forked from aptnotes/data
-
Notifications
You must be signed in to change notification settings - Fork 0
/
APTnotes.json
1 lines (1 loc) · 96.8 KB
/
APTnotes.json
1
[{"SHA-1": "3e6399a4b608bbd99dd81bd2be4cd49731362b5e", "Title": "How China Will Use Cyber Warfare", "Filename": "Fritz_HOW-CHINA-WILL-USE-CYBER-WARFARE(Oct-01-08)", "Source": "Jason Fritz", "Link": "https://app.box.com/s/696xnzy1an3jbm3b212y5n8xieirbemd", "Year": "2008", "Date": "10/1/08"}, {"SHA-1": "2fbd7813367fad45e7fd1922381a05e27b0e9673", "Title": "Russian Cyberwar On Georgia", "Filename": "556_10535_798405_Annex87_CyberAttacks", "Source": "Georgia Gov", "Link": "https://app.box.com/s/ce4fr8p0mxv2pjcvh4pmma1q7oqc4vnc", "Year": "2008", "Date": "11/11/08"}, {"SHA-1": "b0f5f77865f24c5064f78ed7cd30bbdf2c111945", "Title": "Impact Of Alleged Russian Cyber Attack", "Filename": "Ashmore_Impact-of-Alleged-Russian-Cyber-Attacks(Jan-18-09)", "Source": "William C. Ashmore", "Link": "https://app.box.com/s/4q3ws8a3ymx6y4ygsp4k4zm8gx0imsy0", "Year": "2009", "Date": "1/18/09"}, {"SHA-1": "28dd92f598e7d8987d8236767856c70be4f7e85f", "Title": "Tracking Ghostnet: Investigating A Cyber Espionage Network", "Filename": "ghostnet", "Source": "Information Warfare Monitor", "Link": "https://app.box.com/s/8dq0gur02w8oh0z7ljjz5mh8l11cmrhh", "Year": "2009", "Date": "3/29/09"}, {"SHA-1": "510f1b2342f3ca3dd24179821eb451488d6e9722", "Title": "Case Study: Operation Aurora", "Filename": "Case_Study_Operation_Aurora_V11", "Source": "Triumfant", "Link": "https://app.box.com/s/ni4xs2iuol4vskbc25vrxjih2w1ep7p6", "Year": "2010", "Date": "1/1/10"}, {"SHA-1": "9a7a1d3f7719c02dced8633ac0bf43d6e9ec7a1b", "Title": "The Command Structure Of The Aurora Botnet", "Filename": "Aurora_Botnet_Command_Structure", "Source": "Damballa", "Link": "https://app.box.com/s/6jeekvxflthmub9v26nybp5kqw9tjopj", "Year": "2010", "Date": "1/13/10"}, {"SHA-1": "52123660be8b8cad9d46244f669f2cfd96101750", "Title": "Combating Aurora", "Filename": "McAfee_Operation_Aurora", "Source": "McAfee", "Link": "https://app.box.com/s/jhy5k76ox6z8sy6tdjnqqrlz5r2o29h8", "Year": "2010", "Date": "1/20/10"}, {"SHA-1": "3494bd514034f0658ec66b2f515cd9a60c51a8e7", "Title": "Operation Aurora: Detect, Diagnose, Respond", "Filename": "Aurora_HBGARY_DRAFT", "Source": "HBGary", "Link": "https://app.box.com/s/j36zc0da9nz6q8wnv13slwxcnmiaykul", "Year": "2010", "Date": "1/27/10"}, {"SHA-1": "4d9c8ecae38f217729cf8a9df934e7cc5de2ae1a", "Title": "Operation Aurora", "Filename": "HBGary_Operation_Aurora", "Source": "HBGary", "Link": "https://app.box.com/s/fjb89qr1vnk2ox0vllj68ivadqgyz3an", "Year": "2010", "Date": "2/10/10"}, {"SHA-1": "1001e5c45200e0f138e9e9d508afc31c475d6ce7", "Title": "How Can I Tell If I Was Infected By Aurora?", "Filename": "how_can_u_tell_Aurora", "Source": "McAfee", "Link": "https://app.box.com/s/k0qidf9g1yfehi6pbdodmcxdqag5a9bv", "Year": "2010", "Date": "2/24/10"}, {"SHA-1": "6eb3094ecab54a8b80932f4bec263696f849ca77", "Title": "In-Depth Analysis Of Hydraq: The Face Of Cyberwar Enemies Unfolds", "Filename": "in-depth_analysis_of_hydraq_final_231538", "Source": "CA", "Link": "https://app.box.com/s/44e7rbs177n5inhpm9si6gu3lm7fw6bj", "Year": "2010", "Date": "3/14/10"}, {"SHA-1": "8a982bc5c8303440faa4d5672a38bb7a613c382b", "Title": "Shadows In The Cloud: Investigating Cyber Espionage 2.0", "Filename": "Shadowserver_shadows-in-the-cloud", "Source": "Shadowserver, Information warfare monitor", "Link": "https://app.box.com/s/mxffbrs4ju2yeoa47sbeym6n5zm1hnf3", "Year": "2010", "Date": "4/6/10"}, {"SHA-1": "c7d0387067ba747e3a3d9b43b7349d7888bf574e", "Title": "The Msupdater Trojan And Ongoing Targeted Attacks ", "Filename": "MSUpdaterTrojanWhitepaper", "Source": "Seculert, Zscaler", "Link": "https://app.box.com/s/gh8m5os2jewj2adleu2xqivj9qzf9ok8", "Year": "2010", "Date": "9/3/10"}, {"SHA-1": "deb92a55dffa951697d3367750df2cf8e4480f8f", "Title": "Revealed: Operation Shady Rat", "Filename": "wp-operation-shady-rat", "Source": "McAfee", "Link": "httpss://app.box.com/s/a086wzo5lwibw0dl7ri0kt7d0b51u299", "Year": "2011", "Date": "8/4/11"}, {"SHA-1": "e0fce95ccdb9c400f2dd3859ebe268f5bc7877ce", "Title": "Global Energy Cyberattacks: Night Dragon", "Filename": "wp-global-energy-cyberattacks-night-dragon", "Source": "McAfee", "Link": "https://app.box.com/s/o2tc88oihh4c67a0s8ygok9fwd66zp71", "Year": "2011", "Date": "2/10/11"}, {"SHA-1": "23f1f9e5771be71725fa19487da59f6779f5ee3f", "Title": "The Lurid Downloader", "Filename": "wp_dissecting-lurid-apt", "Source": "Trend Micro", "Link": "https://app.box.com/s/7s9bvquu64vafpi14t8p6w2t6hwls1zi", "Year": "2011", "Date": "8/22/11"}, {"SHA-1": "93c9ad9c9d9e1d882d56d8ceb1aa684d147d0a78", "Title": "W32.Stuxnet Dossier", "Filename": "w32_stuxnet_dossier", "Source": "Symantec", "Link": "https://app.box.com/s/rpdy3pk00bmkhgmf1lsfuwt6edakh6k3", "Year": "2011", "Date": "2/1/11"}, {"SHA-1": "f26ddf5c622dd52fc46cd46813c9552a08214587", "Title": "The Nitro Attacks: Stealing Secrets From The Chemical Industry", "Filename": "the_nitro_attacks", "Source": "Symantec", "Link": "https://app.box.com/s/sp5gpgu0xpf0dsfxj269ptxyyzm0ohkf", "Year": "2011", "Date": "10/31/11"}, {"SHA-1": "fd81d98729029a483e0c5c69d908ab96014edbe5", "Title": "Alleged Apt Intrusion Set: 1.Php Group", "Filename": "tb_advanced_persistent_threats", "Source": "Zscaler, ThreatLabz", "Link": "https://app.box.com/s/rqv5wirqhfc3zht1p2kouk8i0ymnmr92", "Year": "2011", "Date": "10/12/11"}, {"SHA-1": "4c1b1b0da537c482d359bf75435cb8abb1df7093", "Title": "Stuxnet Under The Microscope", "Filename": "Stuxnet_Under_the_Microscope", "Source": "ESET", "Link": "https://app.box.com/s/2mmdr5vhhrjt2prszn167a0v58az9put", "Year": "2011", "Date": "4/20/11"}, {"SHA-1": "254132938c6ff6eeaa5e3b1e8d8d506472c028b7", "Title": "Operation Shady Rat: Unprecedented Cyber-Espionage Campaign And Intellectual-Property Bonanza", "Filename": "shady_rat_vanity", "Source": "Vanity Fair", "Link": "https://app.box.com/s/k34la7wec8mf3gzxphkynem95en886d3", "Year": "2011", "Date": "8/2/11"}, {"SHA-1": "b0ac3fce955bb8361b98a791919d639b18877d56", "Title": "Palebot Trojan Harvests Palestinian Online Credentials", "Filename": "Palebot_Palestinian_credentials", "Source": "Norman", "Link": "https://app.box.com/s/73rhctcs0kj6s52eeqn509p44a368kuv", "Year": "2011", "Date": "12/8/11"}, {"SHA-1": "1461452398e57d541209eb6bc29e0743369b373b", "Title": "Htran And The Advanced Persistent Threat", "Filename": "HTran_and_the_Advanced_Persistent_Threat", "Source": "Dell Secureworks", "Link": "https://app.box.com/s/aqhzvj2a5vo91dgqjflh7nk4pm8aowon", "Year": "2011", "Date": "8/3/11"}, {"SHA-1": "f4231f388207b578c46b126e14d5ed4f9b405424", "Title": "Stuxnet/Duqu: The Evolution Of Drivers", "Filename": "Evolution_Drivers_Duqu_Stuxnet", "Source": "Kaspersky", "Link": "https://app.box.com/s/shakkou3wcgwfq5u83jncdit7cmmw151", "Year": "2011", "Date": "12/28/11"}, {"SHA-1": "c59b324139b965677a9933f7435b5ac34ca40126", "Title": "Duqu Trojan Questions And Answers", "Filename": "Duqu_Trojan_Questions_and_Answers", "Source": "Dell Secureworks", "Link": "https://app.box.com/s/ygyqokm0cxq56lut0v1u0i4u5vts9idc", "Year": "2011", "Date": "10/26/11"}, {"SHA-1": "2b98220caf158d1c4f6d72abbc379899e35edc4d", "Title": "Sk Hack By An Advanced Persistent Threat", "Filename": "C5_APT_SKHack", "Source": "Command Five Pty Ltd", "Link": "https://app.box.com/s/c911g2eqxck6va9cdn9vync5628zrreb", "Year": "2011", "Date": "9/11/11"}, {"SHA-1": "725568c41fa9f1d7e8a2226e71e5b2a39fd08121", "Title": "Advanced Persistent Threats: A Decade In Review", "Filename": "C5_APT_ADecadeInReview", "Source": "Command Five Pty Ltd", "Link": "https://app.box.com/s/tl13bx0ek04liinz7btbc3f47jpvpbxj", "Year": "2011", "Date": "6/1/11"}, {"SHA-1": "1fe534fe68fe1a93ef2b536f1365219653b560ee", "Title": "Night Dragon: Specific Protection Measures For Consideration ", "Filename": "Alerts DL-2011 Alerts-A-2011-02-18-01 Night Dragon Attachment 1", "Source": "NERC", "Link": "https://app.box.com/s/grv4y3nziuxbsv4g16nyf4u1i1g1w0nm", "Year": "2011", "Date": "2/18/11"}, {"SHA-1": "a486fb5b0b485796f0b2d1248c948e7c64c6b49a", "Title": "The Heartbeat Apt Campaign", "Filename": "wp_the-heartbeat-apt-campaign", "Source": "Trend Micro", "Link": "https://app.box.com/s/4qfg9m8wrdgsdf7k3fwrz7zmg2tkfxno", "Year": "2012", "Date": "1/3/12"}, {"SHA-1": "771d703ce533bea8dbece799705ce8e61717a8a5", "Title": "The Sin Digoo Affair", "Filename": "The_Sin_Digoo_Affair", "Source": "Dell Secureworks", "Link": "https://app.box.com/s/qj9849r6n72ktrc9q3n9107xduauffss", "Year": "2012", "Date": "2/29/12"}, {"SHA-1": "75c240fb4334b2307b56c336284acad112e40063", "Title": "Crouching Tiger, Hidden Dragon, Stolen Data", "Filename": "Crouching_tiger_hidden_dragon", "Source": "Contextis", "Link": "https://app.box.com/s/vk0oacayqkgrk3tp492h3ja9jnlktk7t", "Year": "2012", "Date": "3/12/12"}, {"SHA-1": "50511389957f7c2e0127031d8633724ae05354f3", "Title": "It'S Not The End Of The World: Darkcomet Misses By A Mile", "Filename": "Crypto-DarkComet-Report", "Source": "Arbor Networks", "Link": "https://app.box.com/s/akmz317h8dkapm52ksycf187rw2ylp21", "Year": "2012", "Date": "3/13/12"}, {"SHA-1": "bdb218fdc0cce0bc57f77a9a1e6d3cc7e81b55f9", "Title": "Luckycat Redux: Inside An Apt Campaign With Multiple Targets In India And Japan", "Filename": "wp_luckycat_redux", "Source": "Trend Micro", "Link": "https://app.box.com/s/vun0x0rrek5l51djb8igbojb7v85sg3q", "Year": "2012", "Date": "3/26/12"}, {"SHA-1": "0b792ff94ca71eeb71aba780286f7c4bf9f75b40", "Title": "New Version Of Osx.Sabpub & Confirmed Mac Apt Attacks", "Filename": "OSX_SabPub", "Source": "Kaspersky", "Link": "https://app.box.com/s/ew3h0mve5lf5x69ydjd1sm1r380rqy4k", "Year": "2012", "Date": "4/16/12"}, {"SHA-1": "0120f4f065c62bcd218bbc21bc729bd3645adf14", "Title": "Have I Got Newsforyou: Analysis Of Flamer C&C Server", "Filename": "w32_flamer_newsforyou", "Source": "Symantec", "Link": "https://app.box.com/s/6ujt4gi1c962id9o4iviesurww2grbxi", "Year": "2012", "Date": "5/18/12"}, {"SHA-1": "c00b7449b733f070c148c5b6c0a4df087a3f34f1", "Title": "Ixeshe An Apt Campaign", "Filename": "wp_ixeshe", "Source": "Trend Micro", "Link": "https://app.box.com/s/t74crjmu21ee2gpnnx56182bj74facvi", "Year": "2012", "Date": "5/22/12"}, {"SHA-1": "6e4df95a65ad848c8192c7c76ed35d622764cab3", "Title": "Skywiper (A.K.A. Flame A.K.A. Flamer): A Complex Malware For Targeted Attacks ", "Filename": "skywiper", "Source": "CrySyS, BME", "Link": "https://app.box.com/s/ebeqddqmxdjqttnqjr1xzi7agiqusrac", "Year": "2012", "Date": "5/31/12"}, {"SHA-1": "203258819d7fbffdfae2c5df96d71254a2816ca6", "Title": "Pest Control: Taming The Rats", "Filename": "PEST-CONTROL", "Source": "Matasano", "Link": "https://app.box.com/s/k6kyhjnok9n5vqtchm4u1luoluth0j1i", "Year": "2012", "Date": "6/13/12"}, {"SHA-1": "61c047476369c5069e39f3d06825d847d924d216", "Title": "Recent Observations In Tibet-Related Information Operations: Advanced Social Engineering For The Distribution Of Lurk Malware", "Filename": "Tibet_Lurk", "Source": "Citizen Lab", "Link": "https://app.box.com/s/njc3dvwkbx4i9y0s300r3k3ocrj1gmua", "Year": "2012", "Date": "7/10/12"}, {"SHA-1": "6d0de3e44a012f45a7b56a9862d1d67ef8bfd7e8", "Title": "From Bahrain With Love: Finfisher Spy Kit Exposed?", "Filename": "From-Bahrain-With-Love-FinFishers-Spy-Kit-Exposed", "Source": "Citizen Lab", "Link": "https://app.box.com/s/1y57tx3onyislwp9w9k0dqew874y11s9", "Year": "2012", "Date": "7/25/12"}, {"SHA-1": "51b16ee4bb04d663a4c67e23e3d3bf816ae12207", "Title": "The 'Madi' Infostealers - A Detailed Analysis", "Filename": "The_Madi_Infostealers", "Source": "Kaspersky", "Link": "https://app.box.com/s/h2rowevapfawgbkdpcinjgbci6iy71ml", "Year": "2012", "Date": "7/27/12"}, {"SHA-1": "4c9c37199b1e1da37d0dae56f7a6469e0b0a4c6e", "Title": "Gauss: Abnormal Distribution", "Filename": "kaspersky-lab-gauss", "Source": "Kaspersky", "Link": "https://app.box.com/s/y0wmp82qdqivrx4x21nfj5miod1tjuf1", "Year": "2012", "Date": "8/9/12"}, {"SHA-1": "759e45d0b495ec23949b3324fd543df7e450afdc", "Title": "The Voho Campaign: An In Depth Analysis ", "Filename": "VOHO_WP_FINAL_READY-FOR-Publication-09242012_AC", "Source": "RSA", "Link": "https://app.box.com/s/g1nx7q1o451m0o8hmhbeg82igcflk6q5", "Year": "2012", "Date": "8/12/12"}, {"SHA-1": "cfd4451a15223fdf667285b12a8829a4b409495a", "Title": "The Mirage Campaign", "Filename": "The_Mirage_Campaign", "Source": "Dell Secureworks", "Link": "https://app.box.com/s/h9vlkkgq0yaat56muq6nei95nchysbay", "Year": "2012", "Date": "8/18/12"}, {"SHA-1": "ce7a662c0f822536e6beff4856f701d28137c8e1", "Title": "The Elderwood Project", "Filename": "the-elderwood-project", "Source": "Symantec", "Link": "https://app.box.com/s/kbhzz24wt2t7kd92c2409uyqawj1jl0t", "Year": "2012", "Date": "9/6/12"}, {"SHA-1": "bd6f3f93d3c87e78149d766b2613ed9e18bc2620", "Title": "Iexpl0Re Rat", "Filename": "IEXPL0RE_RAT", "Source": "Citizen Lab", "Link": "https://app.box.com/s/tdgkyqg7o511v8a29mc8ec28yxzw118j", "Year": "2012", "Date": "9/7/12"}, {"SHA-1": "c32627e18128fbf249a084272310996d1b794bb5", "Title": "Trojan.Taidoor: Targeting Think Tanks", "Filename": "trojan_taidoor-targeting_think_tanks", "Source": "Symantec", "Link": "https://app.box.com/s/td8bl14go6icl9lhi9c4idkk82e83t2c", "Year": "2012", "Date": "10/27/12"}, {"SHA-1": "e802d6f06085f22242a66b06c785315e1c63c070", "Title": "\"Wicked Rose\" And The Ncph Hacking Group", "Filename": "WickedRose_andNCPH", "Source": "iDefense", "Link": "https://app.box.com/s/0cp8nyd339dnbak96x2klgz1kxm36xd2", "Year": "2012", "Date": "11/1/12"}, {"SHA-1": "4477f8bb9e82fa99d4c0f1d57720f5856b8ee9f8", "Title": "Recovering From Shamoon", "Filename": "FTA 1007 - Shamoon", "Source": "Fidelis", "Link": "https://app.box.com/s/fjucrojt5ldxio2sbvsql7syv46l6p4g", "Year": "2012", "Date": "11/1/12"}, {"SHA-1": "299a326641766c588a04f990927f795ecc31726f", "Title": "Systematic Cyber Attacks Against Israeli And Palestinian Targets Going On For A Year ", "Filename": "Cyberattack_against_Israeli_and_Palestinian_targets", "Source": "Norman", "Link": "https://app.box.com/s/83uopvit3i46wmy3hxvw4g3rjhv8ax1s", "Year": "2012", "Date": "11/3/12"}, {"SHA-1": "02e2959da1d4522c2d94ffbc7a1871470b2f7912", "Title": "The Many Faces Of Gh0St Rat: Plotting The Connections Between Malware Attacks", "Filename": "Faces_Ghost_RAT", "Source": "Norman", "Link": "https://app.box.com/s/aj7ebr1v0x9mf3psmxeififqijwmmacy", "Year": "2012", "Date": "11/30/12"}, {"SHA-1": "b64a571a29d1c2cfc40b6b6cef50a95e6ce3b455", "Title": "The \"Red October\" Campaign - An Advanced Cyber Espionage Network Targeting Diplomatic And Government Agencies", "Filename": "Securelist_RedOctober", "Source": "Kaspersky", "Link": "https://app.box.com/s/ymcjx37fp0zyyjybcl80czcrpzctjfp9", "Year": "2013", "Date": "1/14/13"}, {"SHA-1": "f9e75ac3b51ec2dd195a2fd82743530f9534dd40", "Title": "\"Red October\" Diplomatic Cyber Attacks Investigation", "Filename": "Securelist_RedOctober_Detail", "Source": "Kaspersky", "Link": "https://app.box.com/s/m3hhm2et9h54sfojd33b6k7m76zoqdv1", "Year": "2013", "Date": "1/14/13"}, {"SHA-1": "751d00dab0fac4c2b0d1c140e9897fb99a399be1", "Title": "The Icefog Apt: A Tale Of Cloak And Three Daggers", "Filename": "icefog", "Source": "Kaspersky", "Link": "https://app.box.com/s/ebjeefvfx58arny58fb9vv6up39f293w", "Year": "2013", "Date": "1/14/13"}, {"SHA-1": "b6217ea7fe6b4dd5e27b2a1b4b84432db2e1b2f3", "Title": "Operation Red October", "Filename": "McAfee_Labs_Threat_Advisory_Exploit_Operation_Red_Oct", "Source": "McAfee", "Link": "https://app.box.com/s/yzybkh6neofhi2wonyn7abjyn2hlfa8f", "Year": "2013", "Date": "1/18/13"}, {"SHA-1": "829bd809578a0305bc0438fd719e9c6da8f9fd96", "Title": "Operation Beebus", "Filename": "FireEye_Operation-Beebus(Feb-1-13)", "Source": "FireEye", "Link": "https://app.box.com/s/3bk8cfcjiwhh1gxlkmyslrmp85wm7ewd", "Year": "2013", "Date": "2/1/13"}, {"SHA-1": "f8b1d371008a2108bb7ded054b7b0b7cdc4d5295", "Title": "Command And Control In The Fifth Domain", "Filename": "C5_APT_C2InTheFifthDomain", "Source": "Command Five Pty Ltd", "Link": "https://app.box.com/s/yfduvs6jw8w3ankhjkbi4ei5ykqho368", "Year": "2013", "Date": "2/3/13"}, {"SHA-1": "100df21fed6fcf08b0982cfdf55463608613a2e2", "Title": "Targeted Cyber Attacks: Examples And Challenges Ahead", "Filename": "Presentation_Targeted-Attacks_EN", "Source": "CrySyS", "Link": "https://app.box.com/s/vsy0oa0n3l2m2lx5oxpzj71zhbqkkgxq", "Year": "2013", "Date": "2/12/13"}, {"SHA-1": "3974687624eb85cdcf1fc9ccfb68eea052971e84", "Title": "Apt1 Exposing One Of China's Cyber Espionage Units", "Filename": "Mandiant_APT1_Report", "Source": "Mandiant", "Link": "https://app.box.com/s/t8w9gavaci6jye519zp13tjdicnd7xzu", "Year": "2013", "Date": "2/18/13"}, {"SHA-1": "349984643361273d5d3b638e369c45cbb409676c", "Title": "Comment Crew: Indicators Of Compromise", "Filename": "comment_crew_indicators_of_compromise", "Source": "Symantec", "Link": "https://app.box.com/s/0leqi6xaid7v745y3kujcyi5vgvf73su", "Year": "2013", "Date": "2/22/13"}, {"SHA-1": "712311f4cacd476100c7ef037e3accc740558920", "Title": "Stuxnet 0.5: The Missing Link", "Filename": "stuxnet_0_5_the_missing_link", "Source": "Symantec", "Link": "https://app.box.com/s/jzbxpm7m7kakhubocrrerq0myig6befb", "Year": "2013", "Date": "2/26/13"}, {"SHA-1": "c6dff7f0864e36e3dcc1be12747d26fb8072b52c", "Title": "The Miniduke Mystery: Pdf 0-Day Government Spy Assembler 0X29A Micro Backdoor ", "Filename": "themysteryofthepdf0-dayassemblermicrobackdoor", "Source": "Kaspersky", "Link": "https://app.box.com/s/w3b1yh6agvwmocx8ftzjg8kyds0jodmk", "Year": "2013", "Date": "2/27/13"}, {"SHA-1": "2d3fb67fd870f192c38bd8e51344d45645794623", "Title": "Miniduke: Indicators ", "Filename": "miniduke_indicators_public", "Source": "CrySyS, BME", "Link": "https://app.box.com/s/d5npu14e4471j5mmpkgt1xwdnu90t43e", "Year": "2013", "Date": "2/27/13"}, {"SHA-1": "e33abbd24c9cbb57b3b4a97df165766e1fb42eeb", "Title": "You Only Click Twice: Finfisher's Global Proliferation", "Filename": "15-2013-youonlyclicktwice", "Source": "Citizen Lab", "Link": "https://app.box.com/s/bdtw7jyfdcr9snnt14ye7ukb9oj2gmn9", "Year": "2013", "Date": "3/13/13"}, {"SHA-1": "334b4ee90a30c9ab9dcc6e3596f15f0dcb02486d", "Title": "Safe A Targeted Threat", "Filename": "Safe-a-targeted-threat", "Source": "Trend Micro", "Link": "https://app.box.com/s/0yh8mn02v2wrehl9yaddrb8rjdzieeqb", "Year": "2013", "Date": "3/17/13"}, {"SHA-1": "57a17587785f54a103ea970277bd7c4cc179a82c", "Title": "The Teamspy Story - Abusing Teamviewer In Cyberespionage Campaigns", "Filename": "theteamspystory_final_t2", "Source": "Kaspersky", "Link": "https://app.box.com/s/742gtrl1fedxy8iqwjuqsiru1m8i0l2g", "Year": "2013", "Date": "3/20/13"}, {"SHA-1": "c6ce890a544b01e5dafd4add9326b4178424c4e2", "Title": "Dissecting Operation Troy: Cyberespionage In South Korea", "Filename": "dissecting-operation-troy", "Source": "McAfee", "Link": "https://app.box.com/s/b91tgqhiw7zyivfnxe3sbrtzfgk6n08f", "Year": "2013", "Date": "3/20/13"}, {"SHA-1": "26353a7703ce0b186450134a5321ac37d1405380", "Title": "Apt1: Technical Backstage", "Filename": "RAP002_APT1_Technical_backstage.1.0", "Source": "Malware.lu, itrust", "Link": "https://app.box.com/s/x2jgr4j1bgfas2h2b4h09mam9nn4qwu3", "Year": "2013", "Date": "3/27/13"}, {"SHA-1": "875abf02dad2a434d708e495ffc8afe4b2500aae", "Title": "Analysis Of A Plugx Variant (Plugx Version 7.0)", "Filename": "tr-12-circl-plugx-analysis-v1", "Source": "CIRCL", "Link": "https://app.box.com/s/90qhti3jwdmthbz7fd1l49n9y2cp8ffq", "Year": "2013", "Date": "3/28/13"}, {"SHA-1": "85ef5daf99603da833a32245fd120028829a666f", "Title": "Trojan.Apt.Banechant: In-Memory Trojan That Observes For Multiple Mouse Clicks", "Filename": "Trojan.APT.BaneChant", "Source": "FireEye", "Link": "https://app.box.com/s/5ycaruh0zf07h2jy9mpasgm1crninjwp", "Year": "2013", "Date": "4/1/13"}, {"SHA-1": "d88b186085918e2039514caa21a4017aafc556d1", "Title": "A Closer Look At Miniduke", "Filename": "MiniDuke_Paper_Final", "Source": "Bitdefender", "Link": "https://app.box.com/s/cfkwk5mocm6ckxmaiv8hfe73k2bl1u10", "Year": "2013", "Date": "4/3/13"}, {"SHA-1": "3a34d6152f2d287f58e67a03d96408b74d5c470e", "Title": "Winnti: More Than Just A Game", "Filename": "winnti-more-than-just-a-game-130410", "Source": "Kaspersky", "Link": "https://app.box.com/s/dlzp6f7hv9q3r0kreqvu8yyt36lzdbxw", "Year": "2013", "Date": "4/13/13"}, {"SHA-1": "660bd04b0d4b33301fcb47a98f3d671f126f66c0", "Title": "The Mutter Backdoor: Operation Beebus with New Targets", "Filename": "FireEye_The-Mutter-Backdoor-Operation-Beebus-with-New-Targets(Apr-17-13)", "Source": "Fireeye", "Link": "https://app.box.com/s/zg8cx9of6h9kdol7wwvgz8lxkqlvyr2p", "Year": "2013", "Date": "4/17/13"}, {"SHA-1": "aae01ca44ca11f33692bcfd9a20e36105ddfa2b9", "Title": "Operation Hangover - Unveiling An Indian Cyberattack Infrastructure", "Filename": "NS-Unveiling-an-Indian-Cyberattack-Infrastructure_FINAL_Web", "Source": "Norman, Shadowserver", "Link": "https://app.box.com/s/f5wyu7306nti3lbp58uesioijsl9zamm", "Year": "2013", "Date": "5/20/13"}, {"SHA-1": "e2631efe178d16691329f27a853a41a48387bfc4", "Title": "Operation Hangover |Executive Summary", "Filename": "Norman_HangOver report_Executive Summary_042513", "Source": "Norman", "Link": "https://app.box.com/s/d3q764or208vbbg26gtcasv5uxnkcij1", "Year": "2013", "Date": "5/20/13"}, {"SHA-1": "dd9dacb6b9bc34a2410f9c8fb3a5f04fdce77f29", "Title": "Analysis Of A Stage 3 Miniduke Sample", "Filename": "circl-analysisreport-miniduke-stage3-public", "Source": "CIRCL", "Link": "https://app.box.com/s/c95me2uocwoothfnapxrcjwfmynue4ri", "Year": "2013", "Date": "5/30/13"}, {"SHA-1": "902c5b2eb9cb486171b24ca60681aea5eecdb270", "Title": "The Chinese Malware Complexes: The Maudi Surveillance Operation", "Filename": "NormanShark-MaudiOperation", "Source": "Norman", "Link": "https://app.box.com/s/v04cs4pueqq78rh8uasr39tsh36gtqra", "Year": "2013", "Date": "6/1/13"}, {"SHA-1": "31d750b3565b65c43533a87bf7aa72c41258f9a0", "Title": "Crude Faux: An Analysis Of Cyber Conflict Within The Oil & Gas Industries", "Filename": "2013-9", "Source": "CERIAS", "Link": "https://app.box.com/s/9dpb6yyvb4yedosa75fo1ibuo46oy35a", "Year": "2013", "Date": "6/1/13"}, {"SHA-1": "4fd06d33aa1a087709277eb71d204e2fbf8b9243", "Title": "The Nettraveler (Aka Travnet) ", "Filename": "kaspersky-the-net-traveler-part1-final", "Source": "Kaspersky", "Link": "https://app.box.com/s/1qx5mkzkcvwq3eazh2ygxowfbbadofby", "Year": "2013", "Date": "6/4/13"}, {"SHA-1": "9a2de0730e62aa24cdff1d1920b9535d1795be7e", "Title": "Keyboy, Targeted Attacks Against Vietnam And India", "Filename": "KeyBoy_Vietnam_India", "Source": "Rapid7", "Link": "https://app.box.com/s/f8p3dagvmdezcpgmnh04mgqz21viklpz", "Year": "2013", "Date": "6/7/13"}, {"SHA-1": "c6e80e76bca03538a2dfd2aac2e4120fdab6f4fc", "Title": "Trojan.Apt.Seinup Hitting Asean", "Filename": "Trojan.APT.Seinup", "Source": "FireEye", "Link": "https://app.box.com/s/iap35ypb6u03wrzpmemy2z2ntf4k8wm0", "Year": "2013", "Date": "6/18/13"}, {"SHA-1": "283e853a69cddd4b59b35fcc2a75205b1deb9b69", "Title": "A Call To Harm: New Malware Attacks Target The Syrian Opposition", "Filename": "19-2013-acalltoharm", "Source": "Citizen Lab", "Link": "https://app.box.com/s/hydmfjuajj44kezw77k9nwj5qormpp9y", "Year": "2013", "Date": "6/21/13"}, {"SHA-1": "214daebe12ae36a91e13c83e820bb2e20b560828", "Title": "Njrat Uncovered", "Filename": "fta-1009---njrat-uncovered-1", "Source": "Fidelis", "Link": "https://app.box.com/s/vdg51zbfvap52w60zj0is3l1dmyya0n4", "Year": "2013", "Date": "6/28/13"}, {"SHA-1": "05f1beceab73155d552a5ee919aebc4c8e92c609", "Title": "Hunting The Shadows: In Depth Analysis Of Escalated Apt Attacks", "Filename": "US-13-Yarochkin-In-Depth-Analysis-of-Escalated-APT-Attacks-Slides", "Source": "Xecure, Academia Sinica", "Link": "https://app.box.com/s/owi5dxkk3zx164lp90swu3weeyp805se", "Year": "2013", "Date": "7/1/13"}, {"SHA-1": "4e6876f16b77dbb33aad5384dbf0549d717edb31", "Title": "Dark Seoul Cyber Attack: Could It Be Worse? ", "Filename": "Dark_Seoul_Cyberattack", "Source": "Dongseo University", "Link": "https://app.box.com/s/qw0kvewoi3uxy4g3xkc31ammxttbft5z", "Year": "2013", "Date": "7/9/13"}, {"SHA-1": "9a7978041e795b788d86c52a477160dae296413b", "Title": "The Plugx Malware Revisited: Introducing Smoaler", "Filename": "Plugx_Smoaler", "Source": "Sophos", "Link": "https://app.box.com/s/dfdg420iygjtz1rmou2ps14zi25l7tfb", "Year": "2013", "Date": "7/15/13"}, {"SHA-1": "86061f7d1994ebb7b8b7eb640b041fb1342adac5", "Title": "Secrets Of The Comfoo Masters", "Filename": "Secrets_of_the_Comfoo_Masters", "Source": "Dell Secureworks", "Link": "https://app.box.com/s/70bcgwlwqpp43spjxnyk2f7h96lg0718", "Year": "2013", "Date": "7/31/13"}, {"SHA-1": "ffdfed40c5b1e08a6469c2f38e6a51347a37dd1b", "Title": "Operation Hangover - Unveiling An Indian Cyberattack Infrastructure (Appendix)", "Filename": "Unveiling an Indian Cyberattack Infrastructure - appendixes", "Source": "Norman", "Link": "https://app.box.com/s/2k6oduwj3aetbetxdjx6gjqcg7mrcvvj", "Year": "2013", "Date": "8/1/13"}, {"SHA-1": "886b0ab831a5084de7d80355b7578a9a9999fc88", "Title": "Inside Report _ Apt Attacks On Indian Cyber Space", "Filename": "Inside_Report_by_Infosec_Consortium", "Source": "Infosec Consortium", "Link": "https://app.box.com/s/a2zw9uye2hhofsc1me6yfj39u6gjalcq", "Year": "2013", "Date": "8/1/13"}, {"SHA-1": "6b624d6d80b412a10260344f244ed93e3718e003", "Title": "Surtr: Malware Family Targeting The Tibetan Community", "Filename": "Surtr_Malware_Tibetan", "Source": "Citizen Lab", "Link": "https://app.box.com/s/m57wv4yn4wsa0j2bj6yuj23bzyrq5rg8", "Year": "2013", "Date": "8/2/13"}, {"SHA-1": "665c6ace0a9175735f6cdb656e79287f5a53e072", "Title": "Where There Is Smoke, There Is Fire: South Asian Cyber Espionage Heats Up", "Filename": "India_Pak_Tranchulas", "Source": "ThreatConnect", "Link": "https://app.box.com/s/s0c49bv6hitrhmcafk0phnnuer3e63v1", "Year": "2013", "Date": "8/2/13"}, {"SHA-1": "5f17e7b886d2388ffc134157dd1b66aa65372b59", "Title": "Survival Of The Fittest: New York Times Attackers Evolve Quickly", "Filename": "NYTimes_Attackers_Evolve_Quickly", "Source": "FireEye", "Link": "https://app.box.com/s/fkg2mxeqpb2ivx9neyz6bseopy1dfg5p", "Year": "2013", "Date": "8/12/13"}, {"SHA-1": "4b6cc1420b5d641564c9895882a5ba97d18137be", "Title": "Byebye Shell And The Targeting Of Pakistan", "Filename": "ByeBye_Shell_target", "Source": "Rapid7", "Link": "https://app.box.com/s/a4a59w1go5opcj607ssoh11oqnhozv0h", "Year": "2013", "Date": "8/19/13"}, {"SHA-1": "5276375276d632b9a43037ef9a99221b81cb1a61", "Title": "Poison Ivy: Assessing Damage And Extracting Intelligence", "Filename": "fireeye-poison-ivy-report", "Source": "FireEye", "Link": "https://app.box.com/s/7gw9d1cbuvygb3qamjytpgh9nbmk7cbw", "Year": "2013", "Date": "8/21/13"}, {"SHA-1": "3b74caac2fb42068781f9812b5080a6975ce3d24", "Title": "Operation Molerats", "Filename": "Operation_Molerats", "Source": "FireEye", "Link": "https://app.box.com/s/96rwehp2pkoou5gnimrx3sfdymv0nkhv", "Year": "2013", "Date": "8/23/13"}, {"SHA-1": "1bf6c5eaaf996f463b25837c15b400c895862419", "Title": "Operation Ephemeral Hydra: Ie Zero-Day Linked To Deputydog Uses Diskless Method", "Filename": "Operation_EphemeralHydra", "Source": "FireEye", "Link": "https://app.box.com/s/qm0qqb7bpc0ut2c5n76zr5i0rdfhy5ts", "Year": "2013", "Date": "9/10/13"}, {"SHA-1": "64f98d4c515e31f68c6e7fdf442753a6af8c0bee", "Title": "The \"Kimsuky\" Operation: A North Korean Apt?", "Filename": "Kimsuky", "Source": "Kaspersky", "Link": "https://app.box.com/s/bel4s8xubunn5gxjvorgm7qg2v0e9kgt", "Year": "2013", "Date": "9/11/13"}, {"SHA-1": "21a5b79498a242f6869649cb808d02366dba6e89", "Title": "Operation Deputydog: Zero-Day (Cve-2013-3893) Attack Against Japanese Targets", "Filename": "Operation_DeputyDog", "Source": "FireEye", "Link": "https://app.box.com/s/w4rzfbf0ziip0dt4smkwtraluv8o0z9g", "Year": "2013", "Date": "9/13/13"}, {"SHA-1": "e4aa40ce1a865021e0b178a4c444126743335d32", "Title": "Hidden Lynx: Professional Hackers For Hire", "Filename": "hidden_lynx", "Source": "Symantec", "Link": "https://app.box.com/s/m7yxjl7nljw2iltpbasm7t2dswhya6iv", "Year": "2013", "Date": "9/17/13"}, {"SHA-1": "5ff5d49650b4fa5988f435f60434744a7bcaee48", "Title": "World War C: Understanding Nation-State Motives Behind Today's Advanced Cyber Attacks", "Filename": "fireeye-wwc-report", "Source": "FireEye", "Link": "https://app.box.com/s/dbgzho741wbtce2r5hppvocy6cwjbcbk", "Year": "2013", "Date": "9/30/13"}, {"SHA-1": "a899d6713da1b9da8aa77cb3db5360b4e8574b5c", "Title": "Fakem Rat: Malware Disguised As Windows Messenger And Yahoo! Messenger", "Filename": "wp-fakem-rat", "Source": "Trend Micro", "Link": "https://app.box.com/s/otjh028wd3rfia4ysdtldj3whsd1i4y2", "Year": "2013", "Date": "10/24/13"}, {"SHA-1": "9a4dcfa7178cccc6283a92bc768be1374eb347f9", "Title": "Evasive Tactics: Terminator Rat", "Filename": "FireEye-Terminator_RAT", "Source": "FireEye", "Link": "https://app.box.com/s/zesgiuff58vejn97rad0w9tt827cusg0", "Year": "2013", "Date": "10/24/13"}, {"SHA-1": "7ddab1f54ef0ba0a48efdb7ca39ddcc82f0a84d6", "Title": "Supply Chain Analysis: From Quartermaster To Sunshopfireeye", "Filename": "fireeye-malware-supply-chain", "Source": "FireEye", "Link": "https://app.box.com/s/cpnh3qzju92xffn9qtlw45vceuleqh6d", "Year": "2013", "Date": "11/11/13"}, {"SHA-1": "a8f9bc957ae0ee7e38a2cefb83afff0b1bd68422", "Title": "\"Njrat\", The Saga Continues", "Filename": "FTA 1010 - njRAT The Saga Continues", "Source": "Fidelis", "Link": "https://app.box.com/s/6blnvkflzcded9jlthm7yt1zzki6eakz", "Year": "2013", "Date": "12/2/13"}, {"SHA-1": "b670b7a7904baded891a4c6e7afe692998989668", "Title": "Operation Ke3Chang Targeted Attacks Against Ministries Of Foreign Affairs", "Filename": "fireeye-operation-ke3chang", "Source": "FireEye", "Link": "https://app.box.com/s/8w1uu9e2l7jwq40gtea7xem6ezg79ffu", "Year": "2013", "Date": "12/11/13"}, {"SHA-1": "dc92b79b353eb0e47e71216f3fa1f0c6167e29e7", "Title": "Etso Apt Attacks Analysis ", "Filename": "ETSO_APT_Attacks_Analysis", "Source": "AhnLab", "Link": "https://app.box.com/s/n4vji662ern1bii9hhahvglujeobqmk0", "Year": "2013", "Date": "12/20/13"}, {"SHA-1": "8a3a657ac02569c1324ade4cca562ae8c5781f94", "Title": "The Little Malware That Could: Detecting And Defeating The China Chopper Web Shell", "Filename": "fireeye-china-chopper-report", "Source": "FireEye", "Link": "https://app.box.com/s/yvk5tr8poletupw82biic0ucpvynvoyj", "Year": "2013", "Date": "X"}, {"SHA-1": "f69e4d23674d06ee459d2abbecc5f3f4cbd58047", "Title": "2Q Report On Targeted Attack Campaigns", "Filename": "2q-report-on-targeted-attack-campaigns", "Source": "Trend Micro", "Link": "https://app.box.com/s/bwgb7uhh6p4bdkyvlw94dpq19tq0fvbv", "Year": "2013", "Date": "X"}, {"SHA-1": "f03931c7214e71f4bfcc6a5008acb3f4bb1cb0e3", "Title": "Energy At Risk: A Study Of It Security In The Energy And Natural Resources Industry", "Filename": "energy-at-risk", "Source": "KPMG", "Link": "https://app.box.com/s/z7lwte5v91lz2rkfywd9s1grnqeuy1fk", "Year": "2013", "Date": "X"}, {"SHA-1": "8421ef67d1e6dcc277f07f39f86e21fd89cf1d5a", "Title": "Targeted Attacks Against The Energy Sector", "Filename": "targeted_attacks_against_the_energy_sector", "Source": "Symantec", "Link": "https://app.box.com/s/blcobivhvh1gwqh7qjtkrdpaggz2lmlr", "Year": "2014", "Date": "1/13/14"}, {"SHA-1": "9767abff87b137695ab8481729ed7130499a0c80", "Title": "New Cdto: A Sneakernet Trojan Solution", "Filename": "FTA 1001 FINAL 1.15.14", "Source": "Fidelis", "Link": "https://app.box.com/s/63rg0wfr0ki2xvtt7ja1b7lmn7dspcdc", "Year": "2014", "Date": "1/15/14"}, {"SHA-1": "ec6771a81e830f50c2d54b26dc0f6a642439ee09", "Title": "Emerging Threat Profile Shell_Crew ", "Filename": "h12756-wp-shell-crew", "Source": "RSA", "Link": "https://app.box.com/s/xqldk5renv5ecihr7wyyazplrnezknmx", "Year": "2014", "Date": "1/21/14"}, {"SHA-1": "036b1154d4cc2de08dc647eb743c6b4c9d860902", "Title": "Intruder File Report- Sneakernet Trojan", "Filename": "FTA 1011 Follow UP", "Source": "Fidelis", "Link": "https://app.box.com/s/yvbehxsn3tknzogt74z9ryn7r7elwpmf", "Year": "2014", "Date": "1/31/14"}, {"SHA-1": "1e4c8aef818d7d0e950974b6c9d2a792969e3a94", "Title": "Unveiling Careto - The Masked Apt", "Filename": "unveilingthemask_v1.0", "Source": "Kaspersky", "Link": "https://app.box.com/s/aepgdq5vc2dxd2m9t0ab2v28rtwbhjua", "Year": "2014", "Date": "2/11/14"}, {"SHA-1": "114583db8690cd01c60d5758dbe2e2dc1e96fb25", "Title": "Operation Snowman: Deputydog Actor Compromises Us Veterans Of Foreign Wars Website", "Filename": "Operation_SnowMan", "Source": "FireEye", "Link": "https://app.box.com/s/6uv4v8hpnfpka971qk0gd3j4mnm5x7mt", "Year": "2014", "Date": "2/13/14"}, {"SHA-1": "186d7913fe80c35a06e76a5c8fd08520f43b4246", "Title": "Xtremerat: Nuisance Or Threat?", "Filename": "XtremeRAT_fireeye", "Source": "FireEye", "Link": "https://app.box.com/s/s7kamaz3bmziz8vu1fvwz2e9m13xiysg", "Year": "2014", "Date": "2/19/14"}, {"SHA-1": "9b66a35bea35d963d1ff07cab2a3914b38e24257", "Title": "The Monju Incident ", "Filename": "The_Monju_Incident", "Source": "Context", "Link": "https://app.box.com/s/l6n25enqom0uydgxogybp82294nkf4dt", "Year": "2014", "Date": "2/19/14"}, {"SHA-1": "e162b0015a753a6d85a13296e601c31271868b1f", "Title": "Operation Greedywonk: Multiple Economic And Foreign Policy Sites Compromised, Serving Up Flash Zero-Day Exploit", "Filename": "Operation_GreedyWonk", "Source": "FireEye", "Link": "https://app.box.com/s/870bnpwyxqjqg9o0z4sl0e2mlkzar60q", "Year": "2014", "Date": "2/20/14"}, {"SHA-1": "76a6ea858e3524682ad3ee30251003228db50fb3", "Title": "Mo' Shells Mo' Problems - Deep Panda Web Shells", "Filename": "deep-panda-webshells", "Source": "Crowdstrike", "Link": "https://app.box.com/s/pn1mtot3a2d2seuqx46unamdl7udlwq0", "Year": "2014", "Date": "2/20/14"}, {"SHA-1": "d31648d83d04cc22669f21fa92ee48345e76e062", "Title": "Gathering In The Middle East, Operation Stteam", "Filename": "FTA 1012 STTEAM Final", "Source": "Fidelis", "Link": "https://app.box.com/s/ine4z2lyf8ryqao789oc0als335iip8c", "Year": "2014", "Date": "2/23/14"}, {"SHA-1": "51e8e24162c94d68637f8252ea6e8f5707b52a23", "Title": "The French Connection: French Aerospace-Focused CVE-2014-0322 Attack Shares Similarities with 2012 Capstone Turbine Activity", "Filename": "Crowdstrike_The French Connection(Feb-25-14)", "Source": "Crowdstrike", "Link": "https://app.box.com/s/yh95vh5l17z2vcffwjvg3v05fzn0pzp1", "Year": "2014", "Date": "2/25/14"}, {"SHA-1": "917691a4f8af50a09926f97bf1be2e0cb71f8c68", "Title": "Uroburos Highly Complex Espionage Software With Russian Roots", "Filename": "GData_Uroburos_RedPaper_EN_v1", "Source": "Gdata", "Link": "https://app.box.com/s/dokswmrkrxmipfmdpsvelnq18w4ypogw", "Year": "2014", "Date": "2/28/14"}, {"SHA-1": "1e1f0c599eb1c22360cb9bf8bc30399050e3764b", "Title": "The Siesta Campaign: A New Cybercrime Operation Awakens", "Filename": "The_Siesta_Campaign", "Source": "Trend Micro", "Link": "https://app.box.com/s/0rcadhypkl7fod418nv58uicnnljvnrh", "Year": "2014", "Date": "3/6/14"}, {"SHA-1": "0849ce1f0272c4604d47e464ab56cad0b5b60263", "Title": "Snake Campaign & Cyber Espionage Toolkit", "Filename": "snake_whitepaper", "Source": "BAE Systems", "Link": "https://app.box.com/s/xmeq5ajvmzux1appt1qvd8wme7k13o63", "Year": "2014", "Date": "3/7/14"}, {"SHA-1": "94d04c5da4ed33cd78d033ad371aa8472e53d701", "Title": "Suspected Russian Spyware Turla Targets Europe, United States", "Filename": "Reuters_Turla", "Source": "Reuters", "Link": "https://app.box.com/s/n9zt53c246ltmhhjkcfay9xq8mee09yo", "Year": "2014", "Date": "3/8/14"}, {"SHA-1": "829bf301061a9a6358c233ca5aa459439fc0aec8", "Title": "New Zero-Day Exploit Targeting Internet Explorer Versions 9 Through 11 Identified In Targeted Attacks", "Filename": "Op_Clandestine_Fox", "Source": "FireEye", "Link": "https://app.box.com/s/5epjx7i7fc3q8jh8o4exabquoar1s3ii", "Year": "2014", "Date": "4/26/14"}, {"SHA-1": "41c3f02fe289ddb0d0c5a010f5865b58da939b1c", "Title": "Operation Saffron Rose", "Filename": "fireeye-operation-saffron-rose", "Source": "FireEye", "Link": "https://app.box.com/s/pnagcb7vgpqaxen71n2x557m05q7dazl", "Year": "2014", "Date": "5/13/14"}, {"SHA-1": "e743ba5074212801ce09ee640730028ab8f41d48", "Title": "Cat Scratch Fever: Crowdstrike Tracks Newly Reported Iranian Actor As Flying Kitten", "Filename": "CrowdStrike_Flying_Kitten", "Source": "Crowdstrike", "Link": "https://app.box.com/s/vr9chzv8t952gywbaom6r0p4bo4pub8r", "Year": "2014", "Date": "5/13/14"}, {"SHA-1": "91c2cdb099060388dd93b0e440a3ff4dff5fd622", "Title": "Miniduke Still Duking It Out", "Filename": "Miniduke_twitter", "Source": "ESET", "Link": "https://app.box.com/s/dnn3hp5nlwuiwxcqjc9kmsfiodcimi64", "Year": "2014", "Date": "5/20/14"}, {"SHA-1": "b1e45b08bfa1db986e1e643291d250a0cda1988c", "Title": "Rat In A Jar: A Phishing Campaign Using Unrecom", "Filename": "FTA_1013_RAT_in_a_jar", "Source": "Fidelis", "Link": "https://app.box.com/s/hhfmfv9itrx2mabe5m441a381zvc5jul", "Year": "2014", "Date": "5/21/14"}, {"SHA-1": "51bb16ba51be3c144ac9e09a68732cbe0bb785d5", "Title": "Illuminating The Etumbot Apt Backdoor", "Filename": "ASERT-Threat-Intelligence-Brief-2014-07-Illuminating-Etumbot-APT", "Source": "Arbor