attacks Against Russia and South Korea", | |
| "collectionWikiContent": "", | |
| "collectionId": "41a756decff886e0979b6bb1653258f8", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "advisory", | |
| "phishing", | |
| "campaign" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-10T11:46:05.831Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--3d67029a-0c5e-01b6-e301-0340e2b28914", | |
| "collectionTitle": "A Malvertising Campaign, Wordpress and Rig", | |
| "collectionWikiContent": "", | |
| "collectionId": "3d67029a0c5e01b6e3010340e2b28914", | |
| "owner": "", | |
| "tags": [ | |
| "campaign", | |
| "advisory", | |
| "vulnerability", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-09T11:58:07.977Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--2bf7afd9-941c-8549-0766-b22a9f18ccb8", | |
| "collectionTitle": "Google Play Apps Infected With Malicious Windows Executables", | |
| "collectionWikiContent": "", | |
| "collectionId": "2bf7afd9941c85490766b22a9f18ccb8", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "malware", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-09T11:30:01.501Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--2c571527-56bb-1d8c-6c4c-a7236baf952b", | |
| "collectionTitle": "CactusTorch Infects Victims By Abusing .NET", | |
| "collectionWikiContent": "", | |
| "collectionId": "2c57152756bb1d8c6c4ca7236baf952b", | |
| "owner": "", | |
| "tags": [ | |
| "fileless", | |
| "xftas", | |
| "malware", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-06T13:11:24.725Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--788ff67a-ec87-c948-a2ea-8c73e0bec373", | |
| "collectionTitle": "Leafminer Spying on Middle Eastern Regions", | |
| "collectionWikiContent": "", | |
| "collectionId": "788ff67aec87c948a2ea8c73e0bec373", | |
| "owner": "", | |
| "tags": [ | |
| "espionage", | |
| "advisory", | |
| "xftas", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-03T13:09:49.142Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--907f3c50-b450-f18e-f794-04d61d6351e8", | |
| "collectionTitle": "Emotet - The Trojan That Keeps On Surfacing", | |
| "collectionWikiContent": "", | |
| "collectionId": "907f3c50b450f18ef79404d61d6351e8", | |
| "owner": "", | |
| "tags": [ | |
| "trojan", | |
| "advisory", | |
| "malware", | |
| "spam", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-08-02T13:54:32.748Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--de61facf-071a-b8db-220c-2dfae16a5ea8", | |
| "collectionTitle": "Calisto Trojan Targets macOS", | |
| "collectionWikiContent": "", | |
| "collectionId": "de61facf071ab8db220c2dfae16a5ea8", | |
| "owner": "", | |
| "tags": [ | |
| "backdoor", | |
| "trojan", | |
| "xftas", | |
| "advisory", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-30T12:53:45.138Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--8edc9de5-2ca4-d830-49a1-e1db9e21d9c3", | |
| "collectionTitle": "Hide 'N Seek - IoT Style", | |
| "collectionWikiContent": "", | |
| "collectionId": "8edc9de52ca4d83049a1e1db9e21d9c3", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "botnet", | |
| "advisory", | |
| "iot", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-27T13:07:03.956Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--6a74436c-565f-a19f-6c93-3fbdf2ce2e03", | |
| "collectionTitle": "Searching for APT28 - Operation Roman Holiday", | |
| "collectionWikiContent": "", | |
| "collectionId": "6a74436c565fa19f6c933fbdf2ce2e03", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "apt28", | |
| "xftas", | |
| "advisory", | |
| "campaign" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-26T13:38:58.866Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--90750445-20d7-936b-f2ef-ee4dc06ee2ab", | |
| "collectionTitle": "Gozi v 3 Campaigns Target Banks in Japan", | |
| "collectionWikiContent": "", | |
| "collectionId": "9075044520d7936bf2efee4dc06ee2ab", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "campaign", | |
| "trusteer", | |
| "advisory", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-25T23:36:14.613Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--1bde5e63-c0cd-238a-bd37-82207663db93", | |
| "collectionTitle": "Mirai Activity", | |
| "collectionWikiContent": "", | |
| "collectionId": "1bde5e63c0cd238abd3782207663db93", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "malware", | |
| "bot", | |
| "iot", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-25T14:09:28.213Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--994e36a9-f714-77b3-7717-50eccbbb1c0f", | |
| "collectionTitle": "New Andariel Reconnaissance Tactics Hint At Next Targets", | |
| "collectionWikiContent": "", | |
| "collectionId": "994e36a9f71477b3771750eccbbb1c0f", | |
| "owner": "", | |
| "tags": [ | |
| "campaign", | |
| "advisory", | |
| "xftas", | |
| "threat-actor" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-24T15:40:07.189Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--cb8d4550-85bf-91c7-1526-5fcbb58b5f3a", | |
| "collectionTitle": "Social Media Abused By Blackgear Campaign For Command and Control", | |
| "collectionWikiContent": "", | |
| "collectionId": "cb8d455085bf91c715265fcbb58b5f3a", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "malware", | |
| "advisory", | |
| "campaign", | |
| "spam" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-24T12:56:02.881Z", | |
| "modified": "2018-09-21T10:28:04.254Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--84ddeda0-f9bf-bb17-bd96-3a4e1b4fff1b", | |
| "collectionTitle": "ZombieBoy", | |
| "collectionWikiContent": "", | |
| "collectionId": "84ddeda0f9bfbb17bd963a4e1b4fff1b", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "malware", | |
| "xftas", | |
| "coinminer", | |
| "cryptocurrency" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-24T10:27:50.988Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--758f6297-e8ac-d734-f520-40be6eb97884", | |
| "collectionTitle": "Hussarini – Targeted Cyber Attack in the Philippines", | |
| "collectionWikiContent": "", | |
| "collectionId": "758f6297e8acd734f52040be6eb97884", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "malware", | |
| "xftas", | |
| "trojan", | |
| "campaign" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-19T12:45:52.618Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--7e7953f9-ab2b-49b0-56a3-05180cc68163", | |
| "collectionTitle": "Magniber ransomware improves, expands within Asia", | |
| "collectionWikiContent": "", | |
| "collectionId": "7e7953f9ab2b49b056a305180cc68163", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "malware", | |
| "exploit-kit", | |
| "ransomware", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-19T12:44:33.715Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--45429b0d-1c2a-9a2c-3b34-4b86a2000da9", | |
| "collectionTitle": "Avoid the Vermin RAThole", | |
| "collectionWikiContent": "", | |
| "collectionId": "45429b0d1c2a9a2c3b344b86a2000da9", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "phishing", | |
| "malware", | |
| "xftas", | |
| "socialengineering" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-19T12:38:34.823Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--3a01ec13-19bd-c26a-9992-63fd7e13a5e9", | |
| "collectionTitle": "Big Bang Attacks In the Middle East", | |
| "collectionWikiContent": "", | |
| "collectionId": "3a01ec1319bdc26a999263fd7e13a5e9", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "campaign", | |
| "xftas", | |
| "advisory", | |
| "phishing" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-18T13:01:43.142Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--3e443bb5-912b-ebf9-d532-b96faaf52cba", | |
| "collectionTitle": "Plead Malware Misuses Taiwanese Code-Signing Certificates", | |
| "collectionWikiContent": "", | |
| "collectionId": "3e443bb5912bebf9d532b96faaf52cba", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "threat-actor", | |
| "advisory", | |
| "xftas", | |
