{"id":404,"date":"2023-06-19T15:46:31","date_gmt":"2023-06-19T13:46:31","guid":{"rendered":"https:\/\/bl0g.cedricpernet.net\/?page_id=404"},"modified":"2025-01-24T17:31:03","modified_gmt":"2025-01-24T15:31:03","slug":"elementor-404","status":"publish","type":"page","link":"https:\/\/bl0g.cedricpernet.net\/?page_id=404","title":{"rendered":"Cyberespionage"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"404\" class=\"elementor elementor-404\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-75e904ee elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"75e904ee\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3fba124f\" data-id=\"3fba124f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e10f7c3 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e10f7c3\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36562152 elementor-widget elementor-widget-heading\" data-id=\"36562152\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CYBER<br>ESPIONAGE<br>(APT)<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-04cee56 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"04cee56\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f73bc3 elementor-widget elementor-widget-text-editor\" data-id=\"7f73bc3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If you can read French, I have written a book about cyberespionage, available on Amazon or in French libraries.<br \/>Thanks to my editor, Editions Eyrolles.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c768c24 elementor-widget elementor-widget-image\" data-id=\"c768c24\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.amazon.fr\/S%C3%A9curit%C3%A9-espionnage-informatique-technique-pr%C3%A9vention\/dp\/2212139659\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"864\" height=\"1024\" src=\"https:\/\/bl0g.cedricpernet.net\/wp-content\/uploads\/2023\/06\/book-864x1024.png\" class=\"attachment-large size-large wp-image-518\" alt=\"\" srcset=\"https:\/\/bl0g.cedricpernet.net\/wp-content\/uploads\/2023\/06\/book-864x1024.png 864w, https:\/\/bl0g.cedricpernet.net\/wp-content\/uploads\/2023\/06\/book-253x300.png 253w, https:\/\/bl0g.cedricpernet.net\/wp-content\/uploads\/2023\/06\/book-768x910.png 768w, https:\/\/bl0g.cedricpernet.net\/wp-content\/uploads\/2023\/06\/book.png 952w\" sizes=\"(max-width: 864px) 100vw, 864px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4bcc7d elementor-widget elementor-widget-text-editor\" data-id=\"f4bcc7d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>They wrote about it:<br><a href=\"https:\/\/www.cyber-securite.fr\/2015\/02\/12\/lecture-pour-tout-savoir-sur-les-apt-et-le-cyberespionnage-le-livre-reference-de-cedric-pernet\/\">Cyber-Securite.fr<\/a><br><a href=\"https:\/\/cybertactique.blogspot.com\/2014\/12\/lecture-securite-et-espionnage.html\">Cybertactique<\/a><br><a href=\"https:\/\/www.bortzmeyer.org\/securite-et-espionnage-informatique.html\">St\u00e9phane Bortzmeyer<\/a><br><a href=\"https:\/\/www.m82-project.com\/post\/top-5-des-livres-cyber-pour-les-d%C3%A9butants\">M82 Project<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-34e2df06\" data-id=\"34e2df06\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b319cfa elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"4b319cfa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>This page lists all public cyberespionage (APT) publications I&#8217;ve worked on through time.<\/b><\/p>\n<h3>2024<\/h3>\n<p><b>Earth Lusca Uses KTLVdoor Backdoor for Multiplatform Intrusion<br><\/b>(in collab with Jaromir Horejsi)<br><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/i\/earth-lusca-ktlvdoor.html\">Full paper<\/a><br>Journalists about it: <a href=\"https:\/\/duo.com\/decipher\/new-backdoor-linked-to-chinese-threat-group\">Decipher<\/a> &#8211; <a href=\"https:\/\/thehackernews.com\/2024\/09\/new-cross-platform-malware-ktlvdoor.html\">The Hacker News<\/a> &#8211; <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/chinas-earth-lusca-propagates-multiplatform-backdoor\">DarkReading<\/a> &#8211; <a href=\"https:\/\/securityaffairs.com\/168078\/malware\/earth-lusca-malware-ktlvdoor.html\">SecurityAffairs<\/a><br><\/p>\n<p>&#8212;<\/p>\n<p><b>Earth Lusca Uses Geopolitical Lure to Target Taiwan Before Elections<\/b><br>(in collab with Jaromir Horejsi)<br><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/b\/earth-lusca-uses-geopolitical-lure-to-target-taiwan.html\">Full paper<\/a><br>Journalists about it: &#8211; <a href=\"https:\/\/www.taipeitimes.com\/News\/taiwan\/archives\/2024\/03\/05\/2003814476\">Taipei Times<\/a> &#8211; <a href=\"https:\/\/candid.technology\/earth-lusca-taiwan-hack\/\">Candid Technologies<\/a> &#8211; <a href=\"https:\/\/securityonline.info\/earth-lusca-china-linked-espionage-group-targets-taiwan-exploits-geopolitical-tensions\/\">Security Online<\/a> &#8211; <a href=\"https:\/\/www.it-daily.net\/it-sicherheit\/cybercrime\/taiwan-earth-lusca-nutzt-social-engineering-koeder\">IT Daily<\/a><\/p>\n<h3>&nbsp;<\/h3>\n<h3>2022<\/h3>\n<p><b>Delving Deep: An Analysis of Earth Lusca\u2019s Operations<\/b><br><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/22\/a\/earth-lusca-sophisticated-infrastructure-varied-tools-and-techni.html\">Summary<\/a> &#8211; <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/a\/earth-lusca-employs-sophisticated-infrastructure-varied-tools-and-techniques\/technical-brief-delving-deep-an-analysis-of-earth-lusca-operations.pdf\">Full paper<\/a><br>(in collab with Joseph C Chen, Kenney Lu, Gloria Chen, Jaromir Horejsi, Daniel Lunghi)<\/p>\n<h3>2021<\/h3>\n<p><b>Void Balaur and the Rise of the Cybermercenary Industry<\/b><br><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/k\/void-balaur-and-the-rise-of-the-cybermercenary-industry.html\">Summary<\/a> &#8211; <a href=\"https:\/\/documents.trendmicro.com\/assets\/white_papers\/wp-void-balaur-tracking-a-cybermercenarys-activities.pdf\">Full paper<\/a><br>(in collaboration with Feike Hacquebord)<br>Journalists about it:&nbsp;<a style=\"font-family: Roboto, sans-serif;\" href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2021\/11\/10\/rocket-hack-hacker-for-hire-targets-belrus-opposition-gmail-protonmail-and-telegram\/?sh=639586c640d5\">Forbes<\/a><span style=\"font-family: Roboto, sans-serif;\">&nbsp;&#8211;&nbsp;<\/span><a style=\"font-family: Roboto, sans-serif;\" href=\"https:\/\/www.lemonde.fr\/pixels\/article\/2021\/11\/10\/void-balaur-un-groupe-de-cybermercenaires-entre-criminalite-et-espionnage-d-etat_6101635_4408996.html\">Le Monde<\/a><span style=\"font-family: Roboto, sans-serif;\">&nbsp;&#8211;&nbsp;<\/span><a style=\"font-family: Roboto, sans-serif;\" href=\"https:\/\/www.lefigaro.fr\/secteur\/high-tech\/un-groupe-de-cybercriminels-russophones-a-cible-plus-de-3500-particuliers-et-entreprises-en-18-mois-20211112\">Le Figaro<\/a><span style=\"font-family: Roboto, sans-serif;\">&nbsp;&#8211;&nbsp;<\/span><a style=\"font-family: Roboto, sans-serif;\" href=\"https:\/\/www.20minutes.fr\/high-tech\/3179755-20211123-un-groupe-de-cybermercenaires-seme-le-chaos-sur-la-toile\">20 Minutes<\/a><span style=\"font-family: Roboto, sans-serif;\">&nbsp;&#8211;&nbsp;<\/span><a style=\"font-family: Roboto, sans-serif;\" href=\"https:\/\/thehackernews.com\/2022\/09\/void-balaur-hackers-for-hire-group-now.html\">The Hacker News<\/a><span style=\"font-family: Roboto, sans-serif;\">&nbsp;&#8211;&nbsp;<\/span><a style=\"font-family: Roboto, sans-serif;\" href=\"https:\/\/threatpost.com\/cyber-mercenary-void-balaur\/176230\/\">Threat Post<\/a><br style=\"font-family: Roboto, sans-serif;\"><a style=\"font-family: Roboto, sans-serif;\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/news\/252509397\/Trend-Micro-reveals-Void-Balaur-cyber-mercenary-group\">TechTarget<\/a><span style=\"font-family: Roboto, sans-serif;\">&nbsp;&#8211;&nbsp;<\/span><a style=\"font-family: Roboto, sans-serif;\" href=\"https:\/\/www.csoonline.com\/article\/3641412\/void-balaur-explained-a-stealthy-cyber-mercenary-group-that-spies-on-thousands.html\">CSO Online<\/a><span style=\"font-family: Roboto, sans-serif;\">&nbsp;&#8211;&nbsp;<\/span><a style=\"font-family: Roboto, sans-serif;\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/void-balaur-hackers-for-hire-sell-stolen-mailboxes-and-private-data\/\">BleepingComputer<\/a><span style=\"font-family: Roboto, sans-serif;\">&nbsp;&#8211;&nbsp;<\/span><a style=\"font-family: Roboto, sans-serif;\" href=\"https:\/\/therecord.media\/cyber-mercenary-group-void-balaur-has-been-hacking-companies-for-years\">The Record<\/a><span style=\"font-family: Roboto, sans-serif;\">&nbsp;&#8211;&nbsp;<\/span><a style=\"font-family: Roboto, sans-serif;\" href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/hacker-for-hire-group-spied-on-more-than-3500-targets-in-18-months\/d\/d-id\/1341615\">DarkReading<\/a><span style=\"font-family: Roboto, sans-serif;\">&nbsp;&#8211;&nbsp;<\/span><a style=\"font-family: Roboto, sans-serif;\" href=\"https:\/\/www.indiatimes.com\/technology\/news\/this-hackers-for-hire-group-has-been-stealing-data-in-the-shadows-since-2015-554048.html\">India Times<\/a><\/p>\n<h3>2020<\/h3>\n<p><b>Operation DRBControl &#8211; Uncovering a Cyberespionage Campaign Targeting Gambling Companies in Southeast Asia<\/b><br><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cyber-attacks\/operation-drbcontrol-uncovering-a-cyberespionage-campaign-targeting-gambling-companies-in-southeast-asia\">Summary<\/a> &#8211; <a href=\"https:\/\/documents.trendmicro.com\/assets\/white_papers\/wp-uncovering-DRBcontrol.pdf\">Full paper<\/a><br>(in collaboration with&nbsp;Daniel Lunghi, Kenney Lu, and Jamz Yaneza)<br>Journalists about it: <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/drbcontrol-espionage-operation-hits-gambling-betting-companies\/\">BleepingComputer<\/a> &#8211; <a href=\"https:\/\/www.cybersecurity-help.cz\/blog\/948.html\">CyberSecurityHelp<\/a><\/p>\n<h3>2019<\/h3>\n<div><b>Drilling Deep: A Look at Cyberattacks on the Oil and Gas Industry<\/b><br><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/drilling-deep-a-look-at-cyberattacks-on-the-oil-and-gas-industry\">Summary<\/a> &#8211; <a href=\"https:\/\/documents.trendmicro.com\/assets\/white_papers\/wp-drilling-deep-a-look-at-cyberattacks-on-the-oil-and-gas-industry.pdf\">Full paper<\/a><br>(in collaboration with Feike Hacquebord)<br>Journalists about it: <a href=\"https:\/\/financialpost.com\/pmn\/press-releases-pmn\/business-wire-news-releases-pmn\/trend-micro-research-urges-oil-and-gas-industry-to-prioritize-cybersecurity\">Financial Post<\/a> &#8211; <a href=\"https:\/\/www.cseurope.info\/oil-and-gas-industry-executives-urged-to-prioritise-cyber-security\/\">CyberSecurity Europe<\/a> &#8211; <a href=\"https:\/\/www.intelligentciso.com\/2019\/12\/16\/trend-micro-research-urges-oil-and-gas-industry-to-prioritise-cybersecurity\/\">Intelligent CISO<\/a><\/div>\n<div>&nbsp;<\/div>\n<p>&#8212;<\/p>\n<p><b>Obfuscated APT33 C&amp;Cs Used for Narrow Targeting<\/b><br><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/19\/l\/more-than-a-dozen-obfuscated-apt33-botnets-used-for-extreme-narrow-targeting.html\">Full research<\/a><br>(in collaboration with Feike Hacquebord &amp; Kenney Lu)<br>Journalists about it: <a href=\"https:\/\/www.zdnet.fr\/actualites\/cybercrime-un-groupe-apt-iranien-a-construit-son-propre-vpn-39893949.htm\">ZDNet<\/a> &#8211; <a href=\"https:\/\/threatpost.com\/apt33-mounts-targeted-botnet-attacks-us\/150248\/\">Threat Post<\/a> &#8211; <a href=\"https:\/\/www.darkreading.com\/abtv\/iran-rustles-up-its-own-vpn-to-hide-itself\/a\/d-id\/755706\">DarkReading<\/a> &#8211; <a href=\"https:\/\/www.securityweek.com\/iranian-apt33-hackers-use-special-botnets-high-value-targets-us\/\">SecurityWeek<\/a> &#8211; <a href=\"https:\/\/www.techradar.com\/news\/hacking-group-built-its-own-vpn\">TechRadar<\/a> &#8211;&nbsp;<a href=\"https:\/\/www.binarydefense.com\/resources\/threat-watch\/iran-hacking-group-apt33-seen-to-create-and-maintain-personal-vpn-network\/\">Binary Defense<\/a> &#8211; <a href=\"https:\/\/cyberscoop.com\/apt33-iran-botnet-trend-micro\/\">CyberScoop<\/a> &#8211; <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/shamoonslingers-apt33-secret-new\/\">Infosecurity Magazine<\/a> &#8211; <a href=\"https:\/\/www.cybersecurity-help.cz\/blog\/774.html\">CybersecurityHelp<\/a>&nbsp;&#8211; <a href=\"https:\/\/gbhackers.com\/botnet-servers\/\">GBHackers<\/a><\/p>\n<p>&#8212;<\/p>\n<p><b>New SLUB Backdoor Uses GitHub, Communicates via Slack<\/b><br><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/19\/c\/new-slub-backdoor-uses-github-communicates-via-slack.html\">Full research<\/a><br>(in collab with&nbsp;Elliot Cao, Jaromir Horejsi, Joseph C Chen, William Gamazo Sanchez)<br>Journalists about it: <a href=\"https:\/\/www.zdnet.com\/article\/windows-malware-slub-taps-slack-github-to-steal-your-info\/\">ZDNet<\/a> &#8211; <a href=\"https:\/\/www.securityweek.com\/slack-github-abused-new-slub-backdoor-targeted-attacks\/\">SecurityWeek<\/a> &#8211; <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-slub-backdoor-uses-slack-github-as-communication-channels\/\">BleepingComputer<\/a> &#8211; <a href=\"https:\/\/securityintelligence.com\/news\/slub-backdoor-receives-commands-from-github-and-communicates-through-slack\/\">Security Intelligence<\/a> &#8211; <a href=\"https:\/\/www.theregister.com\/2019\/03\/08\/slub_malware_slack_github\/\">The Register<\/a> &#8211; <a href=\"https:\/\/www.lemondeinformatique.fr\/actualites\/lire-des-pirates-utilisent-slack-pour-cacher-des-communications-malveillantes-74632.html\">Le Monde Informatique<\/a> &#8211; <a href=\"https:\/\/www.hackread.com\/new-backdoor-malware-hits-slack-and-github-platforms\/\">HackRead<\/a> &#8211; <a href=\"https:\/\/www.techcentral.ie\/hackers-use-slack-to-hide-malware-communications\/\">TechCentral<\/a><\/p>\n<h3>2017<\/h3>\n<p><b>Untangling the Patchwork Cyberespionage Group<\/b><br><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/17\/l\/untangling-the-patchwork-cyberespionage-group.html\">Summary<\/a> &#8211; <a href=\"https:\/\/documents.trendmicro.com\/assets\/tech-brief-untangling-the-patchwork-cyberespionage-group.pdf\">Full paper<\/a><br>(in collaboration with Daniel Lunghi, Jaromir Horejsi)<br>Journalists about it: <a href=\"https:\/\/www.securityweek.com\/patchwork-cyberspies-adopt-new-exploit-techniques\/\">SecurityWeek<\/a><\/p>\n<p>&#8212;<\/p>\n<p><b>Winnti Abuses GitHub for C&amp;C Communications<\/b><br><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/17\/c\/winnti-abuses-github.html\">Full research<\/a><br>(in collaboration with CSS Team)<br>Journalists about it: <a href=\"https:\/\/www.infoworld.com\/article\/3184399\/malware-finds-unwitting-ally-in-github.html\">InfoWorld<\/a><\/p>\n<div>\n<h3>2015<\/h3>\n<p><b>Operation Iron Tiger: Exploring Chinese Cyber-Espionage Attacks on United States Defense Contractors<br><\/b><a href=\"https:\/\/www.erai.com\/CustomUploads\/ca\/wp\/2015_12_wp_operation_iron_tiger.pdf\">Full paper<\/a><br>(in collaboration with Ziv Chang, Kenney Lu, Aaron Luo, Jay Yaneza)<br>Journalists about it: <a href=\"https:\/\/www.forbes.com\/sites\/lisabrownlee\/2015\/09\/17\/chinese-cyber-attacks-on-us-military-interests-confirmed-as-advanced-persistent-and-ongoing\/?sh=516549e9694f\">Forbes<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.securityweek.com\/us-defense-contractors-targeted-chinese-threat-group\/\">SecurityWeek<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.tripwire.com\/state-of-security\/iron-tiger-data-us-firms\">TripWire<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/iron-tiger-stole-terabytes-data\/\">Infosecurity Magazine<\/a><\/p>\n<p>&#8212;<\/p>\n<p><b>The Spy Kittens Are Back: Rocket Kitten 2<\/b><br><a href=\"https:\/\/documents.trendmicro.com\/assets\/wp\/wp-the-spy-kittens-are-back.pdf\">Full paper<\/a><br>(in collaboration with Eyal Sela, ClearSky)<br>Journalists about it: <a href=\"https:\/\/www.securityweek.com\/iran-linked-espionage-group-continues-attacks-middle-east\/\">SecurityWeek<\/a>&nbsp;&#8211; <a href=\"https:\/\/www.scmagazine.com\/brief\/incident-response\/rocket-kitten-apt-threat-persists-after-its-outing\">SCMagazine<\/a> &#8211; <a href=\"https:\/\/www.theregister.com\/2015\/09\/03\/rocket_kitten_attack_group\/\">The Register<\/a> &#8211; <a href=\"https:\/\/www.darkreading.com\/application-security\/cyberspies-impersonate-security-researcher\">DarkReading<\/a> &#8211; <a href=\"https:\/\/news.softpedia.com\/news\/rocket-kitten-hacking-group-linked-to-iranian-government-by-security-researchers-490919.shtml\">Softpedia<\/a> &#8211; <a href=\"https:\/\/www.cybersecurityintelligence.com\/blog\/cyberspies-impersonate-security-researcher-606.html\">CyberSecurityIntelligence<\/a><\/p>\n<\/div>\n<p>&#8212;<\/p>\n<p><b>Operation Woolen Goldfish &#8211; When Kittens Go Phishing<\/b><br><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cyber-attacks\/operation-woolen-goldfish-when-kittens-go-phishing\">Summary<\/a> &#8211; <a href=\"https:\/\/documents.trendmicro.com\/assets\/wp\/wp-operation-woolen-goldfish.pdf\">Full paper<\/a><br>(in collaboration with Kenney Lu)<br>Journalists about it: <a href=\"https:\/\/www.securityweek.com\/threat-actor-linked-iran-targets-organizations-israel-europe\/\">SecurityWeek<\/a> &#8211; <a href=\"https:\/\/www.cyberdefensemagazine.com\/operation-woolen-goldfish-a-hacking-campaign-in-the-wild\/\">CyberDefenseMagazine<\/a> &#8211; <a href=\"https:\/\/www.spamfighter.com\/News-19538-Rocket-Kitten-Targets-Organisations-in-Israel-and-Europe.htm\">SpamFighter<\/a> &#8211; <a href=\"https:\/\/www.helpnetsecurity.com\/2015\/03\/20\/state-sponsored-hackers-target-european-israeli-organizations\/\">HelpNetSecurity<\/a><\/p>\n<h3>2014<\/h3>\n<p><b>Operation Pitty Tiger \u2013 \u201cThe Eye of the Tiger\u201d<\/b><br><a href=\"https:\/\/paper.seebug.org\/papers\/APT\/APT_CyberCriminal_Campagin\/2014\/2014.07.11.Pitty_Tiger\/Pitty_Tiger_Final_Report.pdf\">Full paper<\/a><br>(in collab with Fabien Perigaud, Ronan Mouchoux, David Bizeul)<br>Journalists about it: <a href=\"https:\/\/www.helpnetsecurity.com\/2014\/07\/15\/pittytiger-apt-group-sells-its-services-to-companies\/\">HelpNetSecurity<\/a> &#8211;&nbsp;<a href=\"https:\/\/www.securityweek.com\/pitty-tiger-threat-actors-possibly-active-2008-fireeye\/\">SecurityWeek<\/a> &#8211;&nbsp;<a href=\"https:\/\/incyber.org\/cassidian-cybersecurity-un-groupe-de-hackers-hautement-qualifie-et-selon-toute-vraisemblance-de-nationalite-chinoise-a-ete-identifie-par-airbus-defence-space\/\">InCyber<\/a> &#8211;&nbsp;<a href=\"https:\/\/www.zataz.com\/pitty-tiger-des-pros-du-piratage-qui-ont-attaque-la-france\/\">Zataz<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CYBERESPIONAGE(APT) If you can read French, I have written a book about cyberespionage, available on Amazon or in French libraries.Thanks to my editor, Editions Eyrolles. They wrote about it:Cyber-Securite.frCybertactiqueSt\u00e9phane BortzmeyerM82 Project This page lists all public cyberespionage (APT) publications I&#8217;ve worked on through time. 2024 Earth Lusca Uses KTLVdoor Backdoor for Multiplatform Intrusion(in collab with [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-404","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=\/wp\/v2\/pages\/404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=404"}],"version-history":[{"count":0,"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=\/wp\/v2\/pages\/404\/revisions"}],"wp:attachment":[{"href":"https:\/\/bl0g.cedricpernet.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}