Networks", "Link": "https://app.box.com/s/h8c0ds5etxke111s38r7rs3ltmpf2mot", "Year": "2014", "Date": "6/6/14"}, {"SHA-1": "ddadffb91053c4d19590e2035c8eeed14fceca60", "Title": "Putter Panda", "Filename": "putter-panda", "Source": "Crowdstrike", "Link": "https://app.box.com/s/ugahgfd07evh7q0h8lnb00brew4ixvdk", "Year": "2014", "Date": "6/9/14"}, {"SHA-1": "bd1794d152f04add2aef937826a9cf949c4b25ab", "Title": "Anatomy Of The Attack: Zombie Zero", "Filename": "TrapX_ZOMBIE_Report_Final", "Source": "Trapx", "Link": "https://app.box.com/s/r95pew4gb5gi1qw40l6s0jbzw5lfwqbm", "Year": "2014", "Date": "6/10/14"}, {"SHA-1": "292359e869860f8308c2cf789986fe7c12502553", "Title": "#9 Blitzanalysis: Embassy Of Greece Beijing - Compromise", "Filename": "Compromise_Greece_Beijing", "Source": "R136a1", "Link": "https://app.box.com/s/j108s0yjga3w42lm7wifklqilr4l35ld", "Year": "2014", "Date": "6/20/14"}, {"SHA-1": "1856b8232153c3cc879662288b34b4a660586a9a", "Title": "Dragonfly: Cyberespionage Attacks Against Energy Suppliers", "Filename": "Dragonfly_Threat_Against_Western_Energy_Suppliers", "Source": "Symantec", "Link": "https://app.box.com/s/edyb0yn2g8ozavlmxoh082l7z5o5v3yx", "Year": "2014", "Date": "6/30/14"}, {"SHA-1": "7f3e46c42095721ba79b1a47e26e662eb7492057", "Title": "Tr-25 Analysis - Turla / PNet / Snake/ Uroburos", "Filename": "circl-tr25-analysis-turla-pfinet-snake-uroburos", "Source": "CIRCL", "Link": "https://app.box.com/s/54kvbxp9nc0xtme1omd1xpxcckwm945g", "Year": "2014", "Date": "7/10/14"}, {"SHA-1": "d5a6d2366c4973f06e95bb1201747d0175321952", "Title": "The Eye Of The Tiger (Pitty Tiger)", "Filename": "Pitty_Tiger_Final_Report", "Source": "Airbus", "Link": "https://app.box.com/s/54porxs30re847wc7ca1jk1hzbtvt0hv", "Year": "2014", "Date": "7/11/14"}, {"SHA-1": "591cef00735f510079e0fe4bd0067ca0150fd004", "Title": "Sayad (Flying Kitten) Infostealer: Is This The Work Of The Iranian Ajax Security Team?", "Filename": "Sayad_Flying_Kitten_analysis", "Source": "Vinsula", "Link": "https://app.box.com/s/hjjb0aysslxse1ehpyt5ny68lf8tyctg", "Year": "2014", "Date": "7/20/14"}, {"SHA-1": "a53ce340535461cc92e274f7c5bfb0d8653d5087", "Title": "Crouching Yeti: Appendixes", "Filename": "Kaspersky_Lab_crouching_yeti_appendixes_eng_final", "Source": "Kaspersky", "Link": "https://app.box.com/s/90zdh7pfbmon8mtea3okbc6s83ro28bx", "Year": "2014", "Date": "7/31/14"}, {"SHA-1": "142d4447504e30012d98fea16831f2363c62c5ca", "Title": "Energetic Bear _ Crouching Yeti", "Filename": "EB-YetiJuly2014-Public", "Source": "Kaspersky", "Link": "https://app.box.com/s/z0apbug9w1ztt8ex0pe99sq0d2u9r3nu", "Year": "2014", "Date": "7/31/14"}, {"SHA-1": "5ceee60079796aa518c5e490feaca4a0d78c031b", "Title": "Syrian Malware, The Ever-Evolving Threat", "Filename": "KL_report_syrian_malware", "Source": "Kaspersky", "Link": "https://app.box.com/s/029unv6hijmzrq3xzevz58y4n4xneybz", "Year": "2014", "Date": "8/1/14"}, {"SHA-1": "d78156c4a19f70d219ed76526769d4d5f141a4ed", "Title": "Gholee Protective Edge Themed Spear Phishing Campaign", "Filename": "Gholee_Protective_Edge_themed_spear_phishing_campaign", "Source": "Clearsky", "Link": "https://app.box.com/s/krnvva7fu9o6ywa81uwbpsasj4sz3y2n", "Year": "2014", "Date": "8/4/14"}, {"SHA-1": "0e5301e830d7b19600b2d110115d7c0f0ab86b02", "Title": "Sidewinder Targeted Attack Against Android In The Golden Age Of Ad Libraries", "Filename": "fireeye-sidewinder-targeted-attack", "Source": "FireEye", "Link": "https://app.box.com/s/qwg36lcvf9iaz3alks4w24btqcxmzlkq", "Year": "2014", "Date": "8/4/14"}, {"SHA-1": "2a38d54d1d345d079325d3180c5f0eb8f5d60f8a", "Title": "Operation Arachnophobia Caught In The Spider's Web", "Filename": "ThreatConnect_Operation_Arachnophobia_Report", "Source": "ThreatConnect", "Link": "https://app.box.com/s/d7pm2c1r4cx80tt1rctysd7452lo367v", "Year": "2014", "Date": "8/5/14"}, {"SHA-1": "73f54d632b5616db3a5977c1514640e19279c056", "Title": "Operation Poisoned Hurricane", "Filename": "Operation_Poisoned_Hurricane", "Source": "FireEye", "Link": "https://app.box.com/s/f74irgo6g47gr37urjypwcnetjj2ymie", "Year": "2014", "Date": "8/6/14"}, {"SHA-1": "63e36939c3f90c4ca9d492b03cf04d9f03a4ec2f", "Title": "The Epic Turla Operation: Solving Some Of The Mysteries Of Snake/Uroboros", "Filename": "KL_Epic_Turla_Technical_Appendix_20140806", "Source": "Kaspersky", "Link": "https://app.box.com/s/9rsegtgvnwe9n2lrk6ezxfv8mnpfhpk3", "Year": "2014", "Date": "8/7/14"}, {"SHA-1": "fe2f8d32688a104ca4e6ba595f647dfa479ece44", "Title": "A Look At Targeted Attacks Through The Lense Of An Ngo", "Filename": "Targeted_Attacks_Lense_NGO", "Source": "MPI-SWS, National Univ. of Singapore, Northeastern Univ.", "Link": "https://app.box.com/s/xxw2fbuju3mpoc5mzb8upyutaxxz0z6h", "Year": "2014", "Date": "8/13/14"}, {"SHA-1": "2bf418f3786cd274b9031a2297313f044054bdfd", "Title": "El Machete", "Filename": "El_Machete", "Source": "Kaspersky", "Link": "https://app.box.com/s/badlir1w3z6fowjb0xj9too0mf11ls4e", "Year": "2014", "Date": "8/20/14"}, {"SHA-1": "c264921f168c1cf344cd493d10aeebf92f80fb0c", "Title": "Nettraveler Apt Gets A Makeover For 10Th Birthday", "Filename": "NetTraveler_Makeover_10th_Birthday", "Source": "Kaspersky", "Link": "https://app.box.com/s/5p59z0cnoul885qx2hj1f85h00mk2ec5", "Year": "2014", "Date": "8/27/14"}, {"SHA-1": "194656e774aaacb86ae2c48f0c894e82ec68a833", "Title": "Profiling An Enigma: The Mystery Of North Korea's Cyber Threat Landscape", "Filename": "HPSR SecurityBriefing_Episode16_NorthKorea", "Source": "HP", "Link": "https://app.box.com/s/a6c2ljuyf6kzgx853khmhmrxk4toal8x", "Year": "2014", "Date": "8/27/14"}, {"SHA-1": "28c56a1e795cd404308274424d10edcc3e9b4339", "Title": "Scanbox: A Reconnaissance Framework Used With Watering Hole Attacks", "Filename": "Alienvault_Scanbox", "Source": "Alienvault", "Link": "https://app.box.com/s/vlbe0y40djeaadl2l4iqdm13cju3v3n6", "Year": "2014", "Date": "8/28/14"}, {"SHA-1": "543e0df8b308a9383f86d4314d93b5a2e718bd42", "Title": "Connecting The Dots: Syrian Malware Team Uses Blackworm For Attacks", "Filename": "Syrian_Malware_Team_BlackWorm", "Source": "FireEye", "Link": "https://app.box.com/s/5sir2hjd6rhi9a03nb5e4ykkx3s4l7d6", "Year": "2014", "Date": "8/29/14"}, {"SHA-1": "c24ba893644a149a1f05432c392a716251dca72f", "Title": "Darwin's Favorite Apt Group", "Filename": "Darwin_fav_APT_Group", "Source": "FireEye", "Link": "https://app.box.com/s/aj0b81yqt1fe6ufuklxuirvh8hawnnjb", "Year": "2014", "Date": "9/3/14"}, {"SHA-1": "b4c64e64f6309c0f424cdf0cdf449576f36cee16", "Title": "Forced To Adapt: Xslcmd Backdoor Now On Os X", "Filename": "XSLCmd_OSX", "Source": "FireEye", "Link": "https://app.box.com/s/fc2gc8m4ospivuhzjmj2vfc1l3sxc17j", "Year": "2014", "Date": "9/4/14"}, {"SHA-1": "850ce69b276f4726de382eabcffa8cb8d68cecfc", "Title": "Analysis Of Chinese Mitm On Google", "Filename": "Chinese_MITM_Google", "Source": "Netresec", "Link": "https://app.box.com/s/rpig9c10mj8wdri1ulftjxbabm543mxa", "Year": "2014", "Date": "9/4/14"}, {"SHA-1": "2cfbb7b89a5e220b21bbf64161dc880c1b644017", "Title": "When Governments Hack Opponents: A Look At Actors And Technology", "Filename": "sec14-paper-marczak", "Source": "Usenix Conference", "Link": "https://app.box.com/s/idaqxp9usqbtbo80vhemh66shyvavagu", "Year": "2014", "Date": "9/8/14"}, {"SHA-1": "7aa450d7e2b43175590a1ee2c94f5342152cfc56", "Title": "Targeted Threat Index: Characterizing And Quantifying Politically-Motivated Targeted Malware", "Filename": "sec14-paper-hardy", "Source": "Usenix Conference", "Link": "https://app.box.com/s/flstb1aalkoeq5f0g4baemo9g1bclrd2", "Year": "2014", "Date": "9/8/14"}, {"SHA-1": "bf937bb2315901541521f00abce8d441d272da16", "Title": "Operation Quantum Entanglement", "Filename": "fireeye-operation-quantum-entanglement", "Source": "FireEye", "Link": "https://app.box.com/s/qvuhc7j8tle0a83z3iivsz3yz6aok3tv", "Year": "2014", "Date": "9/10/14"}, {"SHA-1": "5f17e7b886d2388ffc134157dd1b66aa65372b59", "Title": "Survival Of The Fittest: New York Times Attackers Evolve Quickly", "Filename": "NYTimes_Attackers_Evolve_Quickly", "Source": "FireEye", "Link": "https://app.box.com/s/fkg2mxeqpb2ivx9neyz6bseopy1dfg5p", "Year": "2014", "Date": "8/12/14"}, {"SHA-1": "f726486a5cc1e42d2030b07d56f87983814226c7", "Title": "Cosmicduke Cosmu With A Twist Of Miniduke", "Filename": "cosmicduke_whitepaper", "Source": "F-Secure", "Link": "https://app.box.com/s/b0mc62by5j96jg9l91t68mlq6roksbg2", "Year": "2014", "Date": "9/18/14"}, {"SHA-1": "7fc85f6c70527da8b2c4e6a32e1d4e18c007fcb6", "Title": "Recent Watering Hole Attacks Attributed To Apt Group Th3Bug Using Poison Ivy", "Filename": "th3bug_Watering_Hole_PoisonIvy", "Source": "Palo Alto", "Link": "https://app.box.com/s/4j0ajrkivoyxw0licxinxpkgrk1ep7b8", "Year": "2014", "Date": "9/19/14"}, {"SHA-1": "efd7b3a3a2bf6e3976411347dc9101fea70c9405", "Title": "Blackenergy & Quedagh: The Convergence Of Crimeware And Apt Attacks", "Filename": "blackenergy_whitepaper", "Source": "F-Secure", "Link": "https://app.box.com/s/ccj81xcg1xunuyjmnb3kt3ug77r16z7q", "Year": "2014", "Date": "9/26/14"}, {"SHA-1": "83adcb352168b2d345155cf4ec7bbc876bb89849", "Title": "Aided Frame, Aided Direction (Because It's A Redirect)", "Filename": "Aided_Frame_Aided_Direction", "Source": "FireEye", "Link": "https://app.box.com/s/c0vmfv396d3lej8g37mxbhjgbjen1m21", "Year": "2014", "Date": "9/26/14"}, {"SHA-1": "bc4cef4cabbcf83dbc1c72f736acb6207b260216", "Title": "New Indicators Of Compromise For Apt Group Nitro Uncovered", "Filename": "PAN_Nitro", "Source": "Palo Alto", "Link": "https://app.box.com/s/drb0p2idherjlxlwdqh0nharpt310s8u", "Year": "2014", "Date": "10/3/14"}, {"SHA-1": "9439561abc998b7f0f733142bc44f717b2615374", "Title": "Democracy In Hong Kong Under Attack", "Filename": "Democracy_HongKong_Under_Attack", "Source": "Volexity", "Link": "https://app.box.com/s/dvtxta3jtratjxlpr5rzwsqvqfetsn6z", "Year": "2014", "Date": "10/9/14"}, {"SHA-1": "d24ff42b2d02ba406d46f3912f1f7bd2d38b6113", "Title": "Zoxpng Analysis", "Filename": "ZoxPNG_Full_Analysis-Final", "Source": "Novetta", "Link": "https://app.box.com/s/8wxap100crzcd96a05ajsj9vodpjauau", "Year": "2014", "Date": "10/14/14"}, {"SHA-1": "cccc6053fa78cef9f8a28efdaa07c8cfa6a73cc2", "Title": "Russian Cyber Espionage Campaign - Sandworm Team", "Filename": "Sandworm_briefing2", "Source": "iSight Partners", "Link": "https://app.box.com/s/k0vbq8vx0z8qg3s4ycit1kc99cg5ay27", "Year": "2014", "Date": "10/14/14"}, {"SHA-1": "5c4415913a16a0331600816bb4cf8a1954e743dd", "Title": "Hikit Analysis", "Filename": "Hikit_Analysis-Final", "Source": "Novetta", "Link": "https://app.box.com/s/k1zaybbj4ickaq5u0flu9bpmtp8a1e5k", "Year": "2014", "Date": "10/14/14"}, {"SHA-1": "20dd2aaae24812d78cd1c5e32c68b7998e00e0ca", "Title": "Threat Spotlight: Group 72", "Filename": "Group_72", "Source": "Cisco", "Link": "https://app.box.com/s/mtk3zeae1823kz2hv3f7z6pgjgwxlkyl", "Year": "2014", "Date": "10/14/14"}, {"SHA-1": "13a055fe7be7e55dcce0035eaf1990fbe8406c98", "Title": "Orcarat - A Whale Of A Tale", "Filename": "OrcaRAT", "Source": "PWC", "Link": "https://app.box.com/s/r3qo159trv793oeqdgsv99swjsxzq8pw", "Year": "2014", "Date": "10/20/14"}, {"SHA-1": "643c7e975121b4614156fc4f29de09b4fd1f0026", "Title": "Tactical Intelligence Bulletin Sofacy Phishing", "Filename": "tactical-intelligence-bulletin---sofacy-phishing-", "Source": "PWC", "Link": "https://app.box.com/s/th78b3w9bhr1cpdtn9gmmm9v7j2vuq47", "Year": "2014", "Date": "10/22/14"}, {"SHA-1": "4ff4b93665664603623bc7001e3ca961b8b78b9f", "Title": "Operation Pawn Storm Using Decoys To Evade Detection", "Filename": "wp-operation-pawn-storm", "Source": "Trend Micro", "Link": "https://app.box.com/s/t2flymgu0ct5s3z487oedaq8dycsge77", "Year": "2014", "Date": "10/23/14"}, {"SHA-1": "c0708a3efcf32d02cfb5348f87fe140ae6f470e8", "Title": "Modified Binaries Tor", "Filename": "Modified_Binaries_Tor", "Source": "Joshua Pitts", "Link": "https://app.box.com/s/nj7stspq3veln8iebra2f5u1203i86eg", "Year": "2014", "Date": "10/23/14"}, {"SHA-1": "4bd6fa0c0a85f9041cecd54d722decdb4e817fe0", "Title": "Leouncia And Orcarat", "Filename": "LeoUncia_OrcaRat", "Source": "Airbus", "Link": "https://app.box.com/s/737gsokqbgsi9d6yenyob3kgafl8mrc4", "Year": "2014", "Date": "10/24/14"}, {"SHA-1": "c264d97adeb81f59b0642de9a782f6fe545ed062", "Title": "Scanbox Framework: Who's Affected, And Who's Using It?", "Filename": "pwc_ScanBox_framework", "Source": "PWC", "Link": "https://app.box.com/s/u273q9utje6wds8mtv17efskdu5oj8la", "Year": "2014", "Date": "10/27/14"}, {"SHA-1": "20fa586304cbbfaf23453c1bbe7033de398bd9fb", "Title": "Micro-Targeted