記事
【ニュース】
◆Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method (FireEye, 2013/11/10)
http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/operation-ephemeral-hydra-ie-zero-day-linked-to-deputydog-uses-diskless-method.html
⇒ https://malware-log.hatenablog.com/entry/2013/11/10/000000
◆C&CのIP通知にMSの「TechNet」を悪用 - 「Deputy Dog」の攻撃グループ (Security NEXT, 2015/05/19)
http://www.security-next.com/058530
⇒ https://malware-log.hatenablog.com/entry/2015/05/19/000000
◆TechNetを悪用するハッカー「APT17」の活動が活発化 (マイナビニュース, 2015/05/20)
http://news.mynavi.jp/news/2015/05/20/208/
⇒ https://malware-log.hatenablog.com/entry/2015/05/20/000000_2
【ブログ】
◆Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets
http://www.fireeye.com/blog/technical/cyber-exploits/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html
⇒ https://malware-log.hatenablog.com/entry/2013/09/21/000000_1
◆Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets (FireEye, 2013/09/21)
https://www.fireeye.com/blog/threat-research/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html
⇒ https://malware-log.hatenablog.com/entry/2013/09/21/000000
◆September 2013 – New IE 0-day – Update (Qualys. 2013/09/23)
https://blog.qualys.com/laws-of-vulnerabilities/2013/09/23/september-2013--new-ie-0-day
⇒ https://malware-log.hatenablog.com/entry/2013/09/23/000000_1
◆オペレーションDeputyDog Part 2: 日本をターゲットとした、 ゼロデイ・エクスプロイトの分析について (CVE-2013-3893) (FireEye, 2013/09/30)
https://www.fireeye.jp/company/press-releases/2013/deputy-dog-part-2.html
⇒ https://malware-log.hatenablog.com/entry/2013/09/30/000000_1