| "backdoor" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-17T12:40:26.058Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--4b26df54-adaa-9481-8df5-454d52be255f", | |
| "collectionTitle": "New Tactics Seen In Smoke Loader \ufffc", | |
| "collectionWikiContent": "", | |
| "collectionId": "4b26df54adaa94818df5454d52be255f", | |
| "owner": "", | |
| "tags": [ | |
| "downloader", | |
| "advisory", | |
| "malware", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-16T13:28:29.580Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--7bef196b-141f-fe91-d9a5-6604e9ac891e", | |
| "collectionTitle": "RANCOR: Targeted Attacks in South East Asia Using PLAINTEE and DDKONG Malware Families", | |
| "collectionWikiContent": "", | |
| "collectionId": "7bef196b141ffe91d9a56604e9ac891e", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "campaign", | |
| "advisory", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-16T12:09:29.756Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--9fcfbfd3-90d8-a7f4-5763-cb7738bc1ed7", | |
| "collectionTitle": "Exploit Kit Activity Slow, But Not Gone", | |
| "collectionWikiContent": "", | |
| "collectionId": "9fcfbfd390d8a7f45763cb7738bc1ed7", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "ransomware", | |
| "xftas", | |
| "exploit-kit", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-13T12:54:59.397Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--705dc412-16b0-4c9b-dc55-fe75476fb18f", | |
| "collectionTitle": "Tick Group Using USB Drives In Air-Gapped Attacks", | |
| "collectionWikiContent": "", | |
| "collectionId": "705dc41216b04c9bdc55fe75476fb18f", | |
| "owner": "", | |
| "tags": [ | |
| "threat-group", | |
| "espionage", | |
| "advisory", | |
| "xftas", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-12T14:04:12.299Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--9c431605-8c7a-4c50-931d-135e62d55d89", | |
| "collectionTitle": "Petya (NotPetya) Ransomware Campaign", | |
| "collectionWikiContent": "", | |
| "collectionId": "9c4316058c7a4c50931d135e62d55d89", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "incident", | |
| "ransomware", | |
| "x-force", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-12T13:29:29.121Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--82b7d07c-4b09-8c6f-cb6e-a850af8564ba", | |
| "collectionTitle": "New Encrypted Downloader - GZipDe", | |
| "collectionWikiContent": "", | |
| "collectionId": "82b7d07c4b098c6fcb6ea850af8564ba", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "advisory", | |
| "backdoor", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-12T12:59:31.318Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--b8d1b241-554c-71ce-a5e7-adef0c8f0ef6", | |
| "collectionTitle": "Threat-Group Magecart Targets Ticketmaster", | |
| "collectionWikiContent": "", | |
| "collectionId": "b8d1b241554c71cea5e7adef0c8f0ef6", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "breach", | |
| "threat-group", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-11T12:58:13.094Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--5ae492bb-b552-3d11-d0b1-638f63eaee40", | |
| "collectionTitle": "Japan and Korea Victims of FakeSpy Malware", | |
| "collectionWikiContent": "", | |
| "collectionId": "5ae492bbb5523d11d0b1638f63eaee40", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "advisory", | |
| "sms", | |
| "android", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-06T12:38:28.040Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--4d8a5f67-e8da-2e98-df25-707e34407716", | |
| "collectionTitle": "The New Face of Necurs: Noteworthy Changes to Necurs’ Behaviors", | |
| "collectionWikiContent": "", | |
| "collectionId": "4d8a5f67e8da2e98df25707e34407716", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "xftas", | |
| "botnet", | |
| "advisory", | |
| "phishing" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-05T14:42:20.430Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--a9feda5f-5c2f-d1ef-ed6a-9ece34716e63", | |
| "collectionTitle": "Malicious Documents from Lazarus Group Targeting South Korea", | |
| "collectionWikiContent": "", | |
| "collectionId": "a9feda5f5c2fd1efed6a9ece34716e63", | |
| "owner": "", | |
| "tags": [ | |
| "trojan", | |
| "xftas", | |
| "malware", | |
| "campaign", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-05T13:05:11.071Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--36084708-4c89-5ed5-be6c-0d90a6448e33", | |
| "collectionTitle": "TrickBot Campaigns Target North American and European Banks", | |
| "collectionWikiContent": "", | |
| "collectionId": "360847084c895ed5be6c0d90a6448e33", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "trusteer", | |
| "advisory", | |
| "campaign" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-05T03:45:53.721Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--42c20077-d7b0-f9e5-a553-3e53e21c5b61", | |
| "collectionTitle": "First Quarter Phishing Results", | |
| "collectionWikiContent": "", | |
| "collectionId": "42c20077d7b0f9e5a5533e53e21c5b61", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "advisory", | |
| "phishing" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-03T12:05:14.971Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--4ac0b8ce-b094-78be-a508-8b6dfc171295", | |
| "collectionTitle": "Android Malware HeroRat Abuses Telegram For Communication", | |
| "collectionWikiContent": "", | |
| "collectionId": "4ac0b8ceb09478bea5088b6dfc171295", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "android", | |
| "advisory", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-07-03T12:01:51.899Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--5a957461-b03b-6759-e2ac-0426ce3f76dd", | |
| "collectionTitle": "Kardon Loader", | |
| "collectionWikiContent": "", | |
| "collectionId": "5a957461b03b6759e2ac0426ce3f76dd", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "malware", | |
| "downloader", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2018-06-28T13:22:59.128Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--1e3a71f8-f9f0-a72e-8c17-e322f1e5824e", | |
| "collectionTitle": "APT15 - Repurposing Old Tools", | |
| "collectionWikiContent": "", | |
| "collectionId": "1e3a71f8f9f0a72e8c17e322f1e5824e", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "apt15", | |
| "campaign", | |
| "malware", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-06-27T16:31:27.680Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--ddfa3245-5735-dadf-10e8-9dca1c178a54", | |
| "collectionTitle": "Olympic Destroyer is still alive", | |
| "collectionWikiContent": "", | |
| "collectionId": "ddfa32455735dadf10e89dca1c178a54", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "campaign", | |
| "advisory", | |
| "xftas", | |
| "olympicdestroyer" | |
| ], | |
| "tlp": "", | |
| "created": "2018-06-26T13:25:03.568Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--a1b076e9-b125-677b-71d4-9beb880364a3", | |
| "collectionTitle": "VPNFilter Exploiting Endpoints and New Devices", | |
| "collectionWikiContent": "", | |
| "collectionId": "a1b076e9b125677b71d49beb880364a3", | |
| "owner": "", | |
| "tags": [ | |
| "incident", | |
| "malware", | |
| "campaign", | |
| "advisory", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-06-06T13:50:37.696Z", | |
| "modified": "2018-09-21T10:28:04.255Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--cc3e6b17-5c72-c02b-e552-53f690a0577f", | |
| "collectionTitle": "When Encryption EFails", | |
| "collectionWikiContent": "", | |
| "collectionId": "cc3e6b175c72c02be55253f690a0577f", | |
| "owner": "", | |
| "tags": [ | |
| "incident", | |
| "advisory", | |
| "vulnerability", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-05-15T17:43:43.299Z", | |
| "modified": "2018-09-21T10:28:04.256Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--b5feb100-feef-de52-e5e6-11d89059bf17", | |
| "collectionTitle": "Unpatched CVE-2017-11882 Leads to Remcos RAT Variant", | |
| "collectionWikiContent": "", | |