Malvertising Via Real-Time Ad Bidding", "Filename": "Micro-Targeted-Malvertising-WP-10-27-14-1", "Source": "Invincea", "Link": "https://app.box.com/s/fy9ss400cv8irbkyrw7i72dc8xaf5xiv", "Year": "2014", "Date": "10/27/14"}, {"SHA-1": "50b165c213697facb2410591c3ddf772b95fc805", "Title": "Full Disclosure Of Havex Trojans", "Filename": "ICS_Havex_backdoors", "Source": "Netresec", "Link": "https://app.box.com/s/v76ozenghvxl8cnk7rcdw4dxsnsffz2g", "Year": "2014", "Date": "10/27/14"}, {"SHA-1": "116309e7121bc8b0e66e4166c06f7b818e1d3629", "Title": "Threat Spotlight: Group 72, Opening The Zxshell", "Filename": "Group72_Opening_ZxShell", "Source": "Cisco", "Link": "https://app.box.com/s/89uahki8m2ksfgc8pysjw6utcqjp4q9u", "Year": "2014", "Date": "10/28/14"}, {"SHA-1": "1d9b39654f8c7678b3e2c30e378b2e14021b5d44", "Title": "Apt28: A Window Into Russia's Cyber Espionage Operations", "Filename": "apt28", "Source": "FireEye", "Link": "https://app.box.com/s/2e7s0j3cuuswoplyvaqdz4kdudvvr7x7", "Year": "2014", "Date": "10/28/14"}, {"SHA-1": "23f0de5e628eccdfc670412485653f3662ab5594", "Title": "The Rotten Tomato Campaign", "Filename": "sophos-rotten-tomato-campaign", "Source": "Sophos", "Link": "https://app.box.com/s/ngqr8jevmhlypff49eju70nhxzfy26bh", "Year": "2014", "Date": "10/30/14"}, {"SHA-1": "85fcdce7427c13906658f1835acaef7103c22ad3", "Title": "Operation Toohash How Targeted Attacks Work ", "Filename": "GDATA_TooHash_CaseStudy_102014_EN_v1", "Source": "Gdata", "Link": "https://app.box.com/s/11ozmt3fr8pucuo08gnotg6ab22ka7pp", "Year": "2014", "Date": "10/31/14"}, {"SHA-1": "40674e70c595d30f19b2c2636ed7d9dc6b146e8e", "Title": "Operation Poisoned Handover: Unveiling Ties Between Apt Activity In Hong Kong's Pro-Democracy Movement", "Filename": "Operation_Poisoned_Handover", "Source": "FireEye", "Link": "https://app.box.com/s/4ld2qhui8rs1slmh76mzj9vaum353mk8", "Year": "2014", "Date": "11/3/14"}, {"SHA-1": "15daf73d022246964c2938a889361aba40e7d08b", "Title": "Be2 Custom Plugins, Router Abuse, And Target Profiles", "Filename": "BlackEnergy2_Plugins_Router", "Source": "Kaspersky", "Link": "https://app.box.com/s/0aem5xn8owa5hpsjxuqbyloielln6oyh", "Year": "2014", "Date": "11/3/14"}, {"SHA-1": "abddcfeac71a991c480810c82d7e972c74251329", "Title": "Darkhotel Indicators Of Compromise", "Filename": "darkhotelappendixindicators_kl", "Source": "Kaspersky", "Link": "https://app.box.com/s/r97cjt70ywsd7pnrstr7buqzxn5svfw1", "Year": "2014", "Date": "11/10/14"}, {"SHA-1": "dfd64e9a601283c76ae3f28875166695dc354a21", "Title": "The Darkhotel Apt A Story Of Unusual Hospitality", "Filename": "darkhotel_kl_07.11", "Source": "Kaspersky", "Link": "https://app.box.com/s/rqk4up23y49pe1zalfmstkj4zb1dxbja", "Year": "2014", "Date": "11/10/14"}, {"SHA-1": "96173322b936132aa4cdc0328e4a247d40ae5152", "Title": "The Uroburos Case: New Sophisticated Rat Identified", "Filename": "The_Uroburos_case", "Source": "Gdata", "Link": "https://app.box.com/s/sg4cyodukt7edmmba6bfikuiu1jgzv59", "Year": "2014", "Date": "11/11/14"}, {"SHA-1": "b336dd349c5b4620f04d98b90282c7ae900a3a42", "Title": "Korplug Military Targeted Attacks: Afghanistan & Tajikistan", "Filename": "Korplug_Afghanistan_Tajikistan", "Source": "ESET", "Link": "https://app.box.com/s/jih94kv82ucn12fdne8tsijvwn06cf4p", "Year": "2014", "Date": "11/12/14"}, {"SHA-1": "a4520f8f85d13aa469ff3e1b6d333e4c9a290e7a", "Title": "Operation Cloudyomega: Ichitaro Zero-Day And Ongoing Cyberespionage Campaign Targeting Japan", "Filename": "Operation_CloudyOmega_Ichitaro", "Source": "Symantec", "Link": "https://app.box.com/s/61pv7a2qufqbm3dhargkrsqjjzgswxba", "Year": "2014", "Date": "11/13/14"}, {"SHA-1": "9d116269da44e22cc6f1496570bb4d56f7cc277b", "Title": "Roaming Tiger", "Filename": "roaming_tiger_zeronights_2014", "Source": "ESET", "Link": "https://app.box.com/s/1q4787ruef22tvkgc7h82j6ib6qpc8v0", "Year": "2014", "Date": "11/14/14"}, {"SHA-1": "c50a95070633ecc76898b9f16ded848414747156", "Title": "Onionduke: Apt Attacks Via The Tor Network - F-Secure Weblog : News From The Lab", "Filename": "OnionDuke_Tor", "Source": "F-Secure", "Link": "https://app.box.com/s/vpr6m62odv8f7tz59xisqrba9khg4rhi", "Year": "2014", "Date": "11/14/14"}, {"SHA-1": "d246e3075bbd31f04b2a6efb53ad7d9e9faa0e96", "Title": "Derusbi (Server Variant) Analysis", "Filename": "Derusbi_Server_Analysis-Final", "Source": "Novetta", "Link": "https://app.box.com/s/t3h83k7pfdyzoi3hrhfl7k5o33sk1fwk", "Year": "2014", "Date": "11/14/14"}, {"SHA-1": "814556f1a03e93364f4dc54555cb27549288e061", "Title": "Evil Bunny: Suspect #4", "Filename": "EvilBunny_Suspect4_v1.0", "Source": "Marion Marschalek", "Link": "https://app.box.com/s/xvilsesi5qd2gh6so2g3tnric51ndv57", "Year": "2014", "Date": "11/20/14"}, {"SHA-1": "e8fcb14805853185b36093119094085f0f7f86a2", "Title": "Operation Double Tap", "Filename": "OperationDoubleTap", "Source": "FireEye", "Link": "https://app.box.com/s/30f8215m5iow438k6gpjuxyvlsid7oom", "Year": "2014", "Date": "11/21/14"}, {"SHA-1": "40f76477ba1f453b341743b53113ebd705c1bb75", "Title": "Regin: Top-Tier Espionage Tool Enables Stealthy Surveillance", "Filename": "regin-analysis", "Source": "Symantec", "Link": "https://app.box.com/s/at56dm7anwlk35y4cp4ung9qwgiz6bn1", "Year": "2014", "Date": "11/23/14"}, {"SHA-1": "50be553c398b512ddd9741a0ab0350dccd600a3b", "Title": "Secret Malware In European Union Attack Linked To U.S. And British Intelligence", "Filename": "Regis_The_Intercept", "Source": "The Intercept", "Link": "https://app.box.com/s/qpegircfwykf835shpflarf87ah2438x", "Year": "2014", "Date": "11/24/14"}, {"SHA-1": "5bbf6a633076473dc4b2afb6d166c8caa84463e4", "Title": "The Regin Platform Nation-State Ownership Of Gsm Networks", "Filename": "Kaspersky_Lab_whitepaper_Regin_platform_eng", "Source": "Kaspersky", "Link": "https://app.box.com/s/q23ruuvmn5mgq1dc0w3kggl6ek1pn4nz", "Year": "2014", "Date": "11/24/14"}, {"SHA-1": "02be2ef6587e940656cde835354d0073c4dce232", "Title": "I Am Ironman: Deep Panda Uses Sakula Malware To Target Organizations In Multiple Sectors", "Filename": "DEEP_PANDA_Sakula", "Source": "Crowdstrike", "Link": "https://app.box.com/s/4dfaheem1io3i71o51rf4lfo2ivotuol", "Year": "2014", "Date": "11/24/14"}, {"SHA-1": "e5e09d247f5d25d7c960a3ef3231cef9d59a2b61", "Title": "Hacking The Street? Fin4 Likely Playing The Market", "Filename": "rpt-fin4", "Source": "FireEye", "Link": "https://app.box.com/s/56mtum85h5pznvw9r4x6yh5qivb7vgql", "Year": "2014", "Date": "12/1/14"}, {"SHA-1": "114d677bac083a956038f44abec2bf2a59e1e080", "Title": "Operation Cleaver: The Notepad Files", "Filename": "OperationCleaver_The_Notepad_Files", "Source": "Cylance", "Link": "https://app.box.com/s/vsret8sjx5qd6xaxzv0rxdw4pocdmjll", "Year": "2014", "Date": "12/3/14"}, {"SHA-1": "dc20be49cbcecaf38bde2105a54580eb96605c25", "Title": "The 'Penquin' Turla", "Filename": "Turla_2_Penquin", "Source": "Kaspersky", "Link": "https://app.box.com/s/5gfajyyz8firhnttdo72j0iz6uo4eo6q", "Year": "2014", "Date": "12/8/14"}, {"SHA-1": "975c44773b456562f9ab5f9986c2102a21b618bd", "Title": "The Inception Framework: Cloud-Hosted Apt", "Filename": "bcs_wp_InceptionReport_EN_v12914", "Source": "Bluecoat", "Link": "https://app.box.com/s/vny8b4ubmxo421amxtk8tvk4b9x1vz52", "Year": "2014", "Date": "12/9/14"}, {"SHA-1": "c5355707644b6948069345e2e8bac429e39f882d", "Title": "W64/Regin, Stage #1", "Filename": "w64_regin_stage_1", "Source": "F-Secure", "Link": "https://app.box.com/s/2ifpyh8kjoxsvrj9dnqfxfrb2go1pu3a", "Year": "2014", "Date": "12/10/14"}, {"SHA-1": "62d5fdb316ad5b0c5e3afb5919785df4c557f25b", "Title": "W32/Regin, Stage #1", "Filename": "w32_regin_stage_1", "Source": "F-Secure", "Link": "https://app.box.com/s/358saagkwt3gqy6w62ed6xo33w175r0y", "Year": "2014", "Date": "12/10/14"}, {"SHA-1": "fefd7ff6b2b254bd2e05784b51758c5d90acc06f", "Title": "Vulnerability, Malicious Code Appeared In The Mbr Destruction Function Using Hangul File", "Filename": "korea_power_plant_wiper", "Source": "AhnLab", "Link": "https://app.box.com/s/q8gx5wedudaui491qn6i4d7dxsnmuyla", "Year": "2014", "Date": "12/10/14"}, {"SHA-1": "a9970d82d1b539ee63838619fcb9aaaae5f0c51d", "Title": "Cloud Atlas: Redoctober Apt Is Back In Style", "Filename": "CloudAtlas_RedOctober_APT", "Source": "Kaspersky", "Link": "https://app.box.com/s/pyjpzua55mu6j1my5jegdiiovmpx35yi", "Year": "2014", "Date": "12/10/14"}, {"SHA-1": "ae90917c7abe0c38ae289be9589f04c6fa7184c0", "Title": "Vinself Now With Steganography", "Filename": "Vinself_steganography", "Source": "Airbus", "Link": "https://app.box.com/s/uy1tzn58yjoarnrftgs9d8ieucwf4029", "Year": "2014", "Date": "12/12/14"}, {"SHA-1": "92f526d9a5e14080fdbec90ba2385617bbf19a10", "Title": "Bots, Machines, And The Matrix", "Filename": "FTA_1014_Bots_Machines_and_the_Matrix", "Source": "Fidelis", "Link": "https://app.box.com/s/91ckw3z2lh26ylhxbjbjirjuyv5oslul", "Year": "2014", "Date": "12/12/14"}, {"SHA-1": "f7db20ae4b3f4784a3b4ac346424872858370a18", "Title": "Wiper Malware _ A Detection Deep Dive", "Filename": "Wiper_Malware", "Source": "Cisco", "Link": "https://app.box.com/s/efz1qmraxgqzenl5mzyeqtrh8kg1nktb", "Year": "2014", "Date": "12/17/14"}, {"SHA-1": "d0f24df94063d28e13c08fd2aeb9522034da3dea", "Title": "Malware Attack Targeting Syrian Isis Critics", "Filename": "Targeting_Syrian_ISIS_Critics", "Source": "Citizen Lab, Cyber Arabs", "Link": "https://app.box.com/s/bnq1jfzfmvflkui8zw06fkp9c0x5dgxq", "Year": "2014", "Date": "12/18/14"}, {"SHA-1": "0e575c64a7603a1709b1ae37e286f420128d2096", "Title": "Alert (Ta14-353A) Targeted Destructive Malware", "Filename": "TA14-353A_wiper", "Source": "US-CERT", "Link": "https://app.box.com/s/lldbbamo2r9d59jf9ztlif93d6o2p2uw", "Year": "2014", "Date": "12/19/14"}, {"SHA-1": "1a4508469960b248ba713cecf34653c59fd460f1", "Title": "Operation Poisoned Helmand", "Filename": "operation-poisoned-helmand", "Source": "ThreatConnect", "Link": "https://app.box.com/s/emf5ke7j5q12sku7vvvb0c1hbk70fygb", "Year": "2014", "Date": "12/21/14"}, {"SHA-1": "c1b7c2bec86e8edf8bba650c6fa506319198e3c3", "Title": "Anunak: Apt Against Financial Institutions", "Filename": "Anunak_APT_against_financial_institutions", "Source": "Group-IB, FOX-IT", "Link": "https://app.box.com/s/exmsfcvad1sjqtmvtzbiil9k52js62ir", "Year": "2014", "Date": "12/22/14"}, {"SHA-1": "1d53861aafea11d9a60e798b90d623c8e7c7b9e7", "Title": "Deep Panda", "Filename": "AdversaryIntelligenceReport_DeepPanda_0 (1)", "Source": "Crowdstrike", "Link": "https://app.box.com/s/6po2pgedkjf4br5p7tm51go7p5g3z6g3", "Year": "2014", "Date": "X"}, {"SHA-1": "28f35f4b95e66030cf2a330bae394bbf8805b34f", "Title": "Skeleton Key Malware Analysis", "Filename": "Skeleton_Key_Analysis", "Source": "Dell Secureworks", "Link": "https://app.box.com/s/elb9hgj4rvcajilnlh67kpgoskjqjra0", "Year": "2015", "Date": "1/12/15"}, {"SHA-1": "2aa6e47d8b9549b8ca2ea62db6384bb4db682bcf", "Title": "Insight In To A Strategic Web Compromise And Attack Campaign Against Hong Kong Infrastructure", "Filename": "DTL-12012015-01", "Source": "Dragon Threat Labs", "Link": "https://app.box.com/s/9bt05cgrk8vbmylm5odno0k85s39kny0", "Year": "2015", "Date": "1/12/15"}, {"SHA-1": "cde02057689886c29438815cbeed8ebe860a0ab2", "Title": "Evolution Of Sophisticated Spyware: From Agent.Btz To Comrat", "Filename": "Agent.BTZ_to_ComRAT", "Source": "Gdata", "Link": "https://app.box.com/s/gqksdtk0gogqzzzbg2w6b4y7fej6f26t", "Year": "2015", "Date": "1/15/15"}, {"SHA-1": "6df16b7ff93a44fcbec3b656645631b864175bcf", "Title": "Analysis Of Project Cobra", "Filename": "Project_Cobra_Analysis", "Source": "Gdata", "Link": "https://app.box.com/s/vuxbnmnptzygbuxkqbaq90vgm35hpcdv", "Year": "2015", "Date": "1/20/15"}, {"SHA-1": "486a65ba17141147d3d9fff2a0c26109edf78fab", "Title": "Reversing The Inception APT Malware", "Filename": "Inception_APT_Analysis_Bluecoat", "Source": "Bluecoat", "Link": "https://app.box.com/s/sctzfr6aoagpzb9aoajcodvn6we7e055", "Year": "2015", "Date": "1/20/15"}, {"SHA-1": "d6b2e4dba3b801252a62e0dade5c8ab71d2eefb1", "Title": "The Waterbug Attack Group", "Filename": "waterbug-attack-group", "Source": "Symantec", "Link": "https://app.box.com/s/nrf432kfdk6kadkvbclgykekocn4pzzu", "Year": "2015", "Date": "1/22/15"}, {"SHA-1": "247676579b83264faf32e171f9187bbdbb057c7f", "Title": "Scarab Attackers Took Aim At Select Russian Targets Since 