【概要】
■別名
攻撃組織名 | 命名組織 |
---|---|
APT20 | FireEye |
APT8 | FireEye(Mandiant) |
Violin Panda | CrowdStrike |
Covert Grobe | |
TH3Bug | Paloalto |
■辞書
◆Violin Panda (Malpedia)
https://malpedia.caad.fkie.fraunhofer.de/actor/violin_panda
【ニュース】
◆中国サイバー攻撃の標的は米国から日本に変更--ファイア・アイが警告 (ZDNet, 2017/09/25 07:00)
https://japan.zdnet.com/article/35104686/
⇒ https://malware-log.hatenablog.com/entry/2017/09/25/000000_6
◆中国のハッカー集団、2要素認証をかいくぐり政府機関などを攻撃--研究者が発表 (ZDNet, 2019/12/24 12:42)
https://japan.zdnet.com/article/35147287/
⇒ https://malware-log.hatenablog.com/entry/2019/12/24/000000_7
【ブログ】
◆Chinese hacker group caught bypassing 2FA (Cyber Security Review, 2019/12/23)
https://www.cybersecurity-review.com/news-december-2019/chinese-hacker-group-caught-bypassing-2fa/
⇒ https://malware-log.hatenablog.com/entry/2019/12/23/000000_6
【公開情報】
◆APT20 Bypasses MFA, Targets Governments and MSPs (NJCCIC, 2019/12/30)
https://www.cyber.nj.gov/alerts-advisories/apt20-bypasses-mfa-targets-governments-and-msps
⇒ https://malware-log.hatenablog.com/entry/2019/12/30/000000_1
【資料】
◆REGIONAL ADVANCED THREAT REPORT:Europe, Middle East and Africa 1H2015 (FireEye, 2015)
https://www.fireeye.com/content/dam/fireeye-www/partners/pdfs/rpt-regional-atr-emea-web-bt.pdf
⇒ https://malware-log.hatenablog.com/entry/2015/04/01/000000
◆Operation Wocao: Shining a light on one of China’s hidden hacking groups (FOX IT, 2019/12/29)
https://resources.fox-it.com/rs/170-CAK-271/images/201912_Report_Operation_Wocao.pdf
⇒ https://malware-log.hatenablog.com/entry/2019/12/19/000000_6
◆Nowhere to Hide: Intelligence Illuminating the Threat (FireEye, 2019)
https://www.fireeye.com/content/dam/fireeye-www/summit/cds-2019/presentations/keynote-cds19-sandra-joyce.pdf
⇒ https://malware-log.hatenablog.com/entry/2019/12/31/000000_4
【Twitter検索】
【関連まとめ記事】
◆標的型攻撃組織 / APT (まとめ)
https://malware-log.hatenablog.com/entry/APT