攻撃組織: LotusBlossom / Spring Dragon
Geographic map of attacks Histogram of malware files’ timestamps 出典: https://securelist.com/spring-dragon-updated-activity/79067/ 【ブログ】 ◆Spring Dragon – Updated Activity (SecureList, 2017/07/24) https://securelist.com/spring-dragon-…
Emissaryに費やされた開発努力のタイムライン 出典: https://researchcenter.paloaltonetworks.com/2016/02/emissary-trojan-changelog-did-operation-lotus-blossom-cause-it-to-evolve/ 【ニュース】 ◆Emissary Trojan Changelog: Did Operation Lotus Blo…
【ブログ】 ◆ELISE: Security Through Obesity (Pwc, 2015/12/23) http://pwc.blogs.com/cyber_security_updates/2015/12/elise-security-through-obesity.html
Decoy document containing written application form Decoy document containing the invitation and agenda for event Infrastructure associated with Emissary Trojan 出典: https://researchcenter.paloaltonetworks.com/2015/12/attack-on-french-dipl…
【ニュース】 ◆The Spring Dragon APT (SecureList, 2015/06/17 07:07) https://securelist.com/the-spring-dragon-apt/70726/
報告書の表紙 出典: https://researchcenter.paloaltonetworks.com/2015/06/infographic-operation-lotus-blossom-in-action/ 【ブログ】 ◆Infographic: Operation Lotus Blossom In Action (Palloalto, 2015/06/17) https://researchcenter.paloaltonetwork…
【ニュース】 ◆Operation Lotus Blossom: A New Nation-State Cyberthreat? (Palloalto, 2015/06/16 05:00) https://researchcenter.paloaltonetworks.com/2015/06/operation-lotus-blossom/ 【インディケータ情報】 ◆pan-unit42/iocs (Palloalto) https://g…