2012", "Filename": "Scarab_Russian", "Source": "Symantec", "Link": "https://app.box.com/s/pkoancu0b09aifvm2qfu6tdl8w0l5dqz", "Year": "2015", "Date": "1/22/15"}, {"SHA-1": "630eea3f1bc9158570c53d70fc70b31003305f5c", "Title": "An Analysis Of Regin's Hopscotch And Legspin", "Filename": "Regin_Hopscotch_Legspin", "Source": "Kaspersky", "Link": "https://app.box.com/s/yezsypczjmt973gpcqfqh5yf9po4zr3c", "Year": "2015", "Date": "1/22/15"}, {"SHA-1": "d2e17e228e02df878f807b112f78afdc13cc6bca", "Title": "Analysis Of A Recent Plugx Variant - P2P Plugx", "Filename": "P2P_PlugX_Analysis", "Source": "JPCERT", "Link": "https://app.box.com/s/outg1oalwwfvd86eopmgv2pskekzmr4t", "Year": "2015", "Date": "1/29/15"}, {"SHA-1": "c9a33400ab60741ff0c77a9829f3e04cfe39f2d2", "Title": "Backdoor.Winnti Attackers Have A Skeleton In Their Closet?", "Filename": "Backdoor.Winnti_Trojan.Skelky", "Source": "Symantec", "Link": "https://app.box.com/s/89pqnoimwdkrmyhxwqj5pp17jtjm4lmc", "Year": "2015", "Date": "1/29/15"}, {"SHA-1": "4751fe686fb4e305ef49296f46ac33139114232b", "Title": "Behind The Syrian Conflict's Digital Front Lines", "Filename": "rpt-behind-the-syria-conflict", "Source": "FireEye", "Link": "https://app.box.com/s/qriikjn5436zpiyazh8ta7gbzbd04onf", "Year": "2015", "Date": "2/2/15"}, {"SHA-1": "4e645016b3627272cceb28a3b8bbba536eb9a6b4", "Title": "Pawn Storm Update: Ios Espionage App Found", "Filename": "PawnStorm_iOS", "Source": "Trend Micro", "Link": "https://app.box.com/s/9b7dfetwel6ywbcfai2wa0ja20cym721", "Year": "2015", "Date": "2/4/15"}, {"SHA-1": "86f4a308b99a2a9cb335dc06457dd09399c05a29", "Title": "Global Threat Intel Report", "Filename": "GlobalThreatIntelReport", "Source": "Crowdstrike", "Link": "https://app.box.com/s/xbbiyzpb3614bdaxuu3rs96n7f4ysppa", "Year": "2015", "Date": "2/10/15"}, {"SHA-1": "9134d57a818f98608a53b53dcfb520716d9eb1c3", "Title": "Operation Arid Viper: Bypassing The Iron Dome", "Filename": "operation-arid-viper-whitepaper-en", "Source": "Trend Micro", "Link": "https://app.box.com/s/uqh30535vxopnp0achnlcemu2034aa26", "Year": "2015", "Date": "2/16/15"}, {"SHA-1": "41aa5bd1ed03d80650a89de3649d051f900b958b", "Title": "Equation Group: Questions And Answers", "Filename": "Equation_group_questions_and_answers", "Source": "Kaspersky", "Link": "https://app.box.com/s/reidof9i3qnjdq4t0k49o392g8r98tbt", "Year": "2015", "Date": "2/16/15"}, {"SHA-1": "99af231600ee8fd83b4b4fb057429e60cd9d21c4", "Title": "Carbanak APT The Great Bank Robbery", "Filename": "Carbanak_APT_eng", "Source": "Kaspersky", "Link": "https://app.box.com/s/p7qzcury97tuwk26694uutujwqmwqyhe", "Year": "2015", "Date": "2/16/15"}, {"SHA-1": "0f4d8ba248dde47b514161014a57885aed084ce2", "Title": "The Desert Falcons Targeted Attacks", "Filename": "The-Desert-Falcons-targeted-attacks", "Source": "Kaspersky", "Link": "https://app.box.com/s/y45wyjrr4tnz2jlt93pk6giurxpg7ue7", "Year": "2015", "Date": "2/17/15"}, {"SHA-1": "c8f384ae75119626032d4b42f34e883269dbf2a4", "Title": "Shooting Elephants", "Filename": "Elephantosis", "Source": "Netzpolitik", "Link": "https://app.box.com/s/qog0dtpldhebhlasl12z3j82e0uv8t26", "Year": "2015", "Date": "2/18/15"}, {"SHA-1": "c73cbb8fa22e16920e3cbf51226f3fd8010d38bb", "Title": "Scanbox Ii", "Filename": "cto-tib-20150223-01a", "Source": "PWC", "Link": "https://app.box.com/s/o83u5pekus9251w0cl5lo2m1k5u0u2vn", "Year": "2015", "Date": "2/24/15"}, {"SHA-1": "7c69db91f21ee20f7abcb4d95f21c4a17bfa6d17", "Title": "Southeast Asia: An Evolving Cyber Threat Landscape ", "Filename": "rpt-southeast-asia-threat-landscape", "Source": "FireEye, Singtel", "Link": "https://app.box.com/s/h8kx7u7euolv1d6kjup0bxoujjikcbil", "Year": "2015", "Date": "2/25/15"}, {"SHA-1": "fc1d350810c19c94b1f3642fa08f50bf914ab821", "Title": "Plugx Goes To The Registry (And India)", "Filename": "plugx-goes-to-the-registry-and-india", "Source": "Sophos", "Link": "https://app.box.com/s/jfuf6eo3az72qrvh6ueke42ft9f23ztz", "Year": "2015", "Date": "2/25/15"}, {"SHA-1": "40559d68f1a3d25639408209de18d8ee395ae08a", "Title": "The Anthem Hack: All Roads Lead To China", "Filename": "Anthem_hack_all_roads_lead_to_China", "Source": "ThreatConnect", "Link": "https://app.box.com/s/7rzfjpwud8blv668j1kxa7qmhcadn6pr", "Year": "2015", "Date": "2/27/15"}, {"SHA-1": "d17fdf8935e094b2a34cde539abc85eec3533941", "Title": "Tibetan Uprising Day Malware Attacks", "Filename": "Tibetan-Uprising-Day-Malware-Attacks_websitepdf", "Source": "Citizen Lab", "Link": "https://app.box.com/s/43vz10qmcubl6d3cCVEzh2ahb9rbmyyj", "Year": "2015", "Date": "3/10/15"}, {"SHA-1": "a9a89dbd99ed439abcfced111affc69f9728fc7a", "Title": "Inside The Equationdrug Espionage Platform", "Filename": "Inside_EquationDrug_Espionage_Platform", "Source": "Kaspersky", "Link": "https://app.box.com/s/vdy6lfmpvu6gzglsc3d7sade6tp9gi7e", "Year": "2015", "Date": "3/11/15"}, {"SHA-1": "73a8169eff8f50cefe587c1097d67fb45e71a046", "Title": "Operation Woolen-Goldfish When Kittens Go Phishing", "Filename": "wp-operation-woolen-goldfish", "Source": "Trend Micro", "Link": "https://app.box.com/s/pqe4y802utfswg27g3jeyaup46zje5b0", "Year": "2015", "Date": "3/19/15"}, {"SHA-1": "7cd5b12fa38705e254296133991410754f1678ab", "Title": "Volatile Cedar Threat Intelligence And Research", "Filename": "volatile-cedar-technical-report", "Source": "Checkpoint", "Link": "https://app.box.com/s/jgl1n5xvzu3kp7aoi3cd9r407kjfzjcc", "Year": "2015", "Date": "3/31/15"}, {"SHA-1": "f2755e9e4e380e2a8357916862e145965c6e7365", "Title": "RSA Incident Response: An APT Case Study", "Filename": "RSA-IR-Case-Study(Apr-8-15)", "Source": "RSA", "Link": "https://app.box.com/s/tjoi82cp4iq6xx561qcu3xjr2rmfgmo1", "Year": "2015", "Date": "4/8/15"}, {"SHA-1": "1b83984e2c9515c59885bc0078e3b1bed5d513b2", "Title": "APT30 And The Mechanics Of A Long-Running Cyber Espionage Operation", "Filename": "rpt-apt30", "Source": "FireEye", "Link": "https://app.box.com/s/5jjomo7k001inllirt5lj83lu92ath7d", "Year": "2015", "Date": "4/12/15"}, {"SHA-1": "3991aeb7aa51f81e0742f06b833b055aae662bf9", "Title": "The Chronicles Of The Hellsing APT: The Empire Strikes Back", "Filename": "The Chronicles of the Hellsing APT_ the Empire Strikes Back - Securelist", "Source": "Kaspersky", "Link": "https://app.box.com/s/ob16ltqxv6urff6z1ore9i6t4308cxy6", "Year": "2015", "Date": "4/15/15"}, {"SHA-1": "5b22b494cfe329c352948530cb19b6dc5067ca44", "Title": "Hellsing Indicators Of Compromise", "Filename": "Indicators_of_Compormise_Hellsing", "Source": "Kaspersky", "Link": "https://app.box.com/s/ralrn76f32axakdv2fdl4kwtxqxvwee8", "Year": "2015", "Date": "4/15/15"}, {"SHA-1": "3bd10169fc704a20a702c3fc61633d68843f195c", "Title": "Operation Russiandoll: Adobe & Windows ZeroDay Exploits Likely leveraged By Russia's APT28", "Filename": "Operation RussianDoll", "Source": "FireEye", "Link": "https://app.box.com/s/oj4sr8vifeb03qe51newafin81tu8poy", "Year": "2015", "Date": "4/18/15"}, {"SHA-1": "417a791693f2554ee1ec94564467168ea58e2cfb", "Title": "Sofacy II_ Same Sofacy, Different Day", "Filename": "cto-tib-20150420-01a", "Source": "PWC", "Link": "https://app.box.com/s/dm3fbeb7hl95ilno014ftskoc1vi7n1r", "Year": "2015", "Date": "4/20/15"}, {"SHA-1": "46f4a7b1ec66e3aa1f6a93d64d9a4d3363621636", "Title": "The Cozyduke APT", "Filename": "The CozyDuke APT - Securelist", "Source": "Kaspersky", "Link": "https://app.box.com/s/8vksggruwwqzg7a4y7xrsrysrje56pqn", "Year": "2015", "Date": "4/21/15"}, {"SHA-1": "7f0cdde2b33261a9a35446bb2cb51c310539fa50", "Title": "Cozyduke", "Filename": "CozyDuke", "Source": "F-Secure", "Link": "https://app.box.com/s/wig4z9nwq6wjxf3i4aslu9qro14pgsbe", "Year": "2015", "Date": "4/22/15"}, {"SHA-1": "da36e8623013f441bc3dd841e695ceb1f03db496", "Title": "Operation Clandestine Wolf _ Adobe Flash Zero-Day In APT3 Phishing Campaign", "Filename": "OperationClandestineWolf", "Source": "FireEye", "Link": "https://app.box.com/s/vxnua4o5c8u12xl4r7e5zkndpw65wz0m", "Year": "2015", "Date": "4/26/15"}, {"SHA-1": "2babeca1ce5aff70f24684cd80ed45ef43ec9a17", "Title": "Attacks Against Israeli & Palestinian Interests", "Filename": "Attacks against Israeli & Palestinian interests - Cyber security updates", "Source": "PWC", "Link": "https://app.box.com/s/aaai5lu6q5wy0wp25m34oh383wmtg54m", "Year": "2015", "Date": "4/27/15"}, {"SHA-1": "b6aec94a79b7af64566cf734ef2a703c3d670e1c", "Title": "Targeted Attack on France's TV5Monde", "Filename": "Ahnlab_Targeted-Attack-on-Frances-TV5Monde(May-5-15)", "Source": "Ahnlab", "Link": "https://app.box.com/s/ightjgw5rkaldfpfel7q9v6p3pcqhqat", "Year": "2015", "Date": "5/5/15"}, {"SHA-1": "c478f5c474609cc5401648c0a55213f3a7137344", "Title": "Dissecting The Kraken", "Filename": "Dissecting-the-Kraken", "Source": "Gdata", "Link": "https://app.box.com/s/r5vy0kolgdxwwby2wjo523devdbt5leg", "Year": "2015", "Date": "5/7/15"}, {"SHA-1": "3bda90269f9a49360befe7f9a00f832c57af89c2", "Title": "APT28 Targets Financial Markets: Zero Day Hashes Released", "Filename": "FSOFACY", "Source": "root9b", "Link": "https://app.box.com/s/g55oxdd3q63hyngbjm4fbipfct94wrye", "Year": "2015", "Date": "5/10/15"}, {"SHA-1": "2c19d922bfa84a0205d9142124caaa51dc2021f5", "Title": "Cylance Spear Team: A Threat Actor Resurfaces", "Filename": "Cylance SPEAR Team_ A Threat Actor Resurfaces", "Source": "Cylance", "Link": "https://app.box.com/s/ma0qrrczbji4grvjbezpeugf3gru084x", "Year": "2015", "Date": "5/13/15"}, {"SHA-1": "93b3ec0cec9636d7815424be3030ae54c2eb79b5", "Title": "Operation Tropic Trooper: Relying On Tried-And-Tested Flaws To Infiltrate Secret Keepers", "Filename": "wp-operation-tropic-trooper", "Source": "Trend Micro", "Link": "https://app.box.com/s/h3xtomk798hufzzqxnhn2kjmvt6yrcxh", "Year": "2015", "Date": "5/14/15"}, {"SHA-1": "155c112f73a973ecf710fab5caa6434212275d81", "Title": "Cmstar Downloader: Lurid And Enfal's New Cousin", "Filename": "CmstarDownloader_Lurid_Enfal_Cousin", "Source": "Palo Alto", "Link": "https://app.box.com/s/67esnb1ppzsgyo3mm5es3zs8khtf3rpe", "Year": "2015", "Date": "5/18/15"}, {"SHA-1": "538701feeead706e34d24cf2b831071ac2f600cb", "Title": "Operation Oil Tanker: The Phantom Menace", "Filename": "oil-tanker-en", "Source": "Pandalabs", "Link": "https://app.box.com/s/xrwk7gqk44dp89fioubewttrw8a88im1", "Year": "2015", "Date": "5/19/15"}, {"SHA-1": "b91ed59b5aea02b712f1ea974fb4cf171ea8ba44", "Title": "The Msnmm Campaigns: The Earliest Naikon APT Campaigns", "Filename": "TheNaikonAPT-MsnMM2", "Source": "Kaspersky", "Link": "https://app.box.com/s/nbtyzfb5j5x9d2qznmj3bzcpa2e8kezj", "Year": "2015", "Date": "5/21/15"}, {"SHA-1": "198195bf91a009bdf666d630230d86b7b1d60bb9", "Title": "Dissecting Linux/Moose: The Analysis Of A Linux Router-Based Worm Hungry For Social Networks", "Filename": "Dissecting-LinuxMoose", "Source": "ESET", "Link": "https://app.box.com/s/38tsu5p4cc9kevuiiaxrptw3wrgksguk", "Year": "2015", "Date": "5/26/15"}, {"SHA-1": "42917d2bb4535fc6369cdd68bf82b7e7d28ebadf", "Title": "Analysis On APT-To-Be Attack That Focusing On China's Government Agency", "Filename": "ANALYSIS-ON-APT-TO-BE-ATTACK-THAT-FOCUSING-ON-CHINAS-GOVERNMENT-AGENCY-", "Source": "Antiy CERT", "Link": "https://app.box.com/s/zeacvn2ae7aunrlsfjm8kbt4nbf6yn0z", "Year": "2015", "Date": "5/27/15"}, {"SHA-1": "4855ba957702d0393cb7ade531b46625426d9192", "Title": "Grabit And The Rats", "Filename": "Grabit", "Source": "Kaspersky", "Link": "https://app.box.com/s/x7jlktifxatv3oam1altle8km1xwju7b", "Year": "2015", "Date": "5/28/15"}, {"SHA-1": "98e849a6be7fb956f5b17a183a2e00048f3bab25", "Title": "Oceanlotus", "Filename": "OceanLotusReport", "Source": "SkyEye", "Link": "https://app.box.com/s/fapwtkrudntz5po7c4u34l54j0vys9po", "Year": "2015", "Date": "5/29/15"}, {"SHA-1": "a0c391fec9b1faa80a0c713bd6aa37a7129adda7", "Title": "An Iranian Cyber-Attack Campaign Against Targets In The Middle East", "Filename": "Thamar-Reservoir", "Source": "Clearsky", "Link": "https://app.box.com/s/mf27ius5sdlorh8nl4h4fr643g2i9orb", "Year": "2015", "Date": "6/3/15"}, {"SHA-1": "fee0f49a312915de5c41ebdd1eaf8aefacde1eaf", "Title": "Blue Termite (Internet Watch)", "Filename": "BlueTermite_Japan", "Source": "Kaspersky", "Link": "https://app.box.com/s/0qhbl4o5adpf8fhdun7kp6cfz4ql3rdj", "Year": "2015", "Date": "6/4/15"}, {"SHA-1": "6c4fcf640dfbedbdddb724e69d0ed84319b0cf6e", "Title": "Duqu 2.0: A Comparison To Duqu ", "Filename": "duqu2_crysys", "Source": "CrySyS Lab", "Link": "https://app.box.com/s/yfoqrf6r0i0ih38pl0bmtud3ke0e6vhf", "Year": "2015", "Date": "6/10/15"}, {"SHA-1": "fe05831d3dc661e418f969045f0087ba642fb27b", "Title": "The Duqu 2.0 Technical Details", "Filename": "The_Mystery_of_Duqu_2_0_a_sophisticated_cyberespionage_actor_returns", "Source": "Kaspersky", "Link": "https://app.box.com/s/9bejel60h3doxinwxdfyhig5nsqz05ga", "Year": "2015", "Date": "6/11/15"}, {"SHA-1": "af489e7e52483efe28d8f20f15be5d1dbae62a55", "Title": "The Naikon APT: Tracking Down Geo-Political Intelligence Across APAC, One Nation At A Time", "Filename": "The Naikon APT - Securelist", "Source": "Kaspersky", "Link": "https://app.box.com/s/zuyuhxayshyuaypjoxfm0nu8d5tivqih", "Year": "2015", "Date": "6/15/15"}, {"SHA-1": "154083bd059ac6bb001e247f7e03d6189fa93362", "Title": "Target Attacks Against Tibetan And Hong Kong Groups Exploiting CVE-2014-4114 ", "Filename": "Targeted-Attacks-against-Tibetan-and-Hong-Kong-Groups-Exploiting-CVE-2014-4114", "Source": "Citizen Lab", "Link": "https://app.box.com/s/ma7v20ug1ij6dv1bxmb2qn69hgnr5nck", "Year": "2015", "Date": "6/15/15"}, {"SHA-1": "3bcbddd61cc7df02fad5bdc692e956bac590fe98", "Title": "Operation Lotusblossom", "Filename": "unit42-operation-lotus-blossom", "Source": "Palo Alto", "Link": "https://app.box.com/s/xhn6ru62qqom1kuxoe3mxnqrtb1sqw2q", "Year": "2015", "Date": "6/16/15"}, {"SHA-1": "8b870691f84547afc34c08c494f92a21f6d1dc3e", "Title": "Games Are Over: Winnti Is Now Targeting Pharmaceutical Companies", "Filename": "winnti_pharmaceutical", "Source": "Kaspersky", "Link": "https://app.box.com/s/f090ea4pi40hoaxe6otzfw7yl65ylw6y", "Year": "2015", "Date": "6/22/15"}, {"SHA-1": "5414153144f453be553af09c69bb1300c7678f79", "Title": "Unfin4Ished Business", "Filename": "UnFIN4ished_Business_pwd", "Source": "PWC", "Link": "https://app.box.com/s/7ep6vyqosrj2b26t6udv30jjdevkpv6f", "Year": "2015", "Date": "6/24/15"}, {"SHA-1": "fdf388b793a73c47a7caab35a5c4645c83c0931a", "Title": "Dino: The Latest Spying Malware From An Allegedly French Espionage Group Analyzed", "Filename": "ESET_Dino_French", "Source": "ESET", "Link": "https://app.box.com/s/wavmm2zrlt4n1jri8byn31b9fb1wo35i", "Year": "2015", "Date": "6/30/15"}, {"SHA-1": "a73fcc0ce6923f3a6ce537ec8214cb7b539fe343", "Title": "Wild Neutron _ Economic Espionage Threat Actor Returns With New Tricks", "Filename": "WildNeutron_Economic_espionage", "Source": "Kaspersky", "Link": "https://app.box.com/s/anoc1ews8p5jil4pewlafksf3d4oym5x", "Year": "2015", "Date": "7/8/15"}, {"SHA-1": "bf41e63f1493152c0d82f2b800099fc4170ea9f1", "Title": "Butterfly: Corporate Spies Out For Financial Gain", "Filename": "butterfly-corporate-spies-out-for-financial-gain", "Source": "Symantec", "Link": "https://app.box.com/s/e8hbsm0zsrjryz3suwvutn1zjfpugwak", "Year": "2015", "Date": "7/9/15"}, {"SHA-1": "006d625ab23c5f9d849608506c77d45afec4c720", "Title": "\"Forkmeiamfamous\": Seaduke, Latest Weapon In The Duke Armory", "Filename": "Forkmeiamfamous_SeaDuke", "Source": "Symantec", "Link": "https://app.box.com/s/kse3c1yd5gqku9e2nfmsny7gp99zlgu4", "Year": "2015", "Date": "7/13/15"}, {"SHA-1": "d2e6c0c6d2e8dc72677482b8b4271568a3b2a9b9", "Title": "Tracking Minidionis: Cozycar's New Ride Is Related To Seaduke", "Filename": "MiniDionis_CozyCar_Seaduke", "Source": "Palo Alto", "Link": "https://app.box.com/s/s29hmikrmmik5v7eumpb4tipkdlyqhjl", "Year": "2015", "Date": "7/14/15"}, {"SHA-1": "13feea5bb8a1f837e3772daf151e343086061f6a", "Title": "Watering Hole Attack On Aerospace Firm Exploits CVE-2015-5122 To Install Isspace Backdoor", "Filename": "WateringHole_Aerospace_CVE-2015-5122_IsSpace", "Source": "Palo Alto", "Link": "https://app.box.com/s/8izjpumhif40wt5jzbe6yej6j1sewt0b", "Year": "2015", "Date": "7/20/15"}, {"SHA-1": "4aa116bc762a0e2ac8ad635799c2a1acc49de6c4", "Title": "China Hacks The Peace Palace: All Your Eez's Are Belong To Us", "Filename": "China_Peace_Palace", "Source": "ThreatConnect", "Link": "https://app.box.com/s/yso9235awisw1dmjh8dyqpi5r9nokzcx", "Year": "2015", "Date": "7/20/15"}, {"SHA-1": "8ee4f88f4734adc592190027018a461471e8204a", "Title": "Duke APT Group's Latest Tools: Cloud Services And Linux Support", "Filename": "Duke_cloud_Linux", "Source": "F-Secure", "Link": "https://app.box.com/s/4oehib8xu2boak3hd72sh1f9ka9gwwh7", "Year": "2015", "Date": "7/22/15"}, {"SHA-1": "05763e7c36f1120b89cedba2c39ab4680b8ba28f", "Title": "Hammertoss: Stealthy Tactics Define A Russian Cyber Threat Group", "Filename": "apt29-hammertoss-stealthy-tactics-define-a", "Source": "FireEye", "Link": "https://app.box.com/s/xqp6s3fb8w65f6mkm1zc89ftrl8lyfw7", "Year": "2015", "Date": "7/27/15"}, {"SHA-1": "758520009778853bd186c8527b1cd73ee373ca36", "Title": "The Black Vine Cyberespionage Group", "Filename": "the-black-vine-cyberespionage-group", "Source": "Symantec", "Link": "https://app.box.com/s/0ahidgtzecyx94hgvxoai9kmu5r6yw49", "Year": "2015", "Date": "7/28/15"}, {"SHA-1": "18e19f0aa8caf36fbb424ab650f87bb192d3434a", "Title": "Operation Potao Express: Analysis Of A Cyber-Espionage Toolkit", "Filename": "Operation-Potao-Express_final_v2", "Source": "ESET", "Link": "https://app.box.com/s/hji6y2fi3nwqbd8mtx6kiy6yckizwq2w", "Year": "2015", "Date": "7/31/15"}, {"SHA-1": "e820638a0c4690636ebac596e0bbc040308aa040", "Title": "RSA Research Terracotta VPN: Enabler Of Advanced Threat Anonymity", "Filename": "Terracotta-VPN-Report-Final-8-3", "Source": "RSA", "Link": "https://app.box.com/s/cx1sjzb1q7slnjho5n1n0iuc7y9om2ll", "Year": "2015", "Date": "8/4/15"}, {"SHA-1": "060957bd034772155905e49648e869f2bfc0adfb", "Title": "Threat Group-3390 Targets Organizations For Cyberespionage", "Filename": "ThreatGroup-3390", "Source": "Dell Secureworks", "Link": "https://app.box.com/s/6j0fm3yepzf11engl7t213zltahujorc", "Year": "2015", "Date": "8/5/15"}, {"SHA-1": "c02195e501548fc9b8e2e13673a7e12e1af9e207", "Title": "THE DUKES: 7 years of Russian cyberespionage", "Filename": "F-Secure_TheDukes_whitepaper(9-17-15)", "Source": "F-Secure", "Link": "https://app.box.com/s/ipsg0t3krs811gesknvxrdsqhsknbydj", "Year": "2015", "Date": "9/17/15"}, {"SHA-1": "26840a8fbda17c1ae5bcb6198914ebf5e45308b2", "Title": "Pay No Attention to the Server Behind the Proxy: Mapping FinFisher's Continuing Proliferation", "Filename": "CitizenLab_Mapping-FinFishers-Continuing-Proliferation(Oct-15-15)", "Source": "Citizen Lab", "Link": "https://app.box.com/s/46ab2f2m26oaqu7r2kflfig8ni686gcl", "Year": "2015", "Date": "10/15/15"}, {"SHA-1": "523ae1be152df2a4d1de51ee2b3e7f23cad62628", "Title": "Rocket Kitten: A Campaign With 9 Lives", "Filename": "Checkpoint_rocket-kitten-report(Nov-9-2015)", "Source": "Checkpoint", "Link": "https://app.box.com/s/vhe51fr5m6kqqzbkkcuukta6nucn9p6a", "Year": "2015", "Date": "11/9/15"}, {"SHA-1": "666a7931d4fc2466852e0676e318391a23aec1d1", "Title": "Microsoft Security Intelligence Report (Volume 19)", "Filename": "Microsoft_Security_Intelligence_Report_Volume_19_English(11-16-2015)", "Source": "Microsoft", "Link": "https://app.box.com/s/qjvx7sdbo7cufb5b8putfyqn8ku82xq2", "Year": "2015", "Date": "11/16/15"}, {"SHA-1": "1d72a50b38ee4b5f57684726cef957f61ae6d2f2", "Title": "PEERING INTO GLASSRAT: A Zero Detection Trojan from China", "Filename": "RSA_Peering-Into-GlassRAT-final(Nov-23-15)", "Source": "RSA", "Link": "https://app.box.com/s/3jg797vagekvf1xjyz1j49esdhm4fmjs", "Year": "2015", "Date": "11/23/15"}, {"SHA-1": "80895c0883dfdaef757aba108e5b92fec65cf091", "Title": "Iran-based attackers use back door threats to spy on Middle Eastern targets", "Filename": "Symantec_Iran-based-attackers-use-back-door-threats-to-spy-on-Middle-Eastern-targets(Dec-7-2015)", "Source": "Symantec", "Link": "https://app.box.com/s/oeix6b4jcwdkwyrzq35brtmq2ktoyxnw", "Year": "2015", "Date": "12/7/15"}, {"SHA-1": "75c2325f529d34155445af6a82bb22ec4277a80f", "Title": "Evolution of Cyber Threats in the Corporate Sector", "Filename": "Kaspersky_Evolution-of-Cyber-Threats-in-the-Corporate-Sector(Dec-10-2015)", "Source": "Kaspersky", "Link": "https://app.box.com/s/ql84nxbrheluzhi3bt7k48damnuz00u5", "Year": "2015", "Date": "12/10/15"}, {"SHA-1": "e10651d3a6223055e95464f0023b549cdf7ca00c", "Title": "Dissecting the Malware Involved in the INOCNATION Campaign", "Filename": "Fidelis_FTA_1020_Fidelis_Inocnation_FINAL(Dec-16-15)", "Source": "Fidelis", "Link": "https://app.box.com/s/dl6izicyky1x946ueo77nn2w8c5jxgm3", "Year": "2015", "Date": "12/16/15"}, {"SHA-1": "e9de634545c873b0999728df361b28fae9536dc2", "Title": "BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger", "Filename": "PaloAlto_BBSRAT-Attacks-Targeting-Russian-Organizations-Linked-to-Roaming-Tiger(Dec-22-15)", "Source": "Palo Alto", "Link": "https://app.box.com/s/noqd4tec6z6nfv8w4z48vzvwfo3goegl", "Year": "2015", "Date": "12/22/15"}, {"SHA-1": "7baa3b39f072e82717aa554f3434863f7e9edd1f", "Title": "ELISE: Security Through Obesity", "Filename": "PWC_ELISE- Security-Through-Obesity(Dec-23-15)", "Source": "PWC", "Link": "https://app.box.com/s/xjjieg8w489osjfp4jk7vgum37a6ibro", "Year": "2015", "Date": "12/23/15"}, {"SHA-1": "8bcb1743d4a9ddbbc6daf063dca8c8107baed218", "Title": "BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry", "Filename": "ESET_BlackEnergy-by-the-SSHBearDoor(Jan-3-16)", "Source": "ESET", "Link": "https://app.box.com/s/uo31npu9sese34f1ppggmrug48x7rlqp", "Year": "2016", "Date": "1/3/16"}, {"SHA-1": "9b7bf2d6c4a10dac7483c618562e701f42c1dc32", "Title": "Operation Dusty Sky", "Filename": "Clearsky_Operation-DustySky_TLP_WHITE(Jan-7-2016)", "Source": "Clearsky", "Link": "https://app.box.com/s/cydpeasz6l8cv9oo99o4tpazd5tq4xkm", "Year": "2016", "Date": "1/7/16"}, {"SHA-1": "1acdc7b846d53b582075ea4a3c5ba64bbbf10e81", "Title": "Operation Dusty Sky (indicators)", "Filename": "Clearsky_Operation-DustySky-indicators(Jan-7-2016)", "Source": "Clearsky", "Link": "https://app.box.com/s/5iym3huegu3ssaejl0rr268sr7qy6seb", "Year": "2016", "Date": "1/7/16"}, {"SHA-1": "37584381a0a0c2d566b8ce13965ffa7226cdaa71", "Title": "Uncovering the Seven Pointed Dagger", "Filename": "Arbor_Uncovering-the-Seven-Pointed-Dagger(Jan-11-16)", "Source": "Arbor Networks", "Link": "https://app.box.com/s/z1uanuv1vn3vw5iket1r6bqrmlra0gpn", "Year": "2016", "Date": "1/11/16"}, {"SHA-1": "b0e8168b58ee221655df862460e305841c86f16c", "Title": "RESEARCH SPOTLIGHT: NEEDLES IN A HAYSTACK", "Filename": "Cisco_Needles-in-a-Haystack(Jan-14-16)", "Source": "Cisco", "Link": "https://app.box.com/s/6tlgwpp0u2lzahlrhtymkp2nnbtd421f", "Year": "2016", "Date": "1/14/16"}, {"SHA-1": "9a7bd4348f8ad97d5440d287b81382d47f71d954", "Title": "Scarlet Mimic", "Filename": "PaloAlto_Scarlet-Mimic(Jan-24-16)", "Source": "Palo Alto", "Link": "https://app.box.com/s/zhour42vz6sxf7aws3oj70i1rd5ib8kx", "Year": "2016", "Date": "1/24/16"}, {"SHA-1": "5780a1382be59719a980376feb783590e422b1aa", "Title": "BlackEnergy APT Attacks in Ukraine employ spearphishing with Word documents", "Filename": "Kaspersky_BlackEnergy-APT-Attacks-in-Ukraine-employ-spearphishing-with-Word-documents(Jan-28-16)", "Source": "Kaspersky", "Link": "https://app.box.com/s/igygz8ihex1hok5r1dp215ui0gz1ghwr", "Year": "2016", "Date": "1/28/16"}, {"SHA-1": "31c81ceafb1de9c731e7e003e3a638b9841a78e4", "Title": "Emissary Trojan Changelog: Did Operation Lotus Blossom Cause It To Evolve", "Filename": "PaloAlto_Emissary-Trojan-Changelog-Did-Operation-Lotus-Blossom-Cause-It-to-Evolve(Feb-03-16)", "Source": "Palo Alto", "Link": "https://app.box.com/s/oyqcfzoa1hfq5evuymj5bqfitkqlfp4v", "Year": "2016", "Date": "2/3/16"}, {"SHA-1": "62df4dd012589910b6be8df92f23e231c493772a", "Title": "T9000: Advanced Modular Backdoor Uses Complex Anti Analysis Techniques", "Filename": "PaloAlto_T9000-Advanced-Modular-Backdoor-Uses-Complex-Anti-Analysis-Techniques(Feb-04-16)", "Source": "Palo Alto", "Link": "https://app.box.com/s/u9eldsgol20dmuw0nljeqo9nlw4r9ms7", "Year": "2016", "Date": "2/4/16"}, {"SHA-1": "777fc2e7355924588a27d693cdfcc31bcf8ec76b", "Title": "Attack On French Diplomat Linked To Operation Lotus Blossom", "Filename": "PaloAlto_Attack-on-French-Diplomat-Linked-to-Operation-Lotus-Blossom(Feb-08-16)", "Source": "Palo Alto", "Link": "https://app.box.com/s/cbxo6pdyf8xua2eg5dn44ni47wbs0le0", "Year": "2016", "Date": "2/8/16"}, {"SHA-1": "3a2dc9b54f9c5047df5162590c51e51b3392e86c", "Title": "Poseidon Group", "Filename": "Kaspersky_Poseidon-Group(Feb-09-16)", "Source": "Kaspersky", "Link": "https://app.box.com/s/94ct7ny9breqnyhdwmcyv982w9qj2rxi", "Year": "2016", "Date": "2/9/16"}, {"SHA-1": "6b6c4552509612cec438d34e58908e166b005238", "Title": "A Look Into Fysbis: Sofacy's Linux Backdoor", "Filename": "PaloAlto_A-Look-Into-Fysbis-Sofacys-Linux-Backdoor(Feb-12-16)", "Source": "Palo Alto", "Link": "https://app.box.com/s/2x3mrik225skob8rxd50rp63wlq0fp6v", "Year": "2016", "Date": "2/12/16"}, {"SHA-1": "606f656561781dba6fdef666ece6a0cc24709f01", "Title": "Operation Duststorm", "Filename": "Cylance_Op_Dust_Storm_Report(Feb-23-2016)", "Source": "Cylance", "Link": "https://app.box.com/s/dt9mscechq7heg83z7vgujp5ujjzd97c", "Year": "2016", "Date": "2/23/16"}, {"SHA-1": "29d015e736a3012277f84f1b1bedc9bcac060648", "Title": "Operation Blockbuster", "Filename": "Novetta_Operation-Blockbuster-Report(Feb-24-2016)", "Source": "Novetta", "Link": "https://app.box.com/s/rhn69xecfqe8k2abwmn43ilmd59y1we0", "Year": "2016", "Date": "2/24/16"}, {"SHA-1": "5ec7109b992643aabb83ba6187230e3033699875", "Title": " FROM SEOUL TO SONY: THE HISTORY OF THE DARKSEOUL GROUP AND THE SONY INTRUSION MALWARE DESTOVER", "Filename": "Bluecoat_FROM_SEOUL_TO_SONY(2-24-16)", "Source": "Bluecoat", "Link": "https://app.box.com/s/xyyord0b806e6or2nh92coxw2areyyx4", "Year": "2016", "Date": "2/24/16"}, {"SHA-1": "f21f1f6da5cc09b6e5542606d66f2ecd68e45abc", "Title": "Operation Transparent Tribe", "Filename": "Proofpoint_operation-transparent-tribe-threat-insight-en(Mar-01-16)", "Source": "Proofpoint", "Link": "https://app.box.com/s/2terwf3c3e8iunw8v7kj83p2zw44nns2", "Year": "2016", "Date": "3/1/16"}, {"SHA-1": "e39432b344d29121ec4bcb658ef5292f2416a05a", "Title": "Shifting Tactics Tracking Changes In Years Long Espionage Campaign Against Tibetans", "Filename": "TheCitizenLab_Shifting-Tactics-Tracking-changes-in-years-long-espionage-campaign-against-Tibetans(Mar-10-16)", "Source": "Citizen Lab", "Link": "https://app.box.com/s/wb0vzmvsgude6yby0d5bn02cxebuuvhc", "Year": "2016", "Date": "3/10/16"}, {"SHA-1": "4ff503930f8fd317739ca0db9c81c7d636335597", "Title": "Suckfly: Revealing the secret life of your code signing certificates", "Filename": "Symantec_Suckfly-Revealing-the secret-life-of-your-code-signing-certificates(Mar-15-16)", "Source": "Symantec", "Link": "https://app.box.com/s/p3tmorslyk9q1s3s6eul4xa4148o6fp2", "Year": "2016", "Date": "3/15/16"}, {"SHA-1": "b039fa56126220d8df26a5ad6853a884bd76581e", "Title": "Taiwan Presidential Election: A Case Study on Thematic Targeting", "Filename": "PWC_Taiwan-Presidential-Election-A-Case-Study-on-Thematic-Targeting(Mar-17-2016)", "Source": "PWC", "Link": "https://app.box.com/s/lyradpx3h7eic3dyiz33ufiia0wj7otn", "Year": "2016", "Date": "3/17/16"}, {"SHA-1": "e7c914466713e7e74fcc1338398a1340464e63bc", "Title": "The Four Element Sword Engagement", "Filename": "Arbor_The-Four-Element-Sword-Engagement(4-13-16)", "Source": "Arbor", "Link": "https://app.box.com/s/19ghms2qz9raaquoxu2bh3paoqyx545r", "Year": "2016", "Date": "4/13/16"}, {"SHA-1": "bbe1b72cdd7e601d5f701b5e4a03a71b776fc7fa", "Title": "Between Hong Kong and Burma: Tracking UP007 and SLServer Espionage Campaign", "Filename": "TheCitizenLab_Between-Hong-Kong-and-Burma_Tracking-UP007-and-SLServer-Espionage-Campaigns(4-18-16)", "Source": "Citizen Lab", "Link": "https://app.box.com/s/goyec2m2zwl5fi4sv3ayzwhudcfly1lv", "Year": "2016", "Date": "4/18/16"}, {"SHA-1": "1b9a9fd865cc671ceef94c0ddcfbe8bb99fdc182", "Title": "Looking Into a Cyber-Attack Facilitator in the Netherlands", "Filename": "TrendMicro_NetherlandsCyberAttack(04-21-2016)", "Source": "Trend Micro", "Link": "https://app.box.com/s/ub5txv2ky12s7kuuv7d1vzqvkympepaq", "Year": "2016", "Date": "4/21/16"}, {"SHA-1": "25509ab2f9468a0a89bd62750b3549ab32d48b1a", "Title": "Looking Into a Cyber-Attack Facilitator in the Netherlands (Appendix)", "Filename": "TrendMicro_NetherlandsCyberAttack_Appendix(04-21-2016)", "Source": "Trend Micro", "Link": "https://app.box.com/s/1vjcdqrpcvtb5fqfehk3ehxj6qh8eaf0", "Year": "2016", "Date": "4/21/16"}, {"SHA-1": "ffe1ab81dc16f38930659c5ec9f6f8f9ebdf7d35", "Title": "PLATINUM Targeted attacks in South and Southeast Asia", "Filename": "Microsoft_Targeted-attacks-in-South-and-Southeast-Asia(Apr-26-16)", "Source": "Microsoft", "Link": "https://app.box.com/s/ursk78m124t1lagjnu2862kumrnoshcp", "Year": "2016", "Date": "4/26/16"}, {"SHA-1": "5ba6ec70bf70a31f8d61d408be83d3a999d9beee", "Title": "Turbo Twist: Two 64-bit Derusbi Strains Converge", "Filename": "Fidelis_Turbo-Twist-Two-64-bit-Derusbi-Strains-Converge(May-2-16)", "Source": "Fidelis", "Link": "https://app.box.com/s/ex6wh2qsg1c29sob6f70x1q6eoe3v64w", "Year": "2016", "Date": "5/2/16"}, {"SHA-1": "bd91ba55a44f3288be1483e8d160e2910e1eed21", "Title": "Prince of Persia: Infy Malware Active In Decade of Targeted Attacks", "Filename": "PaloAlto_PrinceofPersiaInfyMalware(05-02-2016)", "Source": "Palo Alto", "Link": "https://app.box.com/s/zkjmru7uknf1p90mqn81ycf867le78tn", "Year": "2016", "Date": "5/2/16"}, {"SHA-1": "2b7257511cc403a0a5f9d306663fbbe6c7c1c797", "Title": "Exploring CVE-2015-2545 and its users", "Filename": "PwC_Exploring_CVE-2015-2545(05-06-2016)", "Source": "PWC", "Link": "https://app.box.com/s/g9pew9ajkp259c2t99mh4xspsev61hgm", "Year": "2016", "Date": "5/6/16"}, {"SHA-1": "ffa66796bd7c7f077c31285e6563ccb522b7e9b1", "Title": "Mofang: A politically motivated information stealing adversary", "Filename": "Fox-IT_mofang_threatreport_tlp-white(05-17-2016)", "Source": "Fox-IT", "Link": "https://app.box.com/s/p2oftago51ohnku082ztx1kbvaa1lxps", "Year": "2016", "Date": "5/17/16"}, {"SHA-1": "5938181ed1aec8281f229581f38f37f78eb24821", "Title": "Operation Groundbait:Analysis of a surveillance toolkit", "Filename": "ESET_Operation-Groundbait(5-17-16)", "Source": "ESET", "Link": "https://app.box.com/s/hq5t0xjxxbkeulf942ufeiyf3k4zq9b6", "Year": "2016", "Date": "5/17/16"}, {"SHA-1": "fbf36d88f19b64802a9b1e31e7b8554b8e33be37", "Title": "Indian organizations targeted in Suckfly attacks", "Filename": "Symantec_Indian-organizations-targeted-in-Suckfly-attacks(5-17-16)", "Source": "Symantec", "Link": "https://app.box.com/s/nekeu5y0v2yk4rdwpuq8y1ahyyuaduen", "Year": "2016", "Date": "5/17/16"}, {"SHA-1": "d4203fd526a2ba2714bc19f62e24e8ef91806b1a", "Title": "Operation C-Major Actors Also Used Android BlackBerry Mobile Spyware Against Targets", "Filename": "TrendMicro_Operation-C-Major_blog(5-18-16)", "Source": "Trend Micro", "Link": "https://app.box.com/s/xua6557tccyx7h0ksmjnu8u5bra3z15n", "Year": "2016", "Date": "5/18/16"}, {"SHA-1": "66abb93ddb5a1e2dc75b1d8db5c97417200c3996", "Title": "Targeted Attacks against Banks in the Middle East", "Filename": "FireEye_Targeted-Attacks-against-Banks-in-the-Middle-East(5-23-16)", "Source": "FireEye", "Link": "https://app.box.com/s/43ovij7jz7isl93tow4s3f89yhuiwu4e", "Year": "2016", "Date": "5/23/16"}, {"SHA-1": "dbee63b0f8cd29139b4d12b867e3a80de139c0df", "Title": "APT Case RUAG Technical Report", "Filename": "GovCERTch_Report_Ruag_Espionage_Case(5-23-16)", "Source": "GovCERT.ch", "Link": "https://app.box.com/s/rabwkf8pmoxndj0n0nlktvc2eti2381k", "Year": "2016", "Date": "5/23/16"}, {"SHA-1": "2c09f13be3c035ec932d6c91366f61f7f1320f72", "Title": "Operation Ke3chang Resurfaces With New TidePool Malware", "Filename": "PaloAlto_ke3chang_tidepool(5-23-2016)", "Source": "Palo Alto", "Link": "https://app.box.com/s/vwuocstge7xud74xhnw9s98h2m812pyr", "Year": "2016", "Date": "5/23/16"}, {"SHA-1": "cfea29fab43ff53f7869542633891a89ead24a5f", "Title": "New Wekby Attacks Use DNS Requests As Command and Control Mechanism", "Filename": "PaloAlto_New- Wekby-Attacks-Use- DNS-Requests- As- Command-and- Control- Mechanism(5-24-16)", "Source": "Palo Alto", "Link": "https://app.box.com/s/5dcx9g1lrt3m9y2wgmxpyiv4malmdnpp", "Year": "2016", "Date": "5/24/16"}, {"SHA-1": "5f77c03a83f36e0f74a37efea8cc959613ee3d10", "Title": "CVE-2015-2545: overview of current threats", "Filename": "Kaspersky_CVE-2015-2545_overview-of-current-threats(5-25-16)", "Source": "Kaspersky", "Link": "https://app.box.com/s/ztb6a52hkbenfurrecc3jifk9b67ie79", "Year": "2016", "Date": "5/25/16"}, {"SHA-1": "d611ca60c87498c89b450dda0f06a3cffebe53ae", "Title": "IXESHE Derivative IHEATE Targets Users in America", "Filename": "TrendMicro_IXESHE_IHEATE(05-27-2016)", "Source": "Trend Micro", "Link": "https://app.box.com/s/8glps1qnq0glc2c2b2wsmeb4019f9wpd", "Year": "2016", "Date": "5/27/16"}, {"SHA-1": "6060d8839dc4054fd3d57b2935eb79b2876f75d6", "Title": "Stealth Falcon", "Filename": "CitizenLab-Stealth_Falcon(05-29-2016)", "Source": "Citizen Lab", "Link": "https://app.box.com/s/is08b06f6fj6a9z6wymf4u5y5xjm6opr", "Year": "2016", "Date": "5/29/16"}, {"SHA-1": "78ea4b8589b7b776b4a9fe94fd42bd74740d4276", "Title": "IRONGATE ICS Malware: Nothing to See Here...Masking Malicious Activity on SCADA Systems", "Filename": "FireEye_IRONGATE_ICS(06-02-2016)", "Source": "FireEye", "Link": "https://app.box.com/s/6s871m2xa63x4ru8glto9crcv6kk8jor", "Year": "2016", "Date": "6/2/2016"}, {"SHA-1": "97a52c09444fff77e5b7dc8e1cc3606bed224ace", "Title": "APT Group Sends Spear Phishing Emails to Indian Government Officials", "Filename": "FireEye_IndianGovSpearPhish(06-03-2016)", "Source": "FireEye", "Link": "https://app.box.com/s/s0yj8qsfhkf81hpyrtdmhpv3lrmd5p5n", "Year": "2016", "Date": "6/3/16"}, {"SHA-1": "269f0dfade9d5929e678027bd1c274e45d851b45", "Title": "Bears in the Midst: Intrusion into the Democratic National Committee", "Filename": "CrowdStrike_BearsintheMidst_DNC(06-04-2016)", "Source": "Crowdstrike", "Link": "https://app.box.com/s/x5sz7dw4as54b1rif3mdtqwzzj2aek68", "Year": "2016", "Date": "6/4/16"}, {"SHA-1": "a00dc576f03496351c6ec2989aac2a26891c4cff", "Title": "Operation DustySky Part 2", "Filename": "Clearsky_Operation-DustySky2(6-9-16)", "Source": "Clearsky", "Link": "https://app.box.com/s/ldd528ht55m4avot9b485mi6529f8c3r", "Year": "2016", "Date": "6/9/16"}, {"SHA-1": "d14171df6033ec8c090de678e505d08c5f62fd88", "Title": "Operation DustySky Part 2 Indicators", "Filename": "Clearsky_Operation-DustySky2-indicators(6-9-16)", "Source": "Clearsky", "Link": "https://app.box.com/s/q9amfvko7h3x9g4rgcno0vy25btsv1rw", "Year": "2016", "Date": "6/9/16"}, {"SHA-1": "aa49d07c40e3bf8da6779a1d08eeda6efcce3706", "Title": "Reverse-engineering DUBNIUM", "Filename": "Microsoft_DUBNIUM(06-09-2016).pdf", "Source": "Microsoft", "Link": "https://app.box.com/s/f0xelxxs6ey9nms9fox1uugy8nuof40t", "Year": "2016", "Date": "06/09/2016"}, {"SHA-1": "61c759fab05cb341d84f825452ad17cbcfb23c31", "Title": "New Sofacy Attacks Against US Government Agency", "Filename": "PaloAlto_SofacyUSGov(06-14-2016)", "Source": "Palo Alto", "Link": "https://app.box.com/s/49rs6u4cyq43khamdah90y9zyacjzmbr", "Year": "2016", "Date": "6/14/16"}, {"SHA-1": "4827ac42240efd00e38b61e68f85379adb760861", "Title": "Threat Group-4127 Targets Hillary Clinton Presidential Campaign", "Filename": "Secureworks_TG-4127Clinton(06-16-2016)", "Source": "Secureworks", "Link": "https://app.box.com/s/uy6iv3fj7akwzrj9zq1gv403b35twaoy", "Year": "2016", "Date": "6/16/16"}, {"SHA-1": "fb7781a1552ee8fcddd13fc560aa1dea9ad4955a", "Title": "Flash zero-day exploit deployed by the ScarCruft APT Group", "Filename": "Kaspersky_ScarCruft-OpDaybreak(06-17-2016)", "Source": "Kaspersky", "Link": "https://app.box.com/s/0vp77yw58zhqmt9xoez6f7nmicbgkqrw", "Year": "2016", "Date": "6/17/16"}, {"SHA-1": "4380f06f404326f756a7c48cb7dd0236e1934cb0", "Title": "Reverse-engineering DUBNIUM's Flash-targeting exploit", "Filename": "Microsoft_RE-DUBNIUM-FlashExploit(06-20-2016).pdf", "Source": "Microsoft", "Link": "https://app.box.com/s/rsvvnrm7ct991olqsvbqrie614xt9f3b", "Year": "2016", "Date": "06/20/2016"}, {"SHA-1": "d093215af4ce896149f0fc7a42eacad89f58ac3c", "Title": "Findings from Analysis of DNC Intrusion Malware", "Filename": "Fidelis_DNC-IntrusionMalware(06-20-2016).pdf", "Source": "Fidelis", "Link": "https://app.box.com/s/406jm438rm7s65du4d4qnj7iwj5bkphv", "Year": "2016", "Date": "06/20/2016"}, {"SHA-1": "eba3ad81b20ed7b9ef081714928ecf1a4324b057", "Title": "Tracking Elirks Variants in Japan: Similarities to Previous Attacks", "Filename": "PaloAlto_TrackingElirksJapanSimilaritiesPreviousAttacks(06-23-2016).pdf", "Source": "Palo Alto", "Link": "https://app.box.com/s/ki60vxvdi2wzqrsrqik0yvg4sdwsbbal", "Year": "2016", "Date": "06/23/2016"}, {"SHA-1": "3f92bfbfdb0fee7eda8613fc3a6ff515ffceb972", "Title": "Prince of Persia Game Over", "Filename": "PaloAlto_PrinceofPersiaGameOver(06-28-2016).pdf", "Source": "Palo Alto", "Link": "https://app.box.com/s/drj4vb73cv87ok5wks21rynlq3236793", "Year": "2016", "Date": "06/28/2016"}]