| "collectionId": "b5feb100feefde52e5e611d89059bf17", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "campaign", | |
| "rat", | |
| "malware", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-05-11T12:52:17.088Z", | |
| "modified": "2018-09-21T10:28:04.256Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--252c030b-9ca5-e544-340b-50fbc6c2d847", | |
| "collectionTitle": "SynAck Ransomware and Process Doppelgänging", | |
| "collectionWikiContent": "", | |
| "collectionId": "252c030b9ca5e544340b50fbc6c2d847", | |
| "owner": "", | |
| "tags": [ | |
| "ransomware", | |
| "xftas", | |
| "advisory", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-05-10T12:43:22.834Z", | |
| "modified": "2018-09-21T10:28:04.256Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--79e9972b-9d88-8293-af01-f79d8b64556d", | |
| "collectionTitle": "Operation GhostSecret Havesting Data Globally", | |
| "collectionWikiContent": "", | |
| "collectionId": "79e9972b9d888293af01f79d8b64556d", | |
| "owner": "", | |
| "tags": [ | |
| "incident", | |
| "advisory", | |
| "malware", | |
| "xftas", | |
| "threat-group" | |
| ], | |
| "tlp": "", | |
| "created": "2018-05-01T19:19:08.877Z", | |
| "modified": "2018-09-21T10:28:04.256Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--cf0214e8-7d68-ac6e-ff27-eb6714ac65d3", | |
| "collectionTitle": "Examining Sednit and Zebrocy", | |
| "collectionWikiContent": "", | |
| "collectionId": "cf0214e87d68ac6eff27eb6714ac65d3", | |
| "owner": "", | |
| "tags": [ | |
| "treat-group", | |
| "malware", | |
| "advisory", | |
| "campaign", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-04-27T12:51:25.563Z", | |
| "modified": "2018-09-21T10:28:04.256Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--0547cbc8-eb2d-c52c-344b-5da2b7c4063f", | |
| "collectionTitle": "Muhstik Botnet Actively Exploiting CVE-2018-7600", | |
| "collectionWikiContent": "", | |
| "collectionId": "0547cbc8eb2dc52c344b5da2b7c4063f", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "advisory", | |
| "malware", | |
| "botnet", | |
| "vulnerability" | |
| ], | |
| "tlp": "", | |
| "created": "2018-04-25T13:35:06.712Z", | |
| "modified": "2018-09-21T10:28:04.256Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--643d3535-4f6e-8bbb-4744-95d454e6c1dc", | |
| "collectionTitle": "Threat-Group Orangeworm Targets Healthcare Industry", | |
| "collectionWikiContent": "", | |
| "collectionId": "643d35354f6e8bbb474495d454e6c1dc", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "xftas", | |
| "threat-actor", | |
| "incident", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2018-04-25T12:25:21.380Z", | |
| "modified": "2018-09-21T10:28:04.256Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--4c07cd36-8e67-cc98-f3fa-f225f75549b1", | |
| "collectionTitle": "New Lazarus Group Financial Tactics", | |
| "collectionWikiContent": "", | |
| "collectionId": "4c07cd368e67cc98f3faf225f75549b1", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "xftas", | |
| "malware", | |
| "phishing", | |
| "incident" | |
| ], | |
| "tlp": "", | |
| "created": "2018-04-18T01:49:56.359Z", | |
| "modified": "2018-09-21T10:28:04.256Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--378da1cd-99f4-0ef4-8c68-421b7d836084", | |
| "collectionTitle": "Banking Trojan IcedID Teams Up With Ursnif/Dreambot", | |
| "collectionWikiContent": "", | |
| "collectionId": "378da1cd99f40ef48c68421b7d836084", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "trojan", | |
| "xftas", | |
| "x-force", | |
| "incident" | |
| ], | |
| "tlp": "", | |
| "created": "2018-04-12T21:10:53.334Z", | |
| "modified": "2018-09-21T10:28:04.257Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--26ebed27-6070-f2bc-04d5-27046d54fb2f", | |
| "collectionTitle": "Sofacy aka APT28, Fancy Bear, Tsar Team Activity.", | |
| "collectionWikiContent": "", | |
| "collectionId": "26ebed276070f2bc04d527046d54fb2f", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "advisory", | |
| "campaign", | |
| "malware", | |
| "sofacy" | |
| ], | |
| "tlp": "", | |
| "created": "2018-03-27T16:15:14.490Z", | |
| "modified": "2018-09-21T10:28:04.257Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--4d496fa8-22c5-bb7c-d345-f12625f490ee", | |
| "collectionTitle": "World Leader in Spam Traffic - Necurs Botnet", | |
| "collectionWikiContent": "", | |
| "collectionId": "4d496fa822c5bb7cd345f12625f490ee", | |
| "owner": "", | |
| "tags": [ | |
| "incident", | |
| "xftas", | |
| "botnet", | |
| "campaign", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2018-03-21T01:59:59.655Z", | |
| "modified": "2018-09-21T10:28:04.257Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--4fb56e51-6416-c5eb-ca49-a2f0babb7f56", | |
| "collectionTitle": "Ryzenfall", | |
| "collectionWikiContent": "", | |
| "collectionId": "4fb56e516416c5ebca49a2f0babb7f56", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "vulnerability", | |
| "advisory", | |
| "incident" | |
| ], | |
| "tlp": "", | |
| "created": "2018-03-21T01:23:58.001Z", | |
| "modified": "2018-09-21T10:28:04.257Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--702327db-3f58-c569-daa5-7ab7a21e1ba9", | |
| "collectionTitle": "Donot Team Targets South Asia With Modular Malware Framework", | |
| "collectionWikiContent": "", | |
| "collectionId": "702327db3f58c569daa57ab7a21e1ba9", | |
| "owner": "", | |
| "tags": [ | |
| "incident", | |
| "campaign", | |
| "malware", | |
| "advisory", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-03-16T12:36:49.070Z", | |
| "modified": "2018-09-21T10:28:04.257Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--dd0b60a5-e090-dbf6-5df8-be77673c182e", | |
| "collectionTitle": "Hidden Cobra Targets Turkish Financial Sector With Bankshot Malware", | |
| "collectionWikiContent": "", | |
| "collectionId": "dd0b60a5e090dbf65df8be77673c182e", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "advisory", | |
| "xftas", | |
| "campaign", | |
| "phishing" | |
| ], | |
| "tlp": "", | |
| "created": "2018-03-13T14:24:23.422Z", | |
| "modified": "2018-09-21T10:28:04.257Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--f8f272d0-1569-b771-91fd-a3ea1b8292d4", | |
| "collectionTitle": "Dark Cloud Botnet Distributing Gozi ISFB", | |
| "collectionWikiContent": "", | |
| "collectionId": "f8f272d01569b77191fda3ea1b8292d4", | |
| "owner": "", | |
| "tags": [ | |
| "campaign", | |
| "advisory", | |
| "malware", | |
| "incident", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-03-12T13:08:20.518Z", | |
| "modified": "2018-09-21T10:28:04.257Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--7a463c24-f933-09fc-8d79-709940497166", | |
| "collectionTitle": "From Ransomware to Mining - Rig Exploit Kit", | |
| "collectionWikiContent": "", | |
| "collectionId": "7a463c24f93309fc8d79709940497166", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "campaign", | |
| "exploit-kit", | |
| "incident", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2018-03-01T13:29:10.543Z", | |
| "modified": "2018-09-21T10:28:04.257Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--336ed192-d0ce-4c11-e42f-28cddba6b41e", | |
| "collectionTitle": "ThreeDollars Will Get You an OopsIE", | |
| "collectionWikiContent": "", | |
| "collectionId": "336ed192d0ce4c11e42f28cddba6b41e", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "advisory", | |
| "campaign", | |
| "incident", | |
| "trojan" | |
| ], | |
| "tlp": "", | |
| "created": "2018-02-26T13:47:44.903Z", | |
| "modified": "2018-09-21T10:28:04.257Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--dc96e8bd-ff75-73ef-b87d-43d7584c1fbc", | |
| "collectionTitle": "Fear The Reaper - North Korean Group APT37", | |
| "collectionWikiContent": "", | |
| "collectionId": "dc96e8bdff7573efb87d43d7584c1fbc", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "threat-group", | |
| "malware", | |
| "xftas", | |
| "spearphishing" | |
| ], | |
| "tlp": "", | |
| "created": "2018-02-22T16:56:00.281Z", | |
