2023-Threat-Report-Compilation

View the Project on GitHub jwennekers/2023-Threat-Report-Compilation

June

Threat Report Compilation | June 2023

ID Publisher Report
1. Amatas Cyber Threat Report - May 2023
2. Aqua GitHub Dataset Research Reveals Millions Potentially Vulnerable to RepoJacking
3. Check Point Beyond the Horizon: Traveling the World on Camaro Dragon’s USB Flash Drives
4. CISA (Cybersecurity and Infrastructure Security Agency, United States of America) #StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability
5. CISA (Cybersecurity and Infrastructure Security Agency, United States of America), FBI (Federal Bureau of Investigation, United States of America), MS-ISAC (Multi-State Information Sharing and Analysis Center, United States of America), ACSC (Australian Cyber Security Centre, Australia), NCSC-UK (National Cyber Security Centre, United Kingdom), CCCS (Canadian Centre for Cyber Security, Canada), ANSSI (National Cybersecurity Agency, France), BSI (Federal Office for Information Security, Germany), CERT NZ (Computer Emergency Response Team, New Zealand), NCSC-NZ (National Cyber Security Centre, New Zealand) Understanding Ransomware Threat Actors: LockBit
6. CrowdStrike Adversaries Go Hands-On in Japan: Know the Threat and Know the Solution
7. CrowdStrike Business as Usual: Falcon Complete MDR Thwarts Novel VANGUARD PANDA (Volt Typhoon) Tradecraft
8. CSA Singapore (Cyber Security Agency Singapore) Singapore Cyber Landscape 2022
9. CybelAngel 2023 State of the External Attack Surface: Annual Threat Trends Analysis
10. Cyble Trojanized Super Mario Game Installer Spreads SupremeBot Malware
11. Dragos Dragos Analysis Determines COSMICENERGY Is Not an Immediate Threat
12. FBI (Federal Bureau of Investigation, United States of America) Malicious Actors Manipulating Photos and Videos to Create Explicit Content and Sextortion Schemes
13. FBI (Federal Bureau of Investigation, United States of America), DOS (Department of State, United States of America), NSA (National Security Agency, United States of America), NIS (National Intelligence Service, Republic of Korea), NPA (National Police Agency, Republic of Korea), MOFA (Ministry of Foreign Affairs, Republic of Korea) North Korea Using Social Engineering to Enable Hacking of Think Tanks, Academia, and Media
14. Group-IB Group-IB Discovers 100K+ Compromised ChatGPT Accounts on Dark Web Marketplaces; Asia-Pacific region tops the list
15. Huntress MOVEit Transfer Critical Vulnerability CVE-2023-34362 Rapid Response
16. IBM /IBM X-Force IBM X-Force Definitive Guide to Ransomware
17. Kaspersky LockBit Green and phishing that targets organizations
18. Kaspersky Dissecting TriangleDB, a Triangulation spyware implant
19. Mandiant VMware ESXi Zero-Day Used by Chinese Espionage Actor to Perform Privileged Guest Operations on Compromised Hypervisors
20. Mandiant Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) Exploited Globally by Aggressive and Skilled Actor, Suspected Links to China
21. Mandiant Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft
22. Microsoft / Microsoft Incident Response Guidance for investigating attacks using CVE-2023-23397
23. Microsoft / Microsoft Threat Intelligence Cadet Blizzard emerges as a novel and distinct Russian threat actor
24. Mnemonic Exposing covert surveillance backdoors in children’s smartwatches
25. Momentum Cybersecurity Snapshot - May 2023
26. NCSC (National Cyber Security Centre, United Kingdom) Cyber Threat Report: UK Legal Sector
27. NSA (National Security Agency, United States of America) BlackLotus Mitigation Guide
28. Orange / Orange Cyber Defense World Watch Ransomware Ecosystem
29. Recorded Future North Korea-Aligned TAG-71 Spoofs Financial Institutions in Asia and US
30. Recorded Future Private Eyes: China’s Embrace of Open-Source Military Intelligence
31. Recorded Future / Insikt Group North Korea’s Cyber Strategy
32. Security Joes Process Mockingjay: Echoing RWX In Userland To Achieve Code Execution
33. The DFIR Report A Truly Graceful Wipe Out
34. ThreatMon Technical Analysis of RDPCredentialStealer: Uncovering Malware Targeting RDP Credentials with API Hooking
35. ThreatMon Cyber Threat Report: Analyzing Ransomware and Apt Attacks Targeting Türkiye – May 2023
36. ThreatMon Threat Analysis: SharpPanda APT’s Attack Chain Targeting G20 Nations
37. ThreatMon Reverse Engineering RokRAT: A Closer Look at APT37’s Onedrive-Based Attack Vector
38. ThreatMon Behind the Breaches: Mapping Threat Actors and Their CVE Exploits
39. ThreatMon Zaraza Bot: The New Russian Credential Stealer
40. ThreatMon Anonymous Sudan: In-Depth Analysis Beyond Hacktivist Attacks
41. ThreatMon APT41’s Attack Chain: Exe-LolBins Leads to Powershell Backdoor with Telegram C2
42. ThreatMon APT Blind Eagles Malware Arsenal Technical Analysis
43. ThreatMon The Rise of Dark Power: A Close Look at the Group and their Ransomware
44. ThreatMon IT Army of Ukraine: Analysis of Threat Actors In The Ukraine-Russia War
45. ThreatMon Anonymous Russia: Analysis of Threat Actors in Ukraine-Russia War
46. ThreatMon Chinotto Backdoor Technical Analysis of the APT Reaper’s Powerful Weapon
47. ThreatMon Report on Data Leaks Reported in Social Media
48. ThreatMon The Roles of Threat Actors in The Ukraine-Russian War: Noname057(16)
49. ThreatMon KillNet: In-Depth Analysis on The Roles of Threat Actors and Attacks In The Ukraine-Russia War
50. ThreatMon Cybergun: Technical Analysis of the Armageddon’s Infostealer
51. ThreatMon Beyond Bullets and Bombs: An Examination of Armageddon Group’s Cyber Warfare Against Ukraine
52. ThreatMon Threat Actors, Phishing Attacks and 2022 Phishing Preview
53. ThreatMon APT SideCopy Targeting Indian Government Entities
54. ThreatMon SwiftSlicer Wiper Malware Analysis Report
55. ThreatMon DoNot Team (APT-C-35) Analysis of Latest Campaign
56. ThreatMon The Global Cyber Security Intelligence Risk Report 2023
57. ThreatMon ThreatMon Ransomware Group Activity Report: 13.01.2023-27.01.2023
58. ThreatMon ThreatMon Ransomware Group Activity Report: 01.01.2023-13.01.2023
59. ThreatMon ThreatMon Ransomware Group Activity Report: 18.12.2022– 01.01.2022
60. Trellix Skuld: The Infostealer that Speaks Golang
61. Trellix The Trellix CyberThreat Report (Q1 2023)
62. Trop Chaud Link Analysis of 2023 Clop & Related 0Day Exploit Activity
63. Verizon 2023 Data Breach Investigations Report (DBIR)
64. Volexity Charming Kitten Updates POWERSTAR with an InterPlanetary Twist
65. Volexity 3CX Supply Chain Compromise Leads to ICONIC Incident
66. WIRED The Untold Story of the Boldest Supply-Chain Hack Ever
drawing