APT & Cybercriminals Campaign Collection

APT & Cybercriminals Campaign Collection

#Threat Defense#Threat Management

Packet Storm is a global security resource providing around-the-clock information and tools to mitigate personal data and fiscal loss on a global scale.

Visit Website

This is a collection of APT and cybercriminal campaigns

This is a collection of campaigns conducted by APT (Advanced Persistent Threat) groups and cybercriminals.

The Passwords for Malware Samples and Related Threats

The passwords for malware samples may be either 'virus' or 'infected'. For reference, here are some useful resources: kbandla, APTnotes, Florian Roth - APT Groups, Attack Wiki, threat-INTel, targetedthreats, Raw Threat Intelligence, APT search, APT Sample by 0xffff0800, APT Map, sapphirex00 - Threat-Hunting, APTSimulator, MITRE Att&CK: Group, APT_REPORT collected by @blackorbird, Analysis of malware and Cyber Threat Intelligence concerning APT and cybercriminal groups, APT_Digital_Weapon, vx-underground, StrangerealIntel-EternalLiberty. Evasive Panda utilizes the Monlam Festival to target Tibetan individuals. When Cats Fly: The suspected Iranian threat actor UNC1549 is targeting the aerospace and defense sectors in Israel and the broader Middle East region. ConnectWise ScreenConnect attacks are being used to deliver malware. Inside the I-Soon APT (Earth Lusca) operation center. Staying ahead of threat actors in the age of AI. Trend Micro: The Evolution of Cybercrime.