| "modified": "2018-09-21T10:28:04.257Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--da4453df-09ef-34fa-1f11-b79674f26966", | |
| "collectionTitle": "IBM X-Force IRIS Uncovers Active Business Email Compromise Campaign Targeting Fortune 500 Companies", | |
| "collectionWikiContent": "", | |
| "collectionId": "da4453df09ef34fa1f11b79674f26966", | |
| "owner": "", | |
| "tags": [ | |
| "incident", | |
| "phishing", | |
| "secintel", | |
| "xftas", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2018-02-22T02:58:48.736Z", | |
| "modified": "2018-09-21T10:28:04.257Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--15aa3da1-4c5f-4105-52e7-6721cf840da9", | |
| "collectionTitle": "CouchDB Vulnerabilities Exploited to Install Monero Miners", | |
| "collectionWikiContent": "", | |
| "collectionId": "15aa3da14c5f410552e76721cf840da9", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "vulnerability", | |
| "malware", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2018-02-19T14:58:30.490Z", | |
| "modified": "2018-09-21T10:28:04.257Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--270adc8e-125e-5d69-645c-5095d044a674", | |
| "collectionTitle": "Ukrainian Bitcoin Phishing Ring - COINHOARDER", | |
| "collectionWikiContent": "", | |
| "collectionId": "270adc8e125e5d69645c5095d044a674", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "xftas", | |
| "bitcoin", | |
| "incident", | |
| "phishing" | |
| ], | |
| "tlp": "", | |
| "created": "2018-02-16T03:56:32.861Z", | |
| "modified": "2018-09-21T10:28:04.257Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--93e42182-e9eb-8974-9571-7365152450d0", | |
| "collectionTitle": "Lazarus Group Returns With New Targets", | |
| "collectionWikiContent": "", | |
| "collectionId": "93e42182e9eb897495717365152450d0", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "xftas", | |
| "campaign", | |
| "phishing", | |
| "incident" | |
| ], | |
| "tlp": "", | |
| "created": "2018-02-15T13:31:52.748Z", | |
| "modified": "2018-09-21T10:28:04.257Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--02ef8edc-4878-415c-6e6e-2fb7d760c391", | |
| "collectionTitle": "Olympic Destroyer", | |
| "collectionWikiContent": "", | |
| "collectionId": "02ef8edc4878415c6e6e2fb7d760c391", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "threat-actor", | |
| "advisory", | |
| "campaign", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-02-12T20:05:01.051Z", | |
| "modified": "2018-09-21T10:28:04.258Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--643391dc-0da3-ebd1-68f4-9904ddd02c0d", | |
| "collectionTitle": "LuminosityLink Apparently Dead", | |
| "collectionWikiContent": "", | |
| "collectionId": "643391dc0da3ebd168f49904ddd02c0d", | |
| "owner": "", | |
| "tags": [ | |
| "rat", | |
| "advisory", | |
| "incident", | |
| "xftas", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-02-12T05:30:55.350Z", | |
| "modified": "2018-09-21T10:28:04.258Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--332b945b-fc32-1da1-5c1a-be1f932a2321", | |
| "collectionTitle": "Gold Dragon - Attacks Against the Organizations Involved in the Pyeongchang Olympics", | |
| "collectionWikiContent": "", | |
| "collectionId": "332b945bfc321da15c1abe1f932a2321", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "phishing", | |
| "advisory", | |
| "campaign", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-02-09T14:28:38.199Z", | |
| "modified": "2018-09-21T10:28:04.258Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--cfe72560-6019-bea8-8feb-05e78faa6e88", | |
| "collectionTitle": "Middle East Under Attack By TopHat Campaign", | |
| "collectionWikiContent": "", | |
| "collectionId": "cfe725606019bea88feb05e78faa6e88", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "advisory", | |
| "incident", | |
| "malware", | |
| "campaign" | |
| ], | |
| "tlp": "", | |
| "created": "2018-02-08T01:24:09.834Z", | |
| "modified": "2018-09-21T10:28:04.258Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--12749a9d-bc20-e2f4-0b3a-e99c43416d8c", | |
| "collectionTitle": "East Asia Organizations Victims of Comnie Attack", | |
| "collectionWikiContent": "", | |
| "collectionId": "12749a9dbc20e2f40b3ae99c43416d8c", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "campaign", | |
| "malware", | |
| "xftas", | |
| "incident" | |
| ], | |
| "tlp": "", | |
| "created": "2018-02-05T00:19:35.131Z", | |
| "modified": "2018-09-21T10:28:04.258Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--ccc17ac0-62d8-fc1c-f50f-cd0079b005e5", | |
| "collectionTitle": "Ukraine Targeted by VERMIN and Quasar RAT", | |
| "collectionWikiContent": "", | |
| "collectionId": "ccc17ac062d8fc1cf50fcd0079b005e5", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "incident", | |
| "advisory", | |
| "campaign", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-02-04T23:47:14.260Z", | |
| "modified": "2018-09-21T10:28:04.258Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--3d7e9934-dd1f-b402-d1b1-7da0e69a6642", | |
| "collectionTitle": "Malvertising Campaign Delivers Cryptocurrency Miners", | |
| "collectionWikiContent": "", | |
| "collectionId": "3d7e9934dd1fb402d1b17da0e69a6642", | |
| "owner": "", | |
| "tags": [ | |
| "malvertising", | |
| "incident", | |
| "cryptocurrency", | |
| "advisory", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2018-01-29T02:40:57.770Z", | |
| "modified": "2018-09-21T10:28:04.258Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--ed114a1a-2664-7a17-f1c1-6982776f8da5", | |
| "collectionTitle": "Dark Caracal - Espionage Campaign Discovered", | |
| "collectionWikiContent": "", | |
| "collectionId": "ed114a1a26647a17f1c16982776f8da5", | |
| "owner": "", | |
| "tags": [ | |
| "campaign", | |
| "xftas", | |
| "advisory", | |
| "incident", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-01-23T15:41:54.044Z", | |
| "modified": "2018-09-21T10:28:04.258Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--35e470b8-d874-58eb-f417-2455e28f828f", | |
| "collectionTitle": "X-Force 2017 Data Breach Review", | |
| "collectionWikiContent": "", | |
| "collectionId": "35e470b8d87458ebf4172455e28f828f", | |
| "owner": "", | |
| "tags": [ | |
| "x-force", | |
| "cryptocurrency", | |
| "incident", | |
| "breach", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2018-01-18T17:23:16.197Z", | |
| "modified": "2018-09-21T10:28:04.258Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--56f67178-bb9f-6b85-cc0d-b3c323243c8d", | |
| "collectionTitle": "Group 123's 2016 to 2018 Campaigns Against South Korea", | |
| "collectionWikiContent": "", | |
| "collectionId": "56f67178bb9f6b85cc0db3c323243c8d", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "incident", | |
| "spearphish", | |
| "threat-actor", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2018-01-18T15:47:59.430Z", | |
| "modified": "2018-09-21T10:28:04.258Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--ee0e5cd8-5fb6-1e48-555f-cdd445aa68eb", | |
| "collectionTitle": "Smoke Loader Malware Disguised As Spectre / Meltdown Patch", | |
| "collectionWikiContent": "", | |
| "collectionId": "ee0e5cd85fb61e48555fcdd445aa68eb", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "incident", | |
| "xftas", | |
| "phishing", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2018-01-16T17:08:06.839Z", | |
| "modified": "2018-09-21T10:28:04.258Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--c422fb7c-4f08-a679-812c-f1190db15441", | |
| "collectionTitle": "Central Processor Unit (CPU) Architectural Design Flaws", | |
| "collectionWikiContent": "", | |
| "collectionId": "c422fb7c4f08a679812cf1190db15441", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "vulnerability", | |
| "advisory", | |
| "privilege-escalation" | |
| ], | |
| "tlp": "", | |
| "created": "2018-01-16T14:26:04.791Z", | |
| "modified": "2018-09-21T10:28:04.258Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--69d72341-95f0-6858-e5e6-a6dfddb45755", | |
| "collectionTitle": "Cryptominer RubyMiner Targets Web Servers", | |
| "collectionWikiContent": "", | |
| "collectionId": "69d7234195f06858e5e6a6dfddb45755", | |
| "owner": "", | |
| "tags": [ | |
| "cryptocurrency", | |
| "xftas", | |
| "incident", | |
| "monero", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2018-01-16T14:02:22.349Z", | |
| "modified": "2018-09-21T10:28:04.258Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--ae7bce61-b366-6346-a963-3b6973793ee8", | |
| "collectionTitle": "Pyeongchang Olympics Target of Spear-Phishing Campaign", | |
| "collectionWikiContent": "", | |
| "collectionId": "ae7bce61b3666346a9633b6973793ee8", | |
| "owner": "", | |
| "tags": [ | |
| "incident", | |
| "advisory", | |
| "xftas", | |
| "campaign", | |
| "spear-phishing" | |
| ], | |
| "tlp": "", | |
| "created": "2018-01-12T14:20:09.035Z", | |
| "modified": "2018-09-21T10:28:04.258Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--747810a1-5f5b-565e-eda9-05c5c35a99c9", | |
| "collectionTitle": "Malicious Crypto Mining Software On Morfix", | |
| "collectionWikiContent": "", | |
| "collectionId": "747810a15f5b565eeda905c5c35a99c9", | |
| "owner": "", | |
| "tags": [ | |
| "cryptocurrency", | |
| "x-force", | |
| "xftas", | |
| "advisory", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2017-12-29T14:01:30.241Z", | |
| "modified": "2018-09-21T10:28:04.258Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--6bf3458a-bf56-a10a-4e2b-ae477bf970e0", | |
| "collectionTitle": "Hackers Can Modify Legitimate Apps Using Janus Vulnerability", | |
| "collectionWikiContent": "", | |
| "collectionId": "6bf3458abf56a10a4e2bae477bf970e0", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "advisory", | |
| "xftas", | |
| "vulnerability", | |
| "android" | |
| ], | |
| "tlp": "", | |
| "created": "2017-12-29T04:08:58.588Z", | |
| "modified": "2018-09-21T10:28:04.258Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--15ada2e4-3dd4-494e-2ef0-ccb5337ac5c3", | |
| "collectionTitle": "VenusLocker Switches Tactics From Ransomware to Monero Mining", | |
| "collectionWikiContent": "", | |
| "collectionId": "15ada2e43dd4494e2ef0ccb5337ac5c3", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "xftas", | |
| "phishing", | |
| "coinminer", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2017-12-27T22:35:32.548Z", | |
| "modified": "2018-09-21T10:28:04.258Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--884daf4a-0d2c-674f-4d2e-9714508afde1", | |
| "collectionTitle": "GnatSpy Mobile Malware Family", | |
| "collectionWikiContent": "", | |
| "collectionId": "884daf4a0d2c674f4d2e9714508afde1", | |
| "owner": "", | |
| "tags": [ | |
| "threat-actor", | |
| "malware", | |
| "xftas", | |
| "incident", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2017-12-27T20:55:17.068Z", | |
| "modified": "2018-09-21T10:28:04.258Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--ad4798b9-0161-c166-8f33-21b09a68f533", | |
| "collectionTitle": "TRITON - New ICS Attack Framework", | |
| "collectionWikiContent": "", | |
| "collectionId": "ad4798b90161c1668f3321b09a68f533", | |
| "owner": "", | |
| "tags": [ | |
| "x-force", | |
| "malware", | |
| "threat-research", | |
| "xftas", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2017-12-19T03:08:36.860Z", | |
| "modified": "2018-09-21T10:28:04.258Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--76d21f04-7b57-e9b3-a571-54991f41df49", | |
| "collectionTitle": "CVE-2017-11882 Exploited in the Wild in the Middle East", | |
| "collectionWikiContent": "", | |
| "collectionId": "76d21f047b57e9b3a57154991f41df49", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "advisory", | |
| "vulnerability", | |
| "incident", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2017-12-11T04:41:34.090Z", | |
| "modified": "2018-09-21T10:28:04.259Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--e989f4e6-dc57-bbcc-12d6-d88d7b9ff386", | |
| "collectionTitle": "Recam Redux Spread Via Malicious Word Document", | |
| "collectionWikiContent": "", | |
| "collectionId": "e989f4e6dc57bbcc12d6d88d7b9ff386", | |
| "owner": "", | |
| "tags": [ | |
| "keylogger", | |
| "malware", | |
| "xftas", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2017-12-07T21:05:00.141Z", | |
| "modified": "2018-09-21T10:28:04.259Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--16ab81a6-7ff9-34a2-ad7f-9a66942cb9dc", | |
| "collectionTitle": "XFTAS-VU-2017 Critical Intel Vulnerabilities (INTEL-SA-00086)", | |
| "collectionWikiContent": "", | |
| "collectionId": "16ab81a67ff934a2ad7f9a66942cb9dc", | |
| "owner": "", | |
| "tags": [ | |
| "x-force", | |
| "advisory", | |
| "xftas", | |
| "vulnerability" | |
| ], | |
| "tlp": "", | |
| "created": "2017-12-07T15:56:11.226Z", | |
| "modified": "2018-09-21T10:28:04.259Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--97d2ebca-5828-64f2-8929-79439bbc1bcf", | |
| "collectionTitle": "Global Disruption of Gamarue", | |
| "collectionWikiContent": "", | |
| "collectionId": "97d2ebca582864f2892979439bbc1bcf", | |
| "owner": "", | |
| "tags": [ | |
| "incident", | |
| "malware", | |
| "botnet", | |
| "advisory", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2017-12-06T04:24:01.324Z", | |
| "modified": "2018-09-21T10:28:04.259Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--d49e53a7-a512-efed-0841-17f0543fb5c2", | |
| "collectionTitle": "XFTAS-MA-2017-00002 - Reaper IoT Botnet (IoT_Reaper aka IoTroop)", | |
| "collectionWikiContent": "", | |
| "collectionId": "d49e53a7a512efed084117f0543fb5c2", | |
| "owner": "", | |
| "tags": [ | |
| "x-force", | |
| "malware", | |
| "advisory", | |
| "botnet", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2017-12-04T23:04:16.799Z", | |
| "modified": "2018-09-21T10:28:04.259Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--39f92874-2993-9b39-f5d7-50cd20f039e9", | |
| "collectionTitle": "URSNIF Spam Mail Malicious Macro Evasion Tactics", | |
| "collectionWikiContent": "", | |
| "collectionId": "39f9287429939b39f5d750cd20f039e9", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "malware", | |
| "x-force", | |
| "campaign", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2017-11-30T17:07:22.611Z", | |
| "modified": "2018-09-21T10:28:04.259Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--d0603932-7a92-11cd-9143-8c8e46d8b453", | |
| "collectionTitle": "UBoatRAT Targeting Companies in East Asia", | |
| "collectionWikiContent": "", | |
| "collectionId": "d06039327a9211cd91438c8e46d8b453", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "threat-actor", | |
| "advisory", | |
| "malware", | |
| "campaign" | |
| ], | |
| "tlp": "", | |
| "created": "2017-11-30T13:06:23.485Z", | |
| "modified": "2018-09-21T10:28:04.259Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--3dc718a1-adfb-d938-8ecc-b0da2c40369e", | |
| "collectionTitle": "New Variant of ROKRAT Discovered", | |
| "collectionWikiContent": "", | |
| "collectionId": "3dc718a1adfbd9388eccb0da2c40369e", | |
| "owner": "", | |
| "tags": [ | |
| "campaign", | |
| "advisory", | |
| "threat-actor", | |
| "xftas", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2017-11-29T19:11:49.590Z", | |
| "modified": "2018-09-21T10:28:04.259Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--21724521-4fcb-da7f-1c01-e51c17c09c81", | |
| "collectionTitle": "Apple macOS High Sierra Root Login Bypass", | |
| "collectionWikiContent": "", | |
| "collectionId": "217245214fcbda7f1c01e51c17c09c81", | |
| "owner": "", | |
| "tags": [ | |
| "vulnerability", | |
| "advisory", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2017-11-29T18:35:09.268Z", | |
| "modified": "2018-09-21T10:28:04.259Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--4e4993a5-a4b6-f9dd-c544-7bfb1c4cb467", | |
| "collectionTitle": "New Mirai Variant Scanning Ports 23 and 2323", | |
| "collectionWikiContent": "", | |
| "collectionId": "4e4993a5a4b6f9ddc5447bfb1c4cb467", | |
| "owner": "", | |
| "tags": [ | |
| "campaign", | |
