Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

HT ZeroDays #168

Open
chrisddom opened this issue Jul 16, 2015 · 4 comments
Open

HT ZeroDays #168

chrisddom opened this issue Jul 16, 2015 · 4 comments
Assignees

Comments

@chrisddom
Copy link

http://researchcenter.paloaltonetworks.com/2015/07/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit/
http://blog.trendmicro.com/trendlabs-security-intelligence/an-in-depth-look-at-how-pawn-storms-java-zero-day-was-used/

Indicators

UPS
a2fe113cc13acac2bb79a375f692b8ba5cc2fa880272adc7ab0d01f839e877ff
Domains
rpt.perrydale[.]com
report.perrydale[.]com
IPs
194.44.130[.]179
URLs
rpt.perrydale[.]com /en/show.swf
report.perrydale[.]com /ema/show.swf
rpt.perrydale[.]com /en/b.gif
report.perrydale[.]com /ema/b,gif

PawnStorm
192[.]111[.]146[.]185 (direct to IP call)
www[.]acledit[.]com
www[.]biocpl[.]org

@kbandla
Copy link
Owner

kbandla commented Jul 22, 2015

i'm going to wait on this one. Will add it after a few more weeks.

@chrisddom
Copy link
Author

Yeah good call - there are at least 5 distinct articles on different groups using these already

@kbandla
Copy link
Owner

kbandla commented Jul 29, 2015

@ghost
Copy link

ghost commented Apr 11, 2016

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants