File tree Expand file tree Collapse file tree 1 file changed +19
-0
lines changed Expand file tree Collapse file tree 1 file changed +19
-0
lines changed Original file line number Diff line number Diff line change
1
+ cases :
2
+ - urls :
3
+ - https://www.darkreading.com/threat-intelligence/iranian-apt-targets-us-drokbk-spyware-github
4
+ - https://www.secureworks.com/blog/drokbk-malware-uses-github-as-dead-drop-resolver
5
+ notes : log4j to vmware horizon path, use of github for c2
6
+ - urls :
7
+ - https://www.darkreading.com/cyberattacks-data-breaches/chinese-apt-targets-hong-kong-in-supply-chain-attack
8
+ - https://www.security.com/threat-intelligence/carderbee-software-supply-chain-certificate-abuse
9
+ notes : targeted code signing with hardware program certificate
10
+ - urls :
11
+ - https://www.cloudsek.com/blog/born-group-supply-chain-breach-in-depth-analysis-of-intelbrokers-jenkins-exploitation
12
+ notes : jenkins rce to github pat exfiltration to secret scanning to attack downstream entities
13
+ - urls :
14
+ - https://www.bleepingcomputer.com/news/security/north-korean-hackers-exploit-vpn-update-flaw-to-install-malware/
15
+ - https://asec.ahnlab.com/en/61934/
16
+ notes : vulnerability in update protocols exploited to deliver malware
17
+ - urls :
18
+ - https://www.volexity.com/blog/2024/08/02/stormbamboo-compromises-isp-to-abuse-insecure-software-update-mechanisms/
19
+ notes : dns takeover to exploit update protocols in order to deliver malware
You can’t perform that action at this time.
0 commit comments