| "botnet", | |
| "xftas", | |
| "advisory", | |
| "incident" | |
| ], | |
| "tlp": "", | |
| "created": "2017-11-28T05:30:51.296Z", | |
| "modified": "2018-09-21T10:28:04.260Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--315ac3bb-80e5-c762-3ed8-3801c9b1a004", | |
| "collectionTitle": "Virtual Coin Miners Using Steganography", | |
| "collectionWikiContent": "", | |
| "collectionId": "315ac3bb80e5c7623ed83801c9b1a004", | |
| "owner": "", | |
| "tags": [ | |
| "incident", | |
| "advisory", | |
| "xftas", | |
| "x-force", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2017-11-14T14:58:49.836Z", | |
| "modified": "2018-09-21T10:28:04.260Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--92f1aa27-b69d-ba51-b83b-20ced2aa3abf", | |
| "collectionTitle": "XFTAS-MA-2017-00003 - Ordinypt Ransomware Wipes Disk Instead", | |
| "collectionWikiContent": "", | |
| "collectionId": "92f1aa27b69dba51b83b20ced2aa3abf", | |
| "owner": "", | |
| "tags": [ | |
| "wipeware", | |
| "malware", | |
| "x-force", | |
| "xftas", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2017-11-13T04:07:19.837Z", | |
| "modified": "2018-09-21T10:28:04.260Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--3380d390-00d3-12e1-cd46-2d9ee7accb4f", | |
| "collectionTitle": "WikiLeaks Vault 8 Leak", | |
| "collectionWikiContent": "", | |
| "collectionId": "3380d39000d312e1cd462d9ee7accb4f", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "x-force", | |
| "threat-research", | |
| "xftas", | |
| "exploit-kit" | |
| ], | |
| "tlp": "", | |
| "created": "2017-11-10T20:51:36.573Z", | |
| "modified": "2018-09-21T10:28:04.260Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--5a5f6ff2-1f98-0a3d-3dee-9cbcbba02a30", | |
| "collectionTitle": "WikiLeaks Vault 7 Leak", | |
| "collectionWikiContent": "", | |
| "collectionId": "5a5f6ff21f980a3d3dee9cbcbba02a30", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "threat-research", | |
| "xftas", | |
| "x-force" | |
| ], | |
| "tlp": "", | |
| "created": "2017-11-10T18:36:57.400Z", | |
| "modified": "2018-09-21T10:28:04.260Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--93a8ab7c-5f5f-7d17-3b63-7d6a295772eb", | |
| "collectionTitle": "XFTAS-SI-2017-00003 - RedBaldKnight (Bronze Butler) Steganography Utilization", | |
| "collectionWikiContent": "", | |
| "collectionId": "93a8ab7c5f5f7d173b637d6a295772eb", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "incident", | |
| "x-force", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2017-11-10T13:51:39.122Z", | |
| "modified": "2018-09-21T10:28:04.260Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--42553a29-d877-dc31-8cec-cb7efd13711e", | |
| "collectionTitle": "XFTAS-SI-2017-00002 - Gaza Cybergang 2017 Activity", | |
| "collectionWikiContent": "", | |
| "collectionId": "42553a29d877dc318ceccb7efd13711e", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "incident", | |
| "x-force" | |
| ], | |
| "tlp": "", | |
| "created": "2017-10-31T17:44:18.549Z", | |
| "modified": "2018-09-21T10:28:04.260Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--51367349-265e-a41c-75bc-90ebb4c7cf45", | |
| "collectionTitle": "XFTAS-MA-2017-00001 - Sage 2.2 Ransomware Variant", | |
| "collectionWikiContent": "", | |
| "collectionId": "51367349265ea41c75bc90ebb4c7cf45", | |
| "owner": "", | |
| "tags": [ | |
| "ransomware", | |
| "x-force", | |
| "malware", | |
| "xftas", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2017-10-30T20:13:33.013Z", | |
| "modified": "2018-09-21T10:28:04.260Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--eb5a5e66-8622-c301-0b7f-fce1575a9553", | |
| "collectionTitle": "Coin Miner Mobile Malware", | |
| "collectionWikiContent": "", | |
| "collectionId": "eb5a5e668622c3010b7ffce1575a9553", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "malware", | |
| "vulnerability", | |
| "x-force", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2017-10-30T17:47:29.698Z", | |
| "modified": "2018-09-21T10:28:04.260Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--51701e9c-25aa-af7e-02b1-9fa6d63ccc80", | |
| "collectionTitle": "XFTAS-SI-2017-00001 - Bad Rabbit", | |
| "collectionWikiContent": "", | |
| "collectionId": "51701e9c25aaaf7e02b19fa6d63ccc80", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "advisory", | |
| "x-force", | |
| "incident", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2017-10-30T03:21:13.114Z", | |
| "modified": "2018-09-21T10:28:04.260Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--396ecb68-8062-5d6e-58dd-7636b7c8e8fd", | |
| "collectionTitle": "WiFi KRACK - Key Reinstallation AttaCKs", | |
| "collectionWikiContent": "", | |
| "collectionId": "396ecb6880625d6e58dd7636b7c8e8fd", | |
| "owner": "", | |
| "tags": [ | |
| "wpa2", | |
| "x-force", | |
| "advisory", | |
| "vulnerability", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2017-10-19T13:54:20.796Z", | |
| "modified": "2018-09-21T10:28:04.260Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--59608f35-312a-6585-3c4b-9913dc7fe8f5", | |
| "collectionTitle": "Taiwan Far Eastern International Bank (FEIB) Heist - Lazarus Tools and Ransomware", | |
| "collectionWikiContent": "", | |
| "collectionId": "59608f35312a65853c4b9913dc7fe8f5", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "incident", | |
| "xftas", | |
| "x-force", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2017-10-18T19:10:51.268Z", | |
| "modified": "2018-09-21T10:28:04.260Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--9ffcf4ce-159e-932c-fe59-7695c1f44fe8", | |
| "collectionTitle": "BlackOasis APT - Adobe Flash Player Exploited in the Wild", | |
| "collectionWikiContent": "", | |
| "collectionId": "9ffcf4ce159e932cfe597695c1f44fe8", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "vulnerability", | |
| "x-force", | |
| "xftas", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2017-10-16T23:52:22.779Z", | |
| "modified": "2018-09-21T10:28:04.260Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--6b109043-e6df-d31a-aa69-b65f02b33c13", | |
| "collectionTitle": "Service of Ukraine Warns of Possible Large-scale Cyber-Attack", | |
| "collectionWikiContent": "", | |
| "collectionId": "6b109043e6dfd31aaa69b65f02b33c13", | |
| "owner": "", | |
| "tags": [ | |
| "incident", | |
| "advisory", | |
| "campaign", | |
| "xftas", | |
| "threat-actor" | |
| ], | |
| "tlp": "", | |
| "created": "2017-10-13T17:32:22.639Z", | |
| "modified": "2018-09-21T10:28:04.260Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--9a8a1668-1cb2-94d4-a020-186001e798de", | |
| "collectionTitle": "Botnet Based LFI Attack", | |
| "collectionWikiContent": "", | |
| "collectionId": "9a8a16681cb294d4a020186001e798de", | |
| "owner": "", | |
| "tags": [ | |
| "threat-research", | |
| "x-force", | |
| "botnet", | |
| "advisory", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2017-10-12T20:36:18.680Z", | |
| "modified": "2018-09-21T10:28:04.260Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--7fec242c-222a-d83d-72ce-2ccfb3b6a322", | |
| "collectionTitle": "Malvertising Campaign Uses RIG EK to Drop Quant Loader to Download FormBook", | |
| "collectionWikiContent": "", | |
| "collectionId": "7fec242c222ad83d72ce2ccfb3b6a322", | |
| "owner": "", | |
| "tags": [ | |
| "malware", | |
| "xftas", | |
| "advisory", | |
| "x-force", | |
| "malvertising" | |
| ], | |
| "tlp": "", | |
| "created": "2017-10-12T18:30:18.213Z", | |
| "modified": "2018-09-21T10:28:04.260Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--416f5f08-b86a-df90-c71f-44457548b155", | |
| "collectionTitle": "Phishing Campaign - Phish for the Future", | |
| "collectionWikiContent": "", | |
| "collectionId": "416f5f08b86adf90c71f44457548b155", | |
| "owner": "", | |
| "tags": [ | |
| "phishing", | |
| "x-force", | |
| "xftas", | |
| "campaign", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2017-09-29T12:52:10.128Z", | |
| "modified": "2018-09-21T10:28:04.260Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--86c04322-5f16-a9b3-d86a-82dcb9cbce24", | |
