Skip to content
This repository was archived by the owner on Sep 16, 2021. It is now read-only.

Fix ReadMe blog headers #8

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
16 changes: 8 additions & 8 deletions BlogPosts/README.MD
Original file line number Diff line number Diff line change
@@ -1,39 +1,39 @@
This folder contains Indicators of Compromise (IOCs) for blog posts which have not been attributed to a particular attack group. This includes IOCs for the following blog posts:

* [Operation Poisoned Handover: Unveiling Ties Between APT Activity in Hong Kongs Pro-Democracy Movement] (http://www.fireeye.com/blog/technical/2014/11/operation-poisoned-handover-unveiling-ties-between-apt-activity-in-hong-kongs-pro-democracy-movement.html)
* [Operation Poisoned Handover: Unveiling Ties Between APT Activity in Hong Kongs Pro-Democracy Movement](http://www.fireeye.com/blog/technical/2014/11/operation-poisoned-handover-unveiling-ties-between-apt-activity-in-hong-kongs-pro-democracy-movement.html)

6037663c-680c-4a28-ad58-40622d206e1d.ioc
operation_poisoned_handover.yara

* [Razor Blades in the Candy Jar] (http://www.fireeye.com/blog/technical/2014/11/razor-blades-in-the-candy-jar.html)
* [Razor Blades in the Candy Jar](http://www.fireeye.com/blog/technical/2014/11/razor-blades-in-the-candy-jar.html)

113e561e-60d2-48db-979d-02f207550125.ioc

* [A Different Exploit Angle on Adobe's Recent Zero-Day] (https://www.fireeye.com/blog/threat-research/2015/01/a_different_exploit.html)
* [A Different Exploit Angle on Adobe's Recent Zero-Day](https://www.fireeye.com/blog/threat-research/2015/01/a_different_exploit.html)

60a6de64-7308-4af1-9003-dc23a73fdf01.ioc

* [Behind The Syrian Conflict's Digital Front Lines] (https://www.fireeye.com/blog/threat-research/2015/02/behind_the_syrianco.html)
* [Behind The Syrian Conflict's Digital Front Lines](https://www.fireeye.com/blog/threat-research/2015/02/behind_the_syrianco.html)

0b879284-0c37-4bfa-9dd8-34505a9c5175.ioc
5a8d6878-2649-4ddc-a1f6-c98932a54f91.ioc
6bb9ce5b-94c1-4733-8bb8-dc5be775b190.ioc
de99badf-b448-49e7-885a-4d8688ddf02d.ioc
e598231d-8584-4535-a0de-94e822f04c0b.ioc

* [Anatomy of a Brute Force Campaign] (https://www.fireeye.com/blog/threat-research/2015/02/anatomy_of_a_brutef.html)
* [Anatomy of a Brute Force Campaign](https://www.fireeye.com/blog/threat-research/2015/02/anatomy_of_a_brutef.html)

9a7a6929-25ea-4254-a300-13fd6b39c490.ioc

* [Ads Gone Bad] (https://www.fireeye.com/blog/threat-research/2015/03/ads_gone_bad.html)
* [Ads Gone Bad](https://www.fireeye.com/blog/threat-research/2015/03/ads_gone_bad.html)

4fdb0f45-8151-4941-a9e1-a31e21000659.ioc

* [Second Adobe Flash Zero-Day CVE-2015-5122 from HackingTeam Exploited in Strategic Web Compromise Targeting Japanese Victims] (https://www.fireeye.com/blog/threat-research/2015/07/second_adobe_flashz.html)
* [Second Adobe Flash Zero-Day CVE-2015-5122 from HackingTeam Exploited in Strategic Web Compromise Targeting Japanese Victims](https://www.fireeye.com/blog/threat-research/2015/07/second_adobe_flashz.html)

b513e829-b023-426a-b7d4-accd511be3c0.ioc

* [IRONGATE ICS Malware: Nothing to See Here, Masking Malicious Activity on SCADA Systems] (https://www.fireeye.com/blog/threat-research/2016/06/irongate_ics_malware.html)
* [IRONGATE ICS Malware: Nothing to See Here, Masking Malicious Activity on SCADA Systems](https://www.fireeye.com/blog/threat-research/2016/06/irongate_ics_malware.html)

9cee306d-5441-4cd3-932d-f3119752634c.ioc

Expand Down