Skip to content

T1041 Exfiltration Over C2 Channel

Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control communications.

Item Value
ID T1041
Sub-techniques
Tactics TA0010
Platforms ESXi, Linux, Windows, macOS
Version 2.3
Created 31 May 2017
Last Modified 24 October 2025

Procedure Examples

ID Name Description
S0045 ADVSTORESHELL ADVSTORESHELL exfiltrates data over the same channel used for C2.162
G1030 Agrius Agrius exfiltrated staged data using tools such as Putty and WinSCP, communicating with command and control servers.204
S1025 Amadey Amadey has sent victim data to its C2 servers.70
S0584 AppleJeus AppleJeus has exfiltrated collected host information to a C2 server.29
S0622 AppleSeed AppleSeed can exfiltrate files via the C2 channel.124
G0022 APT3 APT3 has a tool that exfiltrates data over the C2 channel.189
G0050 APT32 APT32’s backdoor has exfiltrated data using the already opened channel with its C&C server.190
G0087 APT39 APT39 has exfiltrated stolen victim data through C2 communications.183
C0046 ArcaneDoor ArcaneDoor included use of existing command and control channels for data exfiltration.31212
S0373 Astaroth Astaroth exfiltrates collected information from its r1.log file to the external C2 server. 88
S0438 Attor Attor has exfiltrated data over the C2 channel.96
S1029 AuTo Stealer AuTo Stealer can exfiltrate data over actor-controlled C2 servers via HTTP or TCP.81
S0031 BACKSPACE Adversaries can direct BACKSPACE to upload files to the C2 Server.44
S1081 BADHATCH BADHATCH can exfiltrate data over the C2 channel.171172
S0234 Bandook Bandook can upload files from a victim’s machine over the C2 channel.24
S0239 Bankshot Bankshot exfiltrates data over its C2 channel.156
S1246 BeaverTail BeaverTail has exfiltrated data collected from victim devices to C2 servers.212223
S0268 Bisonal Bisonal has added the exfiltrated data to the URL over the C2 channel.138
G1043 BlackByte BlackByte transmitted collected victim host information via HTTP POST to command and control infrastructure.199
S0520 BLINDINGCAN BLINDINGCAN has sent user and system information to a C2 server via HTTP POST requests.99100
S0657 BLUELIGHT BLUELIGHT has exfiltrated data over its C2 channel.54
S0651 BoxCaon BoxCaon uploads files and data from a compromised host over the existing C2 channel.93
S1039 Bumblebee Bumblebee can send collected data in JSON format to C2.28
C0017 C0017 During C0017, APT41 used its Cloudflare services C2 channels for data exfiltration.214
S0077 CallMe CallMe exfiltrates data to its C2 server over the same protocol as C2 communications.67
S0351 Cannon Cannon exfiltrates collected data over email via SMTP/S and POP3/S C2 channels.60
S0484 Carberp Carberp has exfiltrated data via HTTP to already established C2 servers.3738
S0572 Caterpillar WebShell Caterpillar WebShell can upload files over the C2 channel.126
S0674 CharmPower CharmPower can exfiltrate gathered data to a hardcoded C2 URL via HTTP POST.62
G0114 Chimera Chimera has used Cobalt Strike C2 beacons for data exfiltration.179
S1149 CHIMNEYSWEEP CHIMNEYSWEEP can upload collected files to the command-and-control server.84
S0667 Chrommme Chrommme can exfiltrate collected data via C2.117
G0142 Confucius Confucius has exfiltrated stolen files to its C2 server.200
G1052 Contagious Interview Contagious Interview has exfiltrated data from a compromised host to actor-controlled C2 servers.191192193128211291941952223
S1024 CreepySnail CreepySnail can connect to C2 for data exfiltration.155
S0115 Crimson Crimson can exfiltrate stolen information over its C2.89
S0538 Crutch Crutch can exfiltrate data over the primary C2 channel (Dropbox HTTP API).174
S1153 Cuckoo Stealer Cuckoo Stealer can send information about the targeted system to C2 including captured passwords, OS build, hostname, and username.83
G1012 CURIUM CURIUM has used IMAP and SMTPS for exfiltration via tools such as IMAPLoader.210
S0687 Cyclops Blink Cyclops Blink has the ability to upload exfiltrated files to a C2 server.97
S1111 DarkGate DarkGate uses existing command and control channels to retrieve captured cryptocurrency wallet credentials.61
S1021 DnsSystem DnsSystem can exfiltrate collected data to its C2 server.26
S0600 Doki Doki has used Ngrok to establish C2 and exfiltrate data.76
S0502 Drovorub Drovorub can exfiltrate files over C2 infrastructure.125
S1159 DUSTTRAP DUSTTRAP can exfiltrate collected data over C2 channels.144
S0062 DustySky DustySky has exfiltrated data to the C2 server.72
S0024 Dyre Dyre has the ability to send information staged on a compromised host externally to C2.168
S0377 Ebury Ebury exfiltrates a list of outbound and inbound SSH sessions using OpenSSH’s known_host files and wtmp records. Ebury can exfiltrate SSH credentials through custom DNS queries or use the command Xcat to send the process’s ssh session’s credentials to the C2 server.166167
S0367 Emotet Emotet has exfiltrated data over its C2 channel.6968
S0363 Empire Empire can send data gathered from a target through the command and control channel.43
S0568 EVILNUM EVILNUM can upload files over the C2 channel from the infected host.98
S0696 Flagpro Flagpro has exfiltrated data to the C2 server.123
S0381 FlawedAmmyy FlawedAmmyy has sent data collected from a compromised host to its C2 servers.120
S0661 FoggyWeb FoggyWeb can remotely exfiltrate sensitive information from a compromised AD FS server.36
C0001 Frankenstein During Frankenstein, the threat actors collected information via Empire, which sent the data back to the adversary’s C2.3
S1044 FunnyDream FunnyDream can execute commands, including gathering user information, and send the results to C2.9
G0093 GALLIUM GALLIUM used Web shells and HTRAN for C2 and to exfiltrate data.180
G0047 Gamaredon Group A Gamaredon Group file stealer can transfer collected files to a hardcoded C2 server.134206207
S0493 GoldenSpy GoldenSpy has exfiltrated host environment information to an external C2 domain via port 9006.71
S0588 GoldMax GoldMax can exfiltrate files over the existing C2 channel.164165
S0477 Goopy Goopy has the ability to exfiltrate data over the Microsoft Outlook C2 channel.163
S0531 Grandoreiro Grandoreiro can send data it retrieves to the C2 server.49
S0632 GrimAgent GrimAgent has sent data related to a compromise host over its C2 channel.170
S0391 HAWKBALL HAWKBALL has sent system information and files over the C2 channel.90
S1249 HexEval Loader HexEval Loader has exfiltrated victim data using HTTPS POST requests to its C2 servers.128129
G0126 Higaisa Higaisa exfiltrated data over its C2 channel.181
C0038 HomeLand Justice During HomeLand Justice, threat actors used HTTP to transfer data from compromised Exchange servers.211
S0376 HOPLIGHT HOPLIGHT has used its C2 channel to exfiltrate data.86
S0431 HotCroissant HotCroissant has the ability to download files from the infected host to the command and control (C2) server.25
S1022 IceApple IceApple’s Multi File Exfiltrator module can exfiltrate multiple files from a compromised host as an HTTP response over C2.79
S0434 Imminent Monitor Imminent Monitor has uploaded a file containing debugger logs, network information and system information to the C2.7
S0604 Industroyer Industroyer sends information about hardware profiles and previously-received commands back to the C2 server in a POST-request.118
S1245 InvisibleFerret InvisibleFerret has used HTTP communications to the “/Uploads” URI for file exfiltration.152
S1132 IPsec Helper IPsec Helper exfiltrates specific files through its command and control framework.141
G0004 Ke3chang Ke3chang transferred compressed and encrypted RAR files containing exfiltration through the established backdoor command and control channel during operations.182
S0487 Kessel Kessel has exfiltrated information gathered from the infected system to the C2 server.135
S1020 Kevin Kevin can send data from the victim host through a DNS C2 channel.77
S0526 KGH_SPY KGH_SPY can exfiltrate collected information from the host to the C2 server.143
G0094 Kimsuky Kimsuky has exfiltrated data over its C2 channel.197196
S0356 KONNI KONNI has sent data and files to its C2 server.149151150
S1075 KOPILUWAK KOPILUWAK has exfiltrated collected data to its C2 via POST requests.127
S1160 Latrodectus
Latrodectus can exfiltrate encrypted system information to the C2 server.102101
G0032 Lazarus Group Lazarus Group has exfiltrated data and files over a C2 channel through its various tools and malware.185184186
G0065 Leviathan Leviathan has exfiltrated data over its C2 channel.205
C0049 Leviathan Australian Intrusions Leviathan exfiltrated collected data over existing command and control channels during Leviathan Australian Intrusions.213
S0395 LightNeuron LightNeuron exfiltrates data over its email C2 channel.48
S1185 LightSpy To exfiltrate data, LightSpy configures each module to send an obfuscated JSON blob to hardcoded URL endpoints or paths aligned to the module name.45
S1186 Line Dancer Line Dancer exfiltrates collected data via command and control channels.31
S1188 Line Runner Line Runner utilizes HTTP to retrieve and exfiltrate information staged using Line Dancer.31
S0680 LitePower LitePower can send collected data, including screenshots, over its C2 channel.158
S0447 Lokibot Lokibot has the ability to initiate contact with command and control (C2) to exfiltrate stolen data.91
G1014 LuminousMoth LuminousMoth has used malware that exfiltrates stolen data to its C2 server.177
S1213 Lumma Stealer Lumma Stealer has exfiltrated collected data over existing HTTP and HTTPS C2 channels.116115
S1142 LunarMail LunarMail can use email image attachments with embedded data for receiving C2 commands and data exfiltration.40
S0409 Machete Machete’s collected data is exfiltrated over the same channel used for C2.27
S1016 MacMa MacMa exfiltrates data from a supplied path over its C2 channel.107
S1060 Mafalda Mafalda can send network system data and files to its C2 server.114
S1182 MagicRAT MagicRAT exfiltrates data via HTTP over existing command and control channels.121
S1169 Mango Mango can use its HTTP C2 channel for exfiltration.113
S1156 Manjusaka Manjusaka data exfiltration takes place over HTTP channels.78
S0652 MarkiRAT MarkiRAT can exfiltrate locally stored data via its C2.104
S0459 MechaFlounder MechaFlounder has the ability to send the compromised user’s account name and hostname within a URL to C2.11
S1059 metaMain metaMain can upload collected files and data to its C2 server.136
S0455 Metamorfo Metamorfo can send the data it collects to the C2 server.65
S0084 Mis-Type Mis-Type has transmitted collected files and data to its C2 server.39
S0083 Misdat Misdat has uploaded files and data to its C2 servers.39
S1122 Mispadu Mispadu can sends the collected financial data to the C2 server.146147
S0079 MobileOrder MobileOrder exfiltrates data to its C2 server over the same protocol as C2 communications.67
S1026 Mongall Mongall can upload files and information from a compromised host to its C2 server.145
G0069 MuddyWater MuddyWater has used C2 infrastructure to receive exfiltrated data.208
G0129 Mustang Panda Mustang Panda has exfiltrated stolen data and files to its C2 server.187188161
S0034 NETEAGLE NETEAGLE is capable of reading files over the C2 channel.44
S1090 NightClub NightClub can use SMTP and DNS for file exfiltration and C2.30
S0385 njRAT njRAT has used HTTP to receive stolen information from the infected machine.142
S0340 Octopus Octopus has uploaded stolen files and data from a victim’s machine over its C2 channel.63
S1170 ODAgent ODAgent can use an attacker-controlled OneDrive account to receive C2 commands and to exfiltrate files.10
S1172 OilBooster OilBooster can use an actor-controlled OneDrive account for C2 communication and exfiltration.10
S0439 Okrum Data exfiltration is done by Okrum using the already opened channel with the C2 server.87
S0264 OopsIE OopsIE can upload files from the victim’s machine to its C2 server.175
C0022 Operation Dream Job During Operation Dream Job, Lazarus Group exfiltrated data from a compromised host to actor-controlled C2 servers.216
C0006 Operation Honeybee During Operation Honeybee, the threat actors uploaded stolen files to their C2 servers.215
C0014 Operation Wocao During Operation Wocao, threat actors used the XServer backdoor to exfiltrate data.217
S1017 OutSteel OutSteel can upload files from a compromised host over its C2 channel.20
S1050 PcShare PcShare can upload files and information from a compromised host to its C2 servers.9
S0587 Penquin Penquin can execute the command code do_upload to send files to C2.154
S1145 Pikabot During the initial Pikabot command and control check-in, Pikabot will transmit collected system information encrypted using RC4.82
S1031 PingPull PingPull has the ability to exfiltrate stolen victim data through its C2 channel.173
S0013 PlugX PlugX has exfiltrated stolen data and files to its C2 server.160161
S0428 PoetRAT PoetRAT has exfiltrated data over the C2 channel.12
S1173 PowerExchange PowerExchange can exfiltrate files via its email C2 channel.59
S0441 PowerShower PowerShower has used a PowerShell document stealer module to pack and exfiltrate .txt, .pdf, .xls or .doc files smaller than 5MB that were modified during the past two days.111
S0238 Proxysvc Proxysvc performs data exfiltration over the control server channel using a custom protocol.148
S0078 Psylo Psylo exfiltrates data to its C2 server over the same protocol as C2 communications.67
S0147 Pteranodon Pteranodon exfiltrates screenshot files to its C2 server.134
S0192 Pupy Pupy can send screenshots files, keylogger data, files, and recorded audio back to the C2 server.5
S0650 QakBot QakBot can send stolen information to C2 nodes including passwords, accounts, and emails.55
S1148 Raccoon Stealer Raccoon Stealer uses existing HTTP-based command and control channels for exfiltration.133132131
S0495 RDAT RDAT can exfiltrate data gathered from the infected system via the established Exchange Web Services API C2 channel.157
S1240 RedLine Stealer RedLine Stealer has sent victim data to its C2 server or RedLine panel server.130
C0056 RedPenguin During RedPenguin, UNC3886 uploaded specified files from compromised devices to a remote server. 219
S0375 Remexi Remexi performs exfiltration over BITSAdmin, which is also used for the C2 channel.75
S0496 REvil REvil can exfiltrate host and malware information to C2 servers.66
S0448 Rising Sun Rising Sun can send data gathered from the infected machine via HTTP POST request to the C2.139
S0240 ROKRAT ROKRAT can send collected files back over same C2 channel.92
S1078 RotaJakiro RotaJakiro sends device and other collected data back to the C2 using the established C2 channels over TCP. 169
S0085 S-Type S-Type has uploaded data and files from a compromised host to its C2 servers.39
S1210 Sagerunex Sagerunex encrypts collected system data then exfiltrates via existing command and control channels.14
G0034 Sandworm Team Sandworm Team has sent system information to its C2 server using HTTP.178
G1015 Scattered Spider Scattered Spider has exfiltrated data from compromised VMware vCenter servers through an established C2 channel using the Teleport remote access tool.176
S0461 SDBbot SDBbot has sent collected data from a compromised host to its C2 servers.120
C0058 SharePoint ToolShell Exploitation During SharePoint ToolShell Exploitation, threat actors exfiltrated stolen credentials and internal data over HTTPS to C2 infrastructure.218
S1019 Shark Shark has the ability to upload files from the compromised host over a DNS or HTTP C2 channel.13
S1089 SharpDisco SharpDisco can load a plugin to exfiltrate stolen files to SMB shares also used in C2.30
S0445 ShimRatReporter ShimRatReporter sent generated reports to the C2 via HTTP POST requests.2
S1178 ShrinkLocker ShrinkLocker will exfiltrate victim system information along with the encryption key via an HTTP POST.105106
S0610 SideTwist SideTwist has exfiltrated data over its C2 channel.137
S0692 SILENTTRINITY SILENTTRINITY can transfer files from an infected host to the C2 server.6
S0633 Sliver Sliver can exfiltrate files from the victim using the download command.8
S0533 SLOTHFULMEDIA SLOTHFULMEDIA has sent system information to a C2 server via HTTP and HTTPS POST requests.15
S0649 SMOKEDHAM SMOKEDHAM has exfiltrated data to its C2 server.122
S1166 Solar Solar can send staged files to C2 for exfiltration.113
S0615 SombRAT SombRAT has uploaded collected data and files from a compromised host to its C2 server.119
S0543 Spark Spark has exfiltrated data over the C2 channel.159
S1030 Squirrelwaffle Squirrelwaffle has exfiltrated victim data using HTTP POST requests to its C2 servers.35
S1037 STARWHALE STARWHALE can exfiltrate collected data to its C2 servers.53
G0038 Stealth Falcon After data is collected by Stealth Falcon malware, it is exfiltrated over the existing C2 channel.209
S1183 StrelaStealer StrelaStealer exfiltrates collected email credentials via HTTP POST to command and control servers.17161819
S1034 StrifeWater StrifeWater can send data and files from a compromised host to its C2 server.112
S0491 StrongPity StrongPity can exfiltrate collected documents through C2 channels.4243
S0603 Stuxnet Stuxnet sends compromised victim information via HTTP.85
S1042 SUGARDUMP SUGARDUMP has sent stolen credentials and other data to its C2 server.34
S1064 SVCReady SVCReady can send collected data in JSON format to its C2 server.64
S0663 SysUpdate SysUpdate has exfiltrated data over its C2 channel.103
S0467 TajMahal TajMahal has the ability to send collected files over its C2.80
S0595 ThiefQuest ThiefQuest exfiltrates targeted file extensions in the /Users/ folder to the command and control server via unencrypted HTTP. Network packets contain a string with two pieces of information: a file path and the contents of the file in a base64 encoded string.9495
S0671 Tomiris Tomiris can upload files matching a hardcoded set of extensions, such as .doc, .docx, .pdf, and .rar, to its C2 server.153
S0678 Torisma Torisma can send victim data to an actor-controlled C2 server.33
S1201 TRANSLATEXT TRANSLATEXT has exfiltrated collected credentials to the C2 server.50
S0266 TrickBot TrickBot can send information about the compromised host and upload data to a hardcoded C2 server.5152
S1196 Troll Stealer Troll Stealer exfiltrates collected information to its command and control infrastructure.140
S0386 Ursnif Ursnif has used HTTP POSTs to exfil gathered information.565857
S0476 Valak Valak has the ability to exfiltrate data over the C2 channel.110108109
S0670 WarzoneRAT WarzoneRAT can send collected victim data to its C2 server.32
G1035 Winter Vivern Winter Vivern delivered a PowerShell script capable of recursively scanning victim machines looking for various file types before exfiltrating identified files via HTTP.201
G0102 Wizard Spider Wizard Spider has exfiltrated domain credentials and network enumeration information over command and control (C2) channels.202203
S1065 Woody RAT Woody RAT can exfiltrate files from an infected machine to its C2 server.41
S0658 XCSSET XCSSET retrieves files that match the pattern defined in the INAME_QUERY variable within the user’s home directory, such as *test.txt, and are below a specific size limit. It then archives the files and exfiltrates the data over its C2 channel.4647
S1248 XORIndex Loader XORIndex Loader has exfiltrated victim data using HTTPS POST requests to its C2 servers.21
S0251 Zebrocy Zebrocy has exfiltrated data to the designated C2 server using HTTP POST requests.7374
G0128 ZIRCONIUM ZIRCONIUM has exfiltrated files via the Dropbox API C2.198
S0086 ZLib ZLib has sent data and files from a compromised host to its C2 servers.39

Mitigations

ID Mitigation Description
M1057 Data Loss Prevention Data loss prevention can detect and block sensitive data being sent over unencrypted protocols.
M1031 Network Intrusion Prevention Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level. Signatures are often for unique indicators within protocols and may be based on the specific obfuscation technique used by a particular adversary or tool, and will likely be different across various malware families and versions. Adversaries will likely change tool command and control signatures over time or construct protocols in such a way to avoid detection by common defensive tools. 1

References


  1. Gardiner, J., Cova, M., Nagaraja, S. (2014, February). Command & Control Understanding, Denying and Detecting. Retrieved April 20, 2016. 

  2. Yonathan Klijnsma. (2016, May 17). Mofang: A politically motivated information stealing adversary. Retrieved May 12, 2020. 

  3. Adamitis, D. et al. (2019, June 4). It’s alive: Threat actors cobble together open-source pieces into monstrous Frankenstein campaign. Retrieved May 11, 2020. 

  4. Schroeder, W., Warner, J., Nelson, M. (n.d.). Github PowerShellEmpire. Retrieved April 28, 2016. 

  5. Nicolas Verdier. (n.d.). Retrieved January 29, 2018. 

  6. Salvati, M. (2019, August 6). SILENTTRINITY Modules. Retrieved March 24, 2022. 

  7. QiAnXin Threat Intelligence Center. (2019, February 18). APT-C-36: Continuous Attacks Targeting Colombian Government Institutions and Corporations. Retrieved May 5, 2020. 

  8. BishopFox. (n.d.). Sliver Download. Retrieved September 16, 2021. 

  9. Vrabie, V. (2020, November). Dissecting a Chinese APT Targeting South Eastern Asian Government Institutions. Retrieved September 19, 2022. 

  10. Hromcova, Z. and Burgher, A. (2023, December 14). OilRig’s persistent attacks using cloud service-powered downloaders. Retrieved November 26, 2024. 

  11. Falcone, R. (2019, March 4). New Python-Based Payload MechaFlounder Used by Chafer. Retrieved May 27, 2020. 

  12. Mercer, W. Rascagneres, P. Ventura, V. (2020, October 6). PoetRAT: Malware targeting public and private sector in Azerbaijan evolves . Retrieved April 9, 2021. 

  13. ClearSky Cyber Security . (2021, August). New Iranian Espionage Campaign By “Siamesekitten” - Lyceum. Retrieved June 6, 2022. 

  14. Joey Chen, Cisco Talos. (2025, February 27). Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools. Retrieved March 15, 2025. 

  15. DHS/CISA, Cyber National Mission Force. (2020, October 1). Malware Analysis Report (MAR) MAR-10303705-1.v1 – Remote Access Trojan: SLOTHFULMEDIA. Retrieved October 2, 2020. 

  16. Benjamin Chang, Goutam Tripathy, Pranay Kumar Chhaparwal, Anmol Maurya & Vishwa Thothathri, Palo Alto Networks. (2024, March 22). Large-Scale StrelaStealer Campaign in Early 2024. Retrieved December 31, 2024. 

  17. DCSO CyTec Blog. (2022, November 8). #ShortAndMalicious: StrelaStealer aims for mail credentials. Retrieved December 31, 2024. 

  18. Fortgale. (2023, September 18). StrelaStealer Malware Analysis. Retrieved December 31, 2024. 

  19. Golo Mühr, Joe Fasulo & Charlotte Hammond, IBM X-Force. (2024, November 12). Strela Stealer: Today’s invoice is tomorrow’s phish. Retrieved December 31, 2024. 

  20. Unit 42. (2022, February 25). Spear Phishing Attacks Target Organizations in Ukraine, Payloads Include the Document Stealer OutSteel and the Downloader SaintBot. Retrieved June 9, 2022. 

  21. Kirill Boychenko. (2025, July 14). Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader. Retrieved October 19, 2025. 

  22. Unit 42. (2023, November 21). Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors. Retrieved October 17, 2025. 

  23. Unit42. (2024, October 9). Contagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malware. Retrieved October 17, 2025. 

  24. Check Point. (2020, November 26). Bandook: Signed & Delivered. Retrieved May 31, 2021. 

  25. Knight, S.. (2020, April 16). VMware Carbon Black TAU Threat Analysis: The Evolution of Lazarus. Retrieved May 1, 2020. 

  26. Shivtarkar, N. and Kumar, A. (2022, June 9). Lyceum .NET DNS Backdoor. Retrieved June 23, 2022. 

  27. ESET. (2019, July). MACHETE JUST GOT SHARPER Venezuelan government institutions under attack. Retrieved September 13, 2019. 

  28. Stolyarov, V. (2022, March 17). Exposing initial access broker with ties to Conti. Retrieved August 18, 2022. 

  29. Cybersecurity and Infrastructure Security Agency. (2021, February 21). AppleJeus: Analysis of North Korea’s Cryptocurrency Malware. Retrieved March 1, 2021. 

  30. Faou, M. (2023, August 10). MoustachedBouncer: Espionage against foreign diplomats in Belarus. Retrieved September 25, 2023. 

  31. Cisco Talos. (2024, April 24). ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices. Retrieved January 6, 2025. 

  32. Harakhavik, Y. (2020, February 3). Warzone: Behind the enemy lines. Retrieved December 17, 2021. 

  33. Beek, C. (2020, November 5). Operation North Star: Behind The Scenes. Retrieved December 20, 2021. 

  34. Mandiant Israel Research Team. (2022, August 17). Suspected Iranian Actor Targeting Israeli Shipping, Healthcare, Government and Energy Sectors. Retrieved September 21, 2022. 

  35. Kumar, A., Stone-Gross, Brett. (2021, September 28). Squirrelwaffle: New Loader Delivering Cobalt Strike. Retrieved August 9, 2022. 

  36. Ramin Nafisi. (2021, September 27). FoggyWeb: Targeted NOBELIUM malware leads to persistent backdoor. Retrieved October 4, 2021. 

  37. Giuliani, M., Allievi, A. (2011, February 28). Carberp - a modular information stealing trojan. Retrieved September 12, 2024. 

  38. Trusteer Fraud Prevention Center. (2010, October 7). Carberp Under the Hood of Carberp: Malware & Configuration Analysis. Retrieved July 15, 2020. 

  39. Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021. 

  40. Jurčacko, F. (2024, May 15). To the Moon and back(doors): Lunar landing in diplomatic missions. Retrieved June 26, 2024. 

  41. MalwareBytes Threat Intelligence Team. (2022, August 3). Woody RAT: A new feature-rich malware spotted in the wild. Retrieved December 6, 2022. 

  42. Mercer, W. et al. (2020, June 29). PROMETHIUM extends global reach with StrongPity3 APT. Retrieved July 20, 2020. 

  43. Tudorica, R. et al. (2020, June 30). StrongPity APT - Revealing Trojanized Tools, Working Hours and Infrastructure. Retrieved July 20, 2020. 

  44. FireEye Labs. (2015, April). APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION. Retrieved November 17, 2024. 

  45. Stuart Ashenbrenner, Alden Schmidt. (2024, April 25). LightSpy Malware Variant Targeting macOS. Retrieved January 3, 2025. 

  46. Mac Threat Response, Mobile Research Team. (2020, August 13). The XCSSET Malware: Inserts Malicious Code Into Xcode Projects, Performs UXSS Backdoor Planting in Safari, and Leverages Two Zero-day Exploits. Retrieved October 5, 2021. 

  47. Microsoft Threat Intelligence. (2025, March 11). New XCSSET malware adds new obfuscation, persistence techniques to infect Xcode projects. Retrieved April 2, 2025. 

  48. Faou, M. (2019, May). Turla LightNeuron: One email away from remote code execution. Retrieved June 24, 2019. 

  49. ESET. (2020, April 28). Grandoreiro: How engorged can an EXE get?. Retrieved November 13, 2020. 

  50. Park, S. (2024, June 27). Kimsuky deploys TRANSLATEXT to target South Korean academia. Retrieved October 14, 2024. 

  51. Dahan, A. et al. (2019, December 11). DROPPING ANCHOR: FROM A TRICKBOT INFECTION TO THE DISCOVERY OF THE ANCHOR MALWARE. Retrieved September 10, 2020. 

  52. Radu Tudorica. (2021, July 12). A Fresh Look at Trickbot’s Ever-Improving VNC Module. Retrieved September 28, 2021. 

  53. FBI, CISA, CNMF, NCSC-UK. (2022, February 24). Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks. Retrieved September 27, 2022. 

  54. Cash, D., Grunzweig, J., Meltzer, M., Adair, S., Lancaster, T. (2021, August 17). North Korean APT InkySquid Infects Victims Using Browser Exploits. Retrieved September 30, 2021. 

  55. Kuzmenko, A. et al. (2021, September 2). QakBot technical analysis. Retrieved September 27, 2021. 

  56. Caragay, R. (2015, March 26). URSNIF: The Multifaceted Malware. Retrieved June 5, 2019. 

  57. Proofpoint Staff. (2016, August 25). Nightmare on Tor Street: Ursnif variant Dreambot adds Tor functionality. Retrieved June 5, 2019. 

  58. Vaish, A. & Nemes, S. (2017, November 28). Newly Observed Ursnif Variant Employs Malicious TLS Callback Technique to Achieve Process Injection. Retrieved June 5, 2019. 

  59. Symantec Threat Hunter Team. (2023, October 19). Crambus: New Campaign Targets Middle Eastern Government. Retrieved November 27, 2024. 

  60. Falcone, R., Lee, B. (2018, November 20). Sofacy Continues Global Attacks and Wheels Out New ‘Cannon’ Trojan. Retrieved November 26, 2018. 

  61. Adi Zeligson & Rotem Kerner. (2018, November 13). Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign. Retrieved February 9, 2024. 

  62. Check Point. (2022, January 11). APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit. Retrieved January 24, 2022. 

  63. Kaspersky Lab’s Global Research & Analysis Team. (2018, October 15). Octopus-infested seas of Central Asia. Retrieved November 14, 2018. 

  64. Schlapfer, Patrick. (2022, June 6). A New Loader Gets Ready. Retrieved December 13, 2022. 

  65. ESET Research. (2019, October 3). Casbaneiro: peculiarities of this banking Trojan that affects Brazil and Mexico. Retrieved September 23, 2021. 

  66. Counter Threat Unit Research Team. (2019, September 24). REvil/Sodinokibi Ransomware. Retrieved August 4, 2020. 

  67. Falcone, R. and Miller-Osborn, J.. (2016, January 24). Scarlet Mimic: Years-Long Espionage Campaign Targets Minority Activists. Retrieved February 10, 2016. 

  68. Binary Defense. (n.d.). Emotet Evolves With new Wi-Fi Spreader. Retrieved September 8, 2023. 

  69. Trend Micro. (2019, January 16). Exploring Emotet’s Activities . Retrieved March 25, 2019. 

  70. Kasuya, M. (2020, January 8). Threat Spotlight: Amadey Bot Targets Non-Russian Users. Retrieved July 14, 2022. 

  71. Trustwave SpiderLabs. (2020, June 25). The Golden Tax Department and Emergence of GoldenSpy Malware. Retrieved July 23, 2020. 

  72. GReAT. (2019, April 10). Gaza Cybergang Group1, operation SneakyPastes. Retrieved May 13, 2020. 

  73. Accenture Security. (2018, November 29). SNAKEMACKEREL. Retrieved April 15, 2019. 

  74. CISA. (2020, October 29). Malware Analysis Report (AR20-303B). Retrieved December 9, 2020. 

  75. Legezo, D. (2019, January 30). Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities. Retrieved April 17, 2019. 

  76. Fishbein, N., Kajiloti, M.. (2020, July 28). Watch Your Containers: Doki Infecting Docker Servers in the Cloud. Retrieved March 30, 2021. 

  77. Kayal, A. et al. (2021, October). LYCEUM REBORN: COUNTERINTELLIGENCE IN THE MIDDLE EAST. Retrieved June 14, 2022. 

  78. Asheer Malhotra & Vitor Ventura. (2022, August 2). Manjusaka: A Chinese sibling of Sliver and Cobalt Strike. Retrieved September 4, 2024. 

  79. CrowdStrike. (2022, May). ICEAPPLE: A NOVEL INTERNET INFORMATION SERVICES (IIS) POST-EXPLOITATION FRAMEWORK. Retrieved June 27, 2022. 

  80. GReAT. (2019, April 10). Project TajMahal – a sophisticated new APT framework. Retrieved October 14, 2019. 

  81. Threat Intelligence Team. (2021, December 2). SideCopy APT: Connecting lures victims, payloads to infrastructure. Retrieved June 13, 2022. 

  82. Daniel Stepanic & Salim Bitam. (2024, February 23). PIKABOT, I choose you!. Retrieved July 12, 2024. 

  83. Kohler, A. and Lopez, C. (2024, April 30). Malware: Cuckoo Behaves Like Cross Between Infostealer and Spyware. Retrieved August 20, 2024. 

  84. Jenkins, L. at al. (2022, August 4). ROADSWEEP Ransomware - Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations. Retrieved August 6, 2024. 

  85. Nicolas Falliere, Liam O Murchu, Eric Chien 2011, February W32.Stuxnet Dossier (Version 1.4) Retrieved November 17, 2024. 

  86. US-CERT. (2019, April 10). MAR-10135536-8 – North Korean Trojan: HOPLIGHT. Retrieved April 19, 2019. 

  87. Hromcova, Z. (2019, July). OKRUM AND KETRICAN: AN OVERVIEW OF RECENT KE3CHANG GROUP ACTIVITY. Retrieved May 6, 2020. 

  88. Salem, E. (2019, February 13). ASTAROTH MALWARE USES LEGITIMATE OS AND ANTIVIRUS PROCESSES TO STEAL PASSWORDS AND PERSONAL DATA. Retrieved April 17, 2019. 

  89. N. Baisini. (2022, July 13). Transparent Tribe begins targeting education sector in latest campaign. Retrieved September 22, 2022. 

  90. Patil, S. and Williams, M.. (2019, June 5). Government Sector in Central Asia Targeted With New HAWKBALL Backdoor Delivered via Microsoft Office Vulnerabilities. Retrieved June 20, 2019. 

  91. Kazem, M. (2019, November 25). Trojan:W32/Lokibot. Retrieved May 15, 2020. 

  92. Mercer, W., Rascagneres, P. (2017, April 03). Introducing ROKRAT. Retrieved May 21, 2018. 

  93. CheckPoint Research. (2021, July 1). IndigoZebra APT continues to attack Central Asia with evolving tools. Retrieved September 24, 2021. 

  94. Patrick Wardle. (2020, July 3). OSX.EvilQuest Uncovered part ii: insidious capabilities. Retrieved March 21, 2021. 

  95. Thomas Reed. (2020, July 7). Mac ThiefQuest malware may not be ransomware after all. Retrieved March 22, 2021. 

  96. Hromcova, Z. (2019, October). AT COMMANDS, TOR-BASED COMMUNICATIONS: MEET ATTOR, A FANTASY CREATURE AND ALSO A SPY PLATFORM. Retrieved May 6, 2020. 

  97. Adamitis, D. (2020, May 6). Phantom in the Command Shell. Retrieved November 17, 2024. 

  98. NHS Digital . (2020, August 20). BLINDINGCAN Remote Access Trojan. Retrieved August 20, 2020. 

  99. US-CERT. (2020, August 19). MAR-10295134-1.v1 – North Korean Remote Access Trojan: BLINDINGCAN. Retrieved August 19, 2020. 

  100. Batista, J. (2024, June 17). Latrodectus, are you coming back?. Retrieved September 13, 2024. 

  101. Proofpoint Threat Research and Team Cymru S2 Threat Research. (2024, April 4). Latrodectus: This Spider Bytes Like Ice . Retrieved May 31, 2024. 

  102. Daniel Lunghi. (2023, March 1). Iron Tiger’s SysUpdate Reappears, Adds Linux Targeting. Retrieved March 20, 2023. 

  103. GReAT. (2021, June 16). Ferocious Kitten: 6 Years of Covert Surveillance in Iran. Retrieved September 22, 2021. 

  104. Cristian Souza, Eduardo Ovalle, Ashley Muñoz, & Christopher Zachor. (2024, May 23). ShrinkLocker: Turning BitLocker into ransomware. Retrieved December 7, 2024. 

  105. Splunk Threat Research Team , Teoderick Contreras. (2024, September 5). ShrinkLocker Malware: Abusing BitLocker to Lock Your Data. Retrieved December 7, 2024. 

  106. M.Léveillé, M., Cherepanov, A.. (2022, January 25). Watering hole deploys new macOS malware, DazzleSpy, in Asia. Retrieved May 6, 2022. 

  107. Duncan, B. (2020, July 24). Evolution of Valak, from Its Beginnings to Mass Distribution. Retrieved August 31, 2020. 

  108. Reaves, J. and Platt, J. (2020, June). Valak Malware and the Connection to Gozi Loader ConfCrew. Retrieved August 31, 2020. 

  109. Salem, E. et al. (2020, May 28). VALAK: MORE THAN MEETS THE EYE . Retrieved June 19, 2020. 

  110. GReAT. (2019, August 12). Recent Cloud Atlas activity. Retrieved May 8, 2020. 

  111. Cybereason Nocturnus. (2022, February 1). StrifeWater RAT: Iranian APT Moses Staff Adds New Trojan to Ransomware Operations. Retrieved August 15, 2022. 

  112. Hromcova, Z. and Burgher, A. (2023, September 21). OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes. Retrieved November 21, 2024. 

  113. Ehrlich, A., et al. (2022, September). THE MYSTERY OF METADOR | AN UNATTRIBUTED THREAT HIDING IN TELCOS, ISPS, AND UNIVERSITIES. Retrieved January 23, 2023. 

  114. Cara Lin, Fortinet. (2024, January 8). Deceptive Cracked Software Spreads Lumma Variant on YouTube. Retrieved March 22, 2025. 

  115. Vishwajeet Kumar, Qualys. (2024, October 20). Unmasking Lumma Stealer: Analyzing Deceptive Tactics with Fake CAPTCHA. Retrieved March 22, 2025. 

  116. Dupuy, T. and Faou, M. (2021, June). Gelsemium. Retrieved November 30, 2021. 

  117. Anton Cherepanov. (2017, June 12). Win32/Industroyer: A new threat for industrial controls systems. Retrieved December 18, 2020. 

  118. The BlackBerry Research and Intelligence Team. (2020, November 12). The CostaRicto Campaign: Cyber-Espionage Outsourced. Retrieved May 24, 2021. 

  119. Financial Security Institute. (2020, February 28). Profiling of TA505 Threat Group That Continues to Attack the Financial Sector. Retrieved July 14, 2022. 

  120. Asheer Malhotra, Vitor Ventura & Jungsoo An, Cisco Talos. (2022, September 7). MagicRAT: Lazarus’ latest gateway into victim networks. Retrieved December 30, 2024. 

  121. FireEye. (2021, June 16). Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise. Retrieved September 22, 2021. 

  122. Hada, H. (2021, December 28). Flagpro The new malware used by BlackTech. Retrieved March 25, 2022. 

  123. Jazi, H. (2021, June 1). Kimsuky APT continues to target South Korean government using AppleSeed backdoor. Retrieved June 10, 2021. 

  124. NSA/FBI. (2020, August). Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware. Retrieved August 25, 2020. 

  125. ClearSky Cyber Security. (2021, January). “Lebanese Cedar” APT Global Lebanese Espionage Campaign Leveraging Web Servers. Retrieved February 10, 2021. 

  126. Hawley, S. et al. (2023, February 2). Turla: A Galaxy of Opportunity. Retrieved May 15, 2023. 

  127. Kirill Boychenko. (2025, April 4). Lazarus Expands Malicious npm Campaign: 11 New Packages Add Malware Loaders and Bitbucket Payloads. Retrieved October 20, 2025. 

  128. Kirill Boychenko. (2025, June 25). Another Wave: North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages. Retrieved October 19, 2025. 

  129. Proofpoint Threat Insight Team, Jeremy H, Axel F. (2020, March 16). New Redline Password Stealer Malware. Retrieved September 17, 2025. 

  130. Pierre Le Bourhis, Quentin Bourgue, & Sekoia TDR. (2022, June 29). Raccoon Stealer v2 - Part 2: In-depth analysis. Retrieved August 1, 2024. 

  131. Quentin Bourgue, Pierre le Bourhis, & Sekoia TDR. (2022, June 28). Raccoon Stealer v2 - Part 1: The return of the dead. Retrieved August 1, 2024. 

  132. S2W TALON. (2022, June 16). Raccoon Stealer is Back with a New Version. Retrieved August 1, 2024. 

  133. Kasza, A. and Reichel, D. (2017, February 27). The Gamaredon Group Toolset Evolution. Retrieved March 1, 2017. 

  134. Dumont, R., M.Léveillé, M., Porcher, H. (2018, December 1). THE DARK SIDE OF THE FORSSHE A landscape of OpenSSH backdoors. Retrieved July 16, 2020. 

  135. SentinelLabs. (2022, September 22). Metador Technical Appendix. Retrieved April 4, 2023. 

  136. Check Point. (2021, April 8). Iran’s APT34 Returns with an Updated Arsenal. Retrieved May 5, 2021. 

  137. Mercer, W., et al. (2020, March 5). Bisonal: 10 years of play. Retrieved January 26, 2022. 

  138. Sherstobitoff, R., Malhotra, A., et. al.. (2018, December 18). Operation Sharpshooter Campaign Targets Global Defense, Critical Infrastructure. Retrieved May 14, 2020. 

  139. Jiho Kim & Sebin Lee, S2W. (2024, February 7). Kimsuky disguised as a Korean company signed with a valid certificate to distribute Troll Stealer (English ver.). Retrieved January 17, 2025. 

  140. Amitai Ben & Shushan Ehrlich. (2021, May). From Wiper to Ransomware: The Evolution of Agrius. Retrieved May 21, 2024. 

  141. Pascual, C. (2018, November 27). AutoIt-Compiled Worm Affecting Removable Media Delivers Fileless Version of BLADABINDI/njRAT Backdoor. Retrieved June 4, 2019. 

  142. Dahan, A. et al. (2020, November 2). Back to the Future: Inside the Kimsuky KGH Spyware Suite. Retrieved November 6, 2020. 

  143. Mike Stokkel et al. (2024, July 18). APT41 Has Arisen From the DUST. Retrieved September 16, 2024. 

  144. Chen, Joey. (2022, June 9). Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years. Retrieved July 14, 2022. 

  145. ESET Security. (2019, November 19). Mispadu: Advertisement for a discounted Unhappy Meal. Retrieved March 13, 2024. 

  146. SCILabs. (2021, December 23). Cyber Threat Profile Malteiro. Retrieved March 13, 2024. 

  147. Sherstobitoff, R., Malhotra, A. (2018, April 24). Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide. Retrieved May 16, 2018. 

  148. Rascagneres, P. (2017, May 03). KONNI: A Malware Under The Radar For Years. Retrieved November 5, 2018. 

  149. Santos, R. (2022, January 26). KONNI evolves into stealthier RAT. Retrieved April 13, 2022. 

  150. Threat Intelligence Team. (2021, August 23). New variant of Konni malware used in campaign targetting Russia. Retrieved January 5, 2022. 

  151. Seongsu Park. (2024, November 4). From Pyongyang to Your Payroll: The Rise of North Korean Remote Workers in the West. Retrieved October 17, 2025. 

  152. Kwiatkoswki, I. and Delcher, P. (2021, September 29). DarkHalo After SolarWinds: the Tomiris connection. Retrieved December 27, 2021. 

  153. Leonardo. (2020, May 29). MALWARE TECHNICAL INSIGHT TURLA “Penquin_x64”. Retrieved March 11, 2021. 

  154. Microsoft. (2022, June 2). Exposing POLONIUM activity and infrastructure targeting Israeli organizations. Retrieved July 1, 2022. 

  155. Sherstobitoff, R. (2018, March 08). Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant. Retrieved May 18, 2018. 

  156. Falcone, R. (2020, July 22). OilRig Targets Middle Eastern Telecommunications Organization and Adds Novel C2 Channel with Steganography to Its Inventory. Retrieved July 28, 2020. 

  157. Yamout, M. (2021, November 29). WIRTE’s campaign in the Middle East ‘living off the land’ since at least 2019. Retrieved February 1, 2022. 

  158. Falcone, R., et al. (2020, March 3). Molerats Delivers Spark Backdoor to Government and Telecommunications Organizations. Retrieved December 14, 2020. 

  159. Secureworks Counter Threat Unit Research Team. (2022, April 27). BRONZE PRESIDENT Targets Russian Speakers with Updated PlugX. Retrieved September 9, 2025. 

  160. ESET. (2016, October). En Route with Sednit - Part 2: Observing the Comings and Goings. Retrieved November 21, 2016. 

  161. Dahan, A. (2017). Operation Cobalt Kitty. Retrieved December 27, 2018. 

  162. Nafisi, R., Lelli, A. (2021, March 4). GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence. Retrieved March 8, 2021. 

  163. Smith, L., Leathery, J., Read, B. (2021, March 4). New SUNSHUTTLE Second-Stage Backdoor Uncovered Targeting U.S.-Based Entity; Possible Connection to UNC2452. Retrieved March 12, 2021. 

  164. Bilodeau, O., Bureau, M., Calvet, J., Dorais-Joncas, A., Léveillé, M., Vanheuverzwijn, B. (2014, March 18). Operation Windigo – the vivisection of a large Linux server‑side credential‑stealing malware campaign. Retrieved February 10, 2021. 

  165. Marc-Etienne M.Léveillé. (2024, May 1). Ebury is alive but unseen. Retrieved May 21, 2024. 

  166. hasherezade. (2015, November 4). A Technical Look At Dyreza. Retrieved June 15, 2020. 

  167. Alex Turing, Hui Wang. (2021, April 28). RotaJakiro: A long live secret backdoor with 0 VT detection. Retrieved June 14, 2023. 

  168. Priego, A. (2021, July). THE BROTHERS GRIM: THE REVERSING TALE OF GRIMAGENT MALWARE USED BY RYUK. Retrieved September 19, 2024. 

  169. Savelesky, K., et al. (2019, July 23). ABADBABE 8BADFOOD: Discovering BADHATCH and a Detailed Look at FIN8’s Tooling. Retrieved September 8, 2021. 

  170. Vrabie, V., et al. (2021, March 10). FIN8 Returns with Improved BADHATCH Toolkit. Retrieved September 8, 2021. 

  171. Unit 42. (2022, June 13). GALLIUM Expands Targeting Across Telecommunications, Government and Finance Sectors With New PingPull Tool. Retrieved August 7, 2022. 

  172. Faou, M. (2020, December 2). Turla Crutch: Keeping the “back door” open. Retrieved December 4, 2020. 

  173. Lee, B., Falcone, R. (2018, February 23). OopsIE! OilRig Uses ThreeDollars to Deliver New Trojan. Retrieved July 16, 2018. 

  174. Mandiant Incident Response. (2025, July 23). From Help Desk to Hypervisor: Defending Your VMware vSphere Estate from UNC3944. Retrieved October 13, 2025. 

  175. Lechtik, M, and etl. (2021, July 14). LuminousMoth APT: Sweeping attacks for the chosen few. Retrieved October 20, 2022. 

  176. Cherepanov, A.. (2016, December 13). The rise of TeleBots: Analyzing disruptive KillDisk attacks. Retrieved June 10, 2020. 

  177. Jansen, W . (2021, January 12). Abusing cloud services to fly under the radar. Retrieved September 12, 2024. 

  178. Cybereason Nocturnus. (2019, June 25). Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers. Retrieved July 18, 2019. 

  179. Singh, S. Singh, A. (2020, June 11). The Return on the Higaisa APT. Retrieved March 2, 2021. 

  180. Villeneuve, N., Bennett, J. T., Moran, N., Haq, T., Scott, M., & Geers, K. (2014). OPERATION “KE3CHANG”: Targeted Attacks Against Ministries of Foreign Affairs. Retrieved November 12, 2014. 

  181. FBI. (2020, September 17). Indicators of Compromise Associated with Rana Intelligence Computing, also known as Advanced Persistent Threat 39, Chafer, Cadelspy, Remexi, and ITG07. Retrieved December 10, 2020. 

  182. Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Loaders, Installers and Uninstallers Report. Retrieved November 17, 2024. 

  183. Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016. 

  184. Sherstobitoff, R. (2018, February 12). Lazarus Resurfaces, Targets Global Banks and Bitcoin Users. Retrieved February 19, 2018. 

  185. Asheer Malhotra, Jungsoo An, Kendall Mc. (2022, May 5). Mustang Panda deploys a new wave of malware targeting Europe. Retrieved August 4, 2025. 

  186. EclecticIQ Threat Research Team. (2023, February 2). Mustang Panda APT Group Uses European Commission-Themed Lure to Deliver PlugX Malware. Retrieved September 9, 2025. 

  187. Chen, X., Scott, M., Caselden, D.. (2014, April 26). New Zero-Day Exploit targeting Internet Explorer Versions 9 through 11 Identified in Targeted Attacks. Retrieved January 14, 2016. 

  188. Dumont, R. (2019, March 20). Fake or Fake: Keeping up with OceanLotus decoys. Retrieved April 1, 2019. 

  189. Aleksandar Milenkoski, Sreekar Madabushi, Kenneth Kinion. (2025, September 4). Contagious Interview | North Korean Threat Actors Reveal Plans and Ops by Abusing Cyber Intel Platforms. Retrieved October 20, 2025. 

  190. eSentire Threat Response Unit (TRU). (2024, November 14). Bored BeaverTail & InvisibleFerret Yacht Club – A Lazarus Lure Pt.2. Retrieved October 17, 2025. 

  191. Insikt Group. (2025, February 13). Inside the Scam: North Korea’s IT Worker Threat. Retrieved October 17, 2025. 

  192. Matej Havranek. (2025, February 20). DeceptiveDevelopment targets freelance developers. Retrieved October 17, 2025. 

  193. Ryan Sherstobitoff. (2024, October 29). Inside a North Korean Phishing Operation Targeting DevOps Employees. Retrieved October 20, 2025. 

  194. An, J and Malhotra, A. (2021, November 10). North Korean attackers use malicious blogs to deliver malware to high-profile South Korean targets. Retrieved December 29, 2021. 

  195. Tarakanov , D.. (2013, September 11). The “Kimsuky” Operation: A North Korean APT?. Retrieved August 13, 2019. 

  196. Singh, S. and Antil, S. (2020, October 27). APT-31 Leverages COVID-19 Vaccine Theme and Abuses Legitimate Online Services. Retrieved March 24, 2021. 

  197. Microsoft Incident Response. (2023, July 6). The five-day job: A BlackByte ransomware intrusion case study. Retrieved December 16, 2024. 

  198. Lunghi, D. (2021, August 17). Confucius Uses Pegasus Spyware-related Lures to Target Pakistani Military. Retrieved December 26, 2021. 

  199. CERT-UA. (2023, February 1). UAC-0114 aka Winter Vivern to target Ukrainian and Polish GOV entities (CERT-UA#5909). Retrieved July 29, 2024. 

  200. John, E. and Carvey, H. (2019, May 30). Unraveling the Spiderweb: Timelining ATT&CK Artifacts Used by GRIM SPIDER. Retrieved May 12, 2020. 

  201. Shilko, J., et al. (2021, October 7). FIN12: The Prolific Ransomware Intrusion Threat Actor That Has Aggressively Pursued Healthcare Targets. Retrieved June 15, 2023. 

  202. Or Chechik, Tom Fakterman, Daniel Frank & Assaf Dahan. (2023, November 6). Agonizing Serpens (Aka Agrius) Targeting the Israeli Higher Education and Tech Sectors. Retrieved May 22, 2024. 

  203. CISA. (2021, July 19). (AA21-200A) Joint Cybersecurity Advisory – Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department. Retrieved August 12, 2021. 

  204. Rusnák, Z. (2024, September 26). Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023. Retrieved October 30, 2024. 

  205. Threat Hunter Team, Symantec and Carbon Black. (2025, April 10). Shuckworm Targets Foreign Military Mission Based in Ukraine. Retrieved July 23, 2025. 

  206. Reaqta. (2017, November 22). A dive into MuddyWater APT targeting Middle-East. Retrieved May 18, 2020. 

  207. Marczak, B. and Scott-Railton, J.. (2016, May 29). Keep Calm and (Don’t) Enable Macros: A New Threat Actor Targets UAE Dissidents. Retrieved June 8, 2016. 

  208. PwC Threat Intelligence. (2023, October 25). Yellow Liderc ships its scripts and delivers IMAPLoader malware. Retrieved August 14, 2024. 

  209. CISA. (2022, September 23). AA22-264A Iranian State Actors Conduct Cyber Operations Against the Government of Albania. Retrieved August 6, 2024. 

  210. Canadian Centre for Cyber Security. (2024, April 24). Cyber Activity Impacting CISCO ASA VPNs. Retrieved January 6, 2025. 

  211. CISA et al. (2024, July 8). People’s Republic of China (PRC) Ministry of State Security APT40 Tradecraft in Action. Retrieved February 3, 2025. 

  212. Rufus Brown, Van Ta, Douglas Bienstock, Geoff Ackerman, John Wolfram. (2022, March 8). Does This Look Infected? A Summary of APT41 Targeting U.S. State Governments. Retrieved July 8, 2022. 

  213. Sherstobitoff, R. (2018, March 02). McAfee Uncovers Operation Honeybee, a Malicious Document Campaign Targeting Humanitarian Aid Groups. Retrieved May 16, 2018. 

  214. ClearSky Research Team. (2020, August 13). Operation ‘Dream Job’ Widespread North Korean Espionage Campaign. Retrieved December 20, 2021. 

  215. Dantzig, M. v., Schamper, E. (2019, December 19). Operation Wocao: Shining a light on one of China’s hidden hacking groups. Retrieved October 8, 2020. 

  216. Microsoft Threat Intelligence. (2025, July 22). Disrupting active exploitation of on-premises SharePoint vulnerabilities. Retrieved October 15, 2025. 

  217. Lamparski, L. et al. (2025, March 11). Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers. Retrieved June 24, 2025.