Archive of publicly available threat/cybercrime INTel reports (mostly APT Reports but not limited to). Useful as a reference when you emulate threat actors on a daily basis. Please create an issue if I'm missing a relevant Report.
Note: If you are looking for every type of publicly available documents and notes related to APTs have a look at APTnotes and aptnotes. Unfortunately the way they store and sort their data doesn't work for me anymore.
| Title | Month | Source |
|---|---|---|
| APT28: A WINDOW INTO RUSSIAS CYBER ESPIONAGE OPERATIONS? | Jan | FireEye |
| APT28: At the center of the storm. Russia strategically evolves its cyber operations | Jan | FireEeye |
| APT28 Under the Scope A Journey into Exfiltrating Intelligence and Government Information | Feb | BitDefender |
| KingSlayer A Supply chain attack | Feb | RSA |
| Enhanced Analysis of GRIZZLY STEPPE Activity | Feb | US-CERT |
| Dissecting the APT28 Mac OS X Payload | Feb | Bitdefender |
| From Shamoon to StoneDrill | Mar | Kaspersky |
| LAZARUS UNDER THE HOOD | Apr | Kaspersky |
| Appendix B: Moonlight Maze Technical Report | Apr | Kaspersky |
| Callisto Group | Apr | F-Secure |
| McAfee Labs Threats Report | Apr | McAfee |
| Title | Month | Source |
|---|---|---|
| W32.Stuxnet Dossier | Feb | Symantec |
| Global Energy Cyberattacks: Night Dragon | Feb | McAfee |
| Stuxnet Under the Microscope | Apr | ESET |
| Advanced Persistent Threats: A Decade in Review | Jun | Command Five Pty Ltd |
| The Lurid Downloader | Aug | Trend Micro |
| Revealed: Operation Shady Rat | Aug | McAfee |
| Enter the Cyber-dragon | Sep | Vanity Fair |
| SK Hack by an Advanced Persistent Threat | Sep | Command Five Pty Ltd |
| Alleged APT Intrusion Set: "1.php" Group | Oct | Zscaler |
| The Nitro Attacks: Stealing Secrets From The Chemical Industry | Oct | Symantec |
| Title | Month | Source |
|---|---|---|
| The Command Structure Of The Aurora Botnet | Jan | Damballa |
| Operation Aurora: Detect, Diagnose, Respond | Jan | HBGary |
| Operation Aurora | Feb | HBGary |
| Combating Aurora | Jan | McAfee |
| In-Depth Analysis Of Hydraq: The Face Of Cyberwar Enemies Unfolds | Mar | CA |
| Shadows In The Cloud: Investigating Cyber Espionage 2.0 | Apr | Shadowserver |
| The Msupdater Trojan And Ongoing Targeted Attacks | Sep | Zscaler |
| Title | Month | Source |
|---|---|---|
| Tracking GhostNet: Investigating a Cyber Espionage Network | Mar | TheSecDevGroup |
| DECLAWING THE DRAGON: WHY THE U.S. MUST COUNTER CHINESE CYBER-WARRIORS | Jun | NA |
| Capability of the People\92s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation | Oct | Northrop Grumman |
| Russian Cyberwar on Georgia | Nov | georgiaupdate.gov.ge |