| "collectionTitle": "Locky / FakeGlobe SPAM Campaign", | |
| "collectionWikiContent": "", | |
| "collectionId": "86c043225f16a9b3d86a82dcb9cbce24", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "spam", | |
| "campaign", | |
| "xftas", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2017-09-19T19:13:24.898Z", | |
| "modified": "2018-09-21T10:28:04.260Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--8884515e-be72-5abb-8637-d2cb1dbd6d28", | |
| "collectionTitle": "Aggressive Distributed Reconnaissance For D-Link Products", | |
| "collectionWikiContent": "", | |
| "collectionId": "8884515ebe725abb8637d2cb1dbd6d28", | |
| "owner": "", | |
| "tags": [ | |
| "vulnerability", | |
| "xftas", | |
| "threat-research", | |
| "campaign", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2017-09-01T18:46:40.952Z", | |
| "modified": "2018-09-21T10:28:04.261Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--f11f8600-52a1-2391-efb4-42722d9f7e3d", | |
| "collectionTitle": "Perl Shellbot Command Injection Attack", | |
| "collectionWikiContent": "", | |
| "collectionId": "f11f860052a12391efb442722d9f7e3d", | |
| "owner": "", | |
| "tags": [ | |
| "botnet", | |
| "malware", | |
| "advisory", | |
| "threat-research", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2017-08-01T19:56:32.555Z", | |
| "modified": "2018-09-21T10:28:04.261Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--23c3278e-5ee2-9bc5-a439-636d34321357", | |
| "collectionTitle": "JAFF - Ransomware", | |
| "collectionWikiContent": "", | |
| "collectionId": "23c3278e5ee29bc5a439636d34321357", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "ransomware", | |
| "xftas", | |
| "x-force" | |
| ], | |
| "tlp": "", | |
| "created": "2017-06-14T17:17:00.680Z", | |
| "modified": "2018-09-21T10:28:04.262Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--b8ef8c44-b3cd-a24d-258d-0770ae5fcc2e", | |
| "collectionTitle": "Shadow Brokers Dump", | |
| "collectionWikiContent": "", | |
| "collectionId": "b8ef8c44b3cda24d258d0770ae5fcc2e", | |
| "owner": "", | |
| "tags": [ | |
| "exploit-kit", | |
| "x-force", | |
| "advisory", | |
| "xftas", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2017-06-13T17:34:10.637Z", | |
| "modified": "2018-09-21T10:28:04.262Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--b19e0450-8fca-2f2c-6fe6-70f5f24517d9", | |
| "collectionTitle": "Opicarus2017 - Anonymous Attack against Finance Targets", | |
| "collectionWikiContent": "", | |
| "collectionId": "b19e04508fca2f2c6fe670f5f24517d9", | |
| "owner": "", | |
| "tags": [ | |
| "general", | |
| "xftas", | |
| "threat-actor", | |
| "x-force", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2017-06-12T15:59:28.508Z", | |
| "modified": "2018-09-21T10:28:04.262Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--761b1c0d-e442-9b81-5f22-06e5ceafcfed", | |
| "collectionTitle": "Fireball Attack Campaign", | |
| "collectionWikiContent": "", | |
| "collectionId": "761b1c0de4429b815f2206e5ceafcfed", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "campaign", | |
| "malware", | |
| "advisory", | |
| "incident" | |
| ], | |
| "tlp": "", | |
| "created": "2017-06-07T11:23:24.254Z", | |
| "modified": "2018-09-21T10:28:04.262Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--1b9b3b35-a218-1dff-d303-2eceb87176a3", | |
| "collectionTitle": "Eternalrocks Worm a.k.a. MicroBotMassiveNet", | |
| "collectionWikiContent": "", | |
| "collectionId": "1b9b3b35a2181dffd3032eceb87176a3", | |
| "owner": "", | |
| "tags": [ | |
| "x-force", | |
| "xftas", | |
| "malware", | |
| "botnet", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2017-05-23T13:57:17.434Z", | |
| "modified": "2018-09-21T10:28:04.263Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--7e8131a2-83d5-0a0f-13d4-3ae5f1d0058b", | |
| "collectionTitle": "Mirai Botnet Loader Campaign", | |
| "collectionWikiContent": "", | |
| "collectionId": "7e8131a283d50a0f13d43ae5f1d0058b", | |
| "owner": "", | |
| "tags": [ | |
| "botnet", | |
| "advisory", | |
| "threat-research", | |
| "malware", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2017-04-04T13:59:00.562Z", | |
| "modified": "2018-09-21T10:28:04.263Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--adc572fb-5f58-7f21-5969-8fc38a26a2ca", | |
| "collectionTitle": "Apache Struts 2 Attack Campaign", | |
| "collectionWikiContent": "", | |
| "collectionId": "adc572fb5f587f2159698fc38a26a2ca", | |
| "owner": "", | |
| "tags": [ | |
| "vulnerability", | |
| "xftas", | |
| "advisory", | |
| "campaign", | |
| "threat-research" | |
| ], | |
| "tlp": "", | |
| "created": "2017-04-03T17:20:01.230Z", | |
| "modified": "2018-09-21T10:28:04.263Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--804a1116-b60a-eec0-2497-e8fb0f1896b9", | |
| "collectionTitle": "TP-Link C2 and C20i vulnerable to command injection", | |
| "collectionWikiContent": "", | |
| "collectionId": "804a1116b60aeec02497e8fb0f1896b9", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "mss", | |
| "x-force", | |
| "vulnerability", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2017-03-22T16:05:18.299Z", | |
| "modified": "2018-09-21T10:28:04.264Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--4377aaa7-58b2-7a6c-4561-81fa6e16dc91", | |
| "collectionTitle": "Nexus 9 FIQ debugger privilege escalation", | |
| "collectionWikiContent": "", | |
| "collectionId": "4377aaa758b27a6c456181fa6e16dc91", | |
| "owner": "", | |
| "tags": [ | |
| "vulnerability", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2017-03-14T07:41:25.574Z", | |
| "modified": "2018-09-21T10:28:04.264Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--26fdea1e-8cc6-9f52-a551-e8d451f80aa1", | |
| "collectionTitle": "Dridex v4 - Major version upgrade released", | |
| "collectionWikiContent": "", | |
| "collectionId": "26fdea1e8cc69f52a551e8d451f80aa1", | |
| "owner": "", | |
| "tags": [ | |
| "dridex", | |
| "advisory", | |
| "malware", | |
| "trojan", | |
| "x-force" | |
| ], | |
| "tlp": "", | |
| "created": "2017-02-28T14:29:59.603Z", | |
| "modified": "2018-09-21T10:28:04.264Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--eeed4eed-e51b-9a45-87f4-c7c816ad6e4e", | |
| "collectionTitle": "Spear Phishing Attacks Preceding Shamoon Malware Breakouts", | |
| "collectionWikiContent": "", | |
| "collectionId": "eeed4eede51b9a4587f4c7c816ad6e4e", | |
| "owner": "", | |
| "tags": [ | |
| "shamoon", | |
| "threat-actor", | |
| "pupyrat", | |
| "advisory", | |
| "x-force" | |
| ], | |
| "tlp": "", | |
| "created": "2017-02-19T08:22:30.596Z", | |
| "modified": "2018-09-21T10:28:04.264Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--1058ce3a-e3ca-0e01-a967-d19d92b8c116", | |
| "collectionTitle": "Aggressive SQL Injection Attack", | |
| "collectionWikiContent": "", | |
| "collectionId": "1058ce3ae3ca0e01a967d19d92b8c116", | |
| "owner": "", | |
| "tags": [ | |
| "x-force", | |
| "threat-research", | |
| "incident", | |
| "advisory", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2017-01-31T13:45:39.970Z", | |
| "modified": "2018-09-21T10:28:04.264Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--342551c6-7e22-ea04-1f8f-bbc630358f19", | |
| "collectionTitle": "Aggressive SQL Injection Activity", | |
| "collectionWikiContent": "", | |
| "collectionId": "342551c67e22ea041f8fbbc630358f19", | |
| "owner": "", | |
| "tags": [ | |
| "xftas", | |
| "incident", | |
| "x-force", | |
| "threat-research", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2017-01-24T14:46:13.446Z", | |
| "modified": "2018-09-21T10:28:04.264Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--38e7db09-736c-1419-8da2-3163cb9aa112", | |
| "collectionTitle": "OnePlus 3 'fastboot oem selinux permissive' Vulnerability", | |
| "collectionWikiContent": "", | |
| "collectionId": "38e7db09736c14198da23163cb9aa112", | |
| "owner": "", | |
| "tags": [ | |
| "vulnerability", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2017-01-11T17:41:06.024Z", | |
| "modified": "2018-09-21T10:28:04.264Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--5985d264-56a3-1dd4-d21a-7d6ee065bb1b", | |
| "collectionTitle": "Attacking Nexus 6 & 6P Custom Bootmodes", | |
| "collectionWikiContent": "", | |
| "collectionId": "5985d26456a31dd4d21a7d6ee065bb1b", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "vulnerability" | |
| ], | |
| "tlp": "", | |
| "created": "2017-01-05T17:52:09.282Z", | |
| "modified": "2018-09-21T10:28:04.264Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--683df654-2291-c913-6388-d73f7038c5e5", | |
| "collectionTitle": "Google Android Synaptics Touchscreen Heap Overflows", | |
| "collectionWikiContent": "", | |
| "collectionId": "683df6542291c9136388d73f7038c5e5", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "vulnerability" | |
| ], | |
| "tlp": "", | |
| "created": "2016-12-13T20:50:02.792Z", | |
| "modified": "2018-09-21T10:28:04.264Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--75bc0d26-351c-35b3-75b2-42f848cab507", | |
| "collectionTitle": "GozNym Malware", | |
| "collectionWikiContent": "", | |
| "collectionId": "75bc0d26351c35b375b242f848cab507", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "goznym", | |
| "malware", | |
| "cybercrime", | |
| "x-force" | |
| ], | |
| "tlp": "", | |
| "created": "2016-11-30T08:56:55.183Z", | |
| "modified": "2018-09-21T10:28:04.264Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--e7d49a8b-5beb-9eb1-fa09-080aa4c43aa7", | |
| "collectionTitle": "2016 Shellshock Campaign #2", | |
| "collectionWikiContent": "", | |
| "collectionId": "e7d49a8b5beb9eb1fa09080aa4c43aa7", | |
| "owner": "", | |
| "tags": [ | |
| "campaign", | |
| "vulnerability", | |
| "advisory", | |
| "x-force", | |
| "xftas" | |
| ], | |
| "tlp": "", | |
| "created": "2016-10-13T13:17:44.222Z", | |
| "modified": "2018-09-21T10:28:04.265Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--c123bbfb-8ef3-c70a-0cd4-c0172d54b0d0", | |
| "collectionTitle": "Google Nexus 6 f_usbnet Kernel Uninitialized Memory Leak Over USB", | |
| "collectionWikiContent": "", | |
| "collectionId": "c123bbfb8ef3c70a0cd4c0172d54b0d0", | |
| "owner": "", | |
| "tags": [ | |
| "vulnerability", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2016-10-05T16:08:09.346Z", | |
| "modified": "2018-09-21T10:28:04.265Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--5db34a05-73b5-0b8d-cc13-0d3bc951b160", | |
| "collectionTitle": "Google Android NVIDIA kernel privilege escalation", | |
| "collectionWikiContent": "", | |
| "collectionId": "5db34a0573b50b8dcc130d3bc951b160", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "vulnerability" | |
| ], | |
| "tlp": "", | |
| "created": "2016-09-20T09:14:34.747Z", | |
| "modified": "2018-09-21T10:28:04.265Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--33431022-7a10-65ee-7585-b37e4d3be0a3", | |
| "collectionTitle": "Google Nexus 5X Bootloader Unauthorized Memory Dumping via USB", | |
| "collectionWikiContent": "", | |
| "collectionId": "334310227a1065ee7585b37e4d3be0a3", | |
| "owner": "", | |
| "tags": [ | |
| "vulnerability", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2016-09-01T14:46:55.255Z", | |
| "modified": "2018-09-21T10:28:04.265Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--aabb53f5-6644-710a-bdb1-47d9a0adb57b", | |
| "collectionTitle": "Remote Code Execution in Xiaomi MIUI Analytics", | |
| "collectionWikiContent": "", | |
| "collectionId": "aabb53f56644710abdb147d9a0adb57b", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "x-force", | |
| "general" | |
| ], | |
| "tlp": "", | |
| "created": "2016-08-28T12:57:10.817Z", | |
| "modified": "2018-09-21T10:28:04.265Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--d3fc8d88-8c06-95eb-54c1-e439d8af37ca", | |
| "collectionTitle": "ASLR info disclosure vulnerability in ActiveX controls", | |
| "collectionWikiContent": "", | |
| "collectionId": "d3fc8d888c0695eb54c1e439d8af37ca", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "vulnerability" | |
| ], | |
| "tlp": "", | |
| "created": "2016-08-24T13:40:01.647Z", | |
| "modified": "2018-09-21T10:28:04.265Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--b1fcf13c-63ee-e11c-b351-d24cd0e65314", | |
| "collectionTitle": "Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow vulnerability", | |
| "collectionWikiContent": "", | |
| "collectionId": "b1fcf13c63eee11cb351d24cd0e65314", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "vulnerability" | |
| ], | |
| "tlp": "", | |
| "created": "2016-08-24T13:39:15.490Z", | |
| "modified": "2018-09-21T10:28:04.265Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--84353152-69d1-8c2e-4bbd-e2967ebcd69e", | |
| "collectionTitle": "GNU glibc getaddrinfo Buffer Overflow CVE-2015-7547", | |
| "collectionWikiContent": "", | |
| "collectionId": "8435315269d18c2e4bbde2967ebcd69e", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "vulnerability" | |
| ], | |
| "tlp": "", | |
| "created": "2016-08-24T13:38:34.971Z", | |
| "modified": "2018-09-21T10:28:04.265Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--736a7f02-705b-d908-6726-2493dca2a2b7", | |
| "collectionTitle": "Microsoft Windows WinRT PDF Renderer Library PostScript Interpreter Remote Code Execution Vulnerability", | |
| "collectionWikiContent": "", | |
| "collectionId": "736a7f02705bd90867262493dca2a2b7", | |
| "owner": "", | |
| "tags": [ | |
| "advisory", | |
| "vulnerability" | |
| ], | |
| "tlp": "", | |
| "created": "2016-08-24T13:37:20.789Z", | |
| "modified": "2018-09-21T10:28:04.265Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--b8964d4d-8617-8fde-4a13-615498b8dc09", | |
| "collectionTitle": "ImageTragick Vulnerability", | |
| "collectionWikiContent": "", | |
| "collectionId": "b8964d4d86178fde4a13615498b8dc09", | |
| "owner": "", | |
| "tags": [ | |
| "vulnerability", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2016-08-24T13:19:11.656Z", | |
| "modified": "2018-09-21T10:28:04.265Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--77eebe7b-4eb9-f72e-48c3-09ca03e3d4e9", | |
| "collectionTitle": "Symantec A/V Remote Code Execution Vulnerability (CVE-2016-2208)", | |
| "collectionWikiContent": "", | |
| "collectionId": "77eebe7b4eb9f72e48c309ca03e3d4e9", | |
| "owner": "", | |
| "tags": [ | |
| "x-force", | |
| "advisory", | |
| "vulnerability" | |
| ], | |
| "tlp": "", | |
| "created": "2016-08-24T13:17:42.667Z", | |
| "modified": "2018-09-21T10:28:04.265Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--fc653811-1480-b264-d5c8-2cd078401b24", | |
| "collectionTitle": "Java Object Serialization vulnerability", | |
| "collectionWikiContent": "", | |
| "collectionId": "fc6538111480b264d5c82cd078401b24", | |
| "owner": "", | |
| "tags": [ | |
| "vulnerability", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2016-08-24T13:06:53.740Z", | |
| "modified": "2018-09-21T10:28:04.265Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--f055e638-c2f8-b57e-3c76-c9e7aaacab7e", | |
| "collectionTitle": "Multiple Symantec A/V Vulnerabiities", | |
| "collectionWikiContent": "", | |
| "collectionId": "f055e638c2f8b57e3c76c9e7aaacab7e", | |
| "owner": "", | |
| "tags": [ | |
| "x-force", | |
| "vulnerability", | |
| "advisory" | |
| ], | |
| "tlp": "", | |
| "created": "2016-06-30T22:27:55.481Z", | |
| "modified": "2018-09-21T10:28:04.265Z" | |
| }, | |
| { | |
| "type": "x-xfe-collection", | |
| "id": "x-xfe-collection--eeede463-ee5c-2b57-402f-c86154411e65", | |
| "collectionTitle": "Marcher Android Bot", | |
| "collectionWikiContent": "", | |
| "collectionId": "eeede463ee5c2b57402fc86154411e65", | |
| "owner": "", | |
| "tags": [ | |
| "marcher", | |
| "advisory", | |
| "x-force", | |
| "mobile", | |
| "malware" | |
| ], | |
| "tlp": "", | |
| "created": "2016-06-28T08:17:23.650Z", | |
| "modified": "2018-09-21T10:28:04.265Z" | |
| } | |